文档详情

大学英语第二册课件:Unit 3 Active reading_2

re****.1
实名认证
店铺
PPT
9.53MB
约107页
文档ID:569741528
大学英语第二册课件:Unit 3 Active reading_2_第1页
1/107

MappingMappingEmbarkationEmbarkationNavigationNavigationDestinationDestinationResourcesACTIVE READING 2 Developing the skills of reasoning and argument;Understanding the author’s flow of thinking in building up his points.Appreciating the creation of tone through repetition, association and other stylistic devices. Active reading 2: MappingActive reading 2: Mapping Picture descriptionPersonal informationActive reading 2: EmbarkationActive reading 2: Embarkation Chasing Escaping Personal data Video watching Picture descriptionChasing Look at the pictures and discuss the questions in groups. MoreActive reading 2:Active reading 2: EmbarkationEmbarkation Active reading 2:Active reading 2: EmbarkationEmbarkationPicture descriptionpaparazziMoreWho are they? What are they doing?click Active reading 2:Active reading 2: EmbarkationEmbarkationPicture description Photographers taking pictures. called paparazzi who follow famous people in order to take pictures to sell to newspaper or magazine. how much the pictures’ worth is depended on how negatively they portray the famous people Active reading 2:Active reading 2: EmbarkationEmbarkationPicture descriptionEscapingMoreHow do people respond to paparazzi? Are they happy with it? Active reading 2:Active reading 2: EmbarkationEmbarkationMoreWhy does she raise hand, wear glasses and look down?What happens to the car?Fatal accident? Why?click Active reading 2:Active reading 2: EmbarkationEmbarkationØPrincess Diana; Øavoid having pictures taken; Øchased by many journalists; Øescaping from paparazzi; Øcar accident in Paris in 1998; Expressions you need Active reading 2:Active reading 2: EmbarkationEmbarkation What are the people doing? Why are they raising their hands? Why do they all wear dark glasses?Moreclick Active reading 2:Active reading 2: EmbarkationEmbarkationØavoid having pictures taken; Øprotect their privacy; Øwear dark glasses to cover faces; Øraise hands to refuse; Ømany journalists chase; Øescaping from paparazzi; Øcar accident in ParisExpressions you need Active reading 1:Active reading 1: EmbarkationEmbarkationDo you have a bank card? What is it?Do you do this?Do you have your personal data in the bank? Is it safe? While you withdrawing money from ATM doing this, what thing do you want to avoid most? Moreclick key in his (PIN) number (密码) at a ATM (automated teller machine)… withdraw money (取钱)… deposit money… (存钱), overdraw (透支)… fill in a form… ID card (身份证)… credit card… debit card (借记卡)Expressions you needActive reading 2:Active reading 2: EmbarkationEmbarkation Active reading 2:Active reading 2: EmbarkationEmbarkation Personal data refers to recorded information of an individual including his or her name, address, email address, phone number, ethnicity (种族), nationality, origin (原籍), color, religious or political beliefs or associations (团体), age, sex , marital status (婚姻状况), family status, identifying number, finger prints, blood type, health care history including information on physical/mental disability, educational, financial, criminal, employment history.Personal dataPair work. Read the passage and tell your partner how many items are included in personal data.More Active reading 2:Active reading 2: EmbarkationEmbarkationWhat types of personal data are needed in the form? Moreclick Active reading 2:Active reading 2: EmbarkationEmbarkationA Register Form of a Freshmen新生入学登记表姓姓 名名性性 别别民民 族族籍籍 贯贯出生日期出生日期政治面貌政治面貌身份证号身份证号毕业学校毕业学校联系方式联系方式通讯地址通讯地址联系联系手手 机机MoreIs there any more personal data required in your university’s register form? Can you translate it into English?click Active reading 2:Active reading 2: EmbarkationEmbarkationExpressions you needID card number, sex, date and place of birth, telephone number, education, address, group membership, marriage status, hometown Active reading 2:Active reading 2: EmbarkationEmbarkationVideo Watching Watch the video and complete the sentences with best answers:1. According to the speaker, your personal information is your _______________. A. dress B. money C. house2. The speaker suggests that if your identity if stolen you should ________________. A. forget it B. do something to defend yourself C. tell everyone about your storyBMoreScriptB Active reading 2:Active reading 2: EmbarkationEmbarkationVideo watching3. We should create a culture of security for _______. A. personal information B. information technology C. our countryA Active reading 2:Active reading 2: EmbarkationEmbarkationScripts of personal informationFormer Chairman Deborah Platt Majors: Let's treat our personal information as we would our cash. Let's safeguard it, whether we're at home, whether it's in our purse or our wallet, or at our office.Nicole M. Robinson: Your personal information is cash, and in the wrong hands it can destroy your life.Betsy Broder: The FTC plays a central role in helping victims avoid and recover from identity theft. So we have developed substantial consumer education material that's available on our website, at ftc.gov/idtheft.More Active reading 2:Active reading 2: EmbarkationEmbarkationScripts of personal informationTom Karr: Identity theft is serious, but even if your identity has been stolen, and there has been fraudulent accounts opened in your name, you can defend yourself and get those resolved in your favor. Sandra Penaherrera: There are times when you just do not want to finish and you just want to say, "forget it, I can't do this anymore, but you have to find that way inside of you to just keep going, because this is something that if you don't clear, it definitely affects the rest of your life.More Active reading 2:Active reading 2: EmbarkationEmbarkationScripts of personal informationFormer Chairman Deborah Platt Majors: What I want is for us to create a culture of security for our personal information, so that this crime, in the future, will be diminished greatly. Text organisationText explorationText evaluation Understanding text Interpreting Insights into the text Critical thinkingActive reading 2: NavigationActive reading 2: Navigation Active reading 2: NavigationActive reading 2: NavigationText organizationA low danger to top warns of a severe threatGuardedElevatedHighLowdangerSeverethreatThe writer is creating an atmosphere of fear Color alert: threat levelsParas 1-2Paras 3- 4Paras 5-7Paras 8-9Paras 10-11 Active reading 2: NavigationActive reading 2: NavigationLow danger(paras 1-2)Not scary if people try to sell me things.Does not matter if Amazon knows about you to sell you books.BackText organization Active reading 2: NavigationActive reading 2: NavigationGuarded(paras 3-4)My face is scanned by a camera of a salesperson.A salesperson may know about me by scanning my face with a camera.BackText organization Active reading 2: NavigationActive reading 2: NavigationElevated(paras 5-7)Information might be collected by sb. unknown who can do anything he/she likes.A tool like databases to support credit cards can also be a weapon.BackText organization Active reading 2: NavigationActive reading 2: NavigationHigh(paras 8-9)Identity theft occurs with personal data more and more widely known Who collects personal data is unknownBackText organization Active reading 2: NavigationActive reading 2: NavigationSevere threat(paras 10-11)No balance between convenience and peril.Things like universal identifier lead to worse thingsBackText organization Active reading 2: NavigationActive reading 2: NavigationText explorationUnderstanding text 1. Discuss in groups. What is the word “numbers” in the title referred to? The many numbers we are identified by with credit cards, identity card, accounts, etc. Those numbers are so important that it is by our numbers that we are known by people.clickMore Active reading 2: NavigationActive reading 2: NavigationUnderstanding text2. Check the following reasons for which the writer objects personal information being collected. Find evidence in the text to support your points. According to the writer, it is unknown (1) when ____, (2) about what ____, (3) by whom ____, (4) where____, (5) why____, and (6) how____ personal information is collected and used. So it is dangerous.√√√More√ Active reading 2: NavigationActive reading 2: Navigationby whomPara 5: Is it scary if the camera doesn’t belong to a salesperson?Para 6: or anyone in current possession;The party might be ethical, might. where Para 6: information moves everywhere; to a place where the owner …;Para 9: the greater the number of places where it may be found; Para 11: wherever I amwhyPara 8: But it might be a problem if it’s neither. howPara 6: can do whatever he or she likes with it; Para 10: There are worse things than identity theft, ... Sample answers Active reading 2: NavigationActive reading 2: NavigationInterpreting Understanding writer’s stylistic devices Form five groups in the whole class and each group is to do one task:Group One: Find more examples of Repetition from the text.Group Two: Find more examples of Association and Passive structure from the text.Group Three: Find more examples of Negative words and phrases from the text.Group Four: Find more examples of Parallel structures from the text.Group Five: Find more examples of Vague or non-specific words or phrases from the text.clickclickclickclickclick Active reading 2: NavigationActive reading 2: Navigation Understanding writer’s stylistic devices Group One: RepetitionThat party might be ethical – might …; that a tool … are tools … they’re tools; So it’s not a problem; And it’s not a problem … But it might be a problem …; … use of the information … my information is known … The more information …; … we don’t yet know … We don’t yet know. Back Active reading 2: NavigationActive reading 2: NavigationUnderstanding writer’s stylistic devices Group Two: Association and passive structureAssociation: weapons with credit cards death and ruin with universal identifiersPassive structures: … my information is known … information is correlated … can be linked to meBack Active reading 2: NavigationActive reading 2: NavigationUnderstanding writer’s stylistic devices Group Three: Negative words and phrases weapon, problem, theft, perpetrate, fraud, damage, died, ruined, worse, peril Back Active reading 2: NavigationActive reading 2: Navigation Understanding writer’s stylistic devices Group Four: Parallel structures The more widely my information is known, the greater the number of places where it may be found, and the more likely that theft will occur. The more information is correlated to a single identifier, the more damage an instance of identity theft may cause. Back Active reading 2: NavigationActive reading 2: Navigation Understanding writer’s stylistic devices Group Five: Vague or non-specific words or phrasesmight, probably, may, sooner or later, anyone in current possession, whatever he or she likes, worse things, wherever, vague, but apparently near Back Active reading 2: NavigationActive reading 2: NavigationText EvaluationInsights into the textWork in groups and discuss the questions, each group with one question only. 1 Do you think the passage is effective in creating a feeling of fear? 2 Does the writer explain why organizations collect so much personal information? 3 Does the writer describe a specific, current threat? 4 Does the writer suggest that the danger is growing? 5 Does the writer say whom we should be frightened of? 6 Are you more worried about personal information being collected after reading the passage? TransTransTransTransTransTrans Active reading 2: NavigationActive reading 2: NavigationText evaluation1 Do you think the passage is effective in creating a feeling of fear? Sample answer:Yes.: (1) stylistic devices and writing techniques are used to create an atmosphere of fear. (2) from clear and specific such as Amazon, salesperson to vague and general like worse things. (3) from low danger to warns of peril which is vague, sensed, near like a horror film in which danger is sensed but not sure what, where and when.No.: Unconvinced by the writer’s fears. Back Active reading 2: NavigationActive reading 2: NavigationText evaluation2 Does the writer explain why organizations collect so much personal information? Sample answer:It is left fairly vague (typical of the writer’s chosen style here), but some information is given: (1) Amazon wants to target consumers with books they are likely to be attracted to, (2) The credit card companies want to make shopping easy.Back Active reading 2: NavigationActive reading 2: NavigationText evaluation3 Does the writer describe a specific, current threat? Sample answerYes. Identity theft, but the main emphasis is on what comes next with even more organized and developed forms of information collection and storage. The threat is not very precise as yet since the full implications are unknown.Back Active reading 2: NavigationActive reading 2: NavigationText evaluation4 Does the writer suggest that the danger is growing?Sample answer lYes, in the final three paragraphs. For example, “I haven’t mentioned identity theft yet,” (in Para 9); l“The more…the greater … and the more likely …” (Para 9); l“Identity theft is much fear … There are worse things than identity theft, ” (Para 10); l“We don’t yet know how to balance …” (Para 11)Back Active reading 2: NavigationActive reading 2: NavigationText evaluation 5 Does the writer say whom we should be frightened of? Sample answer No, only of vague hostile forcesBack Active reading 2: NavigationActive reading 2: NavigationText evaluation6. Are you more worried about personal information being collected after reading the passage? Sample answerYes Nervousness seems the natural reaction, but (1) taking adequate precautions, (2) the writer is indulging in scare-mongering (3) does not matter if someone can gain access to our address, hobbies and bank balance (4)large quantity of information available makes its detailed analysis less probable. Back Active reading 2: NavigationActive reading 2: NavigationText evaluationCritical thinking1. What sort of information does your school have about you? 2. Do you think it’s legitimate for shops to automatically collect personal information?3. Do you think it’s legitimate for other organizations to collect personal information? Which ones? Why?4. How worried are you that criminals could obtain your personal information?5. Which is more frightening, a paper record or a computer database? Why?clickclickclickclickclick Active reading 2: NavigationActive reading 2: NavigationText evaluationCritical thinking1 What sort of information does your school have about you? Sample answer where students come from, their parents, their school grades membership, age ...Back Active reading 2: NavigationActive reading 2: NavigationText evaluation2. Do you think it’s legitimate for shops to automatically collect personal information? Sample answer Opinion against: invasion of their privacy; Other opinions: content as long as it does not go too far. Writer’s opinion: in the case of a reputable company (like Amazon) trying to get to know its customers better, it is not offensive, but when it comes to companies selling our data to other organizations, we are likely to become less happy about it. Back Active reading 2: NavigationActive reading 2: NavigationText evaluation3. Do you think it’s legitimate for other organizations to collect personal information? Which ones? Why? Sample answerPositive: (1) It might be of great benefit if a hospital has full records of our health and of any problems we have; (2) An airline might keep a record of our travelling patterns so they can email us offers on those routes.Negative: (1) There might be other people who we do not want to know of our movements. (2) If this information is in the hands of insurers or employers, it might be less beneficial and cost us many opportunities. Back Active reading 2: NavigationActive reading 2: NavigationText evaluation4. How worried are you that criminals could obtain your personal information? Sample answerConsiderations are given to: the size of the risk, the amount of damage which might be done the place where the risk is most severe .Back Active reading 2: NavigationActive reading 2: NavigationText evaluation5. Which is more frightening, a paper record or a computer database? Why? Sample answerPaper : in one place and takes time to access. Less probable to enter a building and change information on a paper document than puter databases: Information on computer databases can be accessed from anywhere and sorted far more quickly. Hacking might also be more probable. Back SummarisingTalking pointRole playActive reading 2: DestinationActive reading 2: Destination Active reading 2: DestinationActive reading 2: DestinationSummarizing The writer tries to create a feeling of fear in order to warn readers of the threat involved in the ever-increasing amounts of data on people being collected. With various stylistic devices, the writer ______ readers along his thought-path step by step to the ______ that collecting personal information places people ______ because we don’t know who collects it for what purposes. And neither do we know where the information goes and how it is _____. According to the writer, _____________ is much feared in society, leadspointin perilusedidentity theftMoreListen to the passage and fill in the blanks. Active reading 2: DestinationActive reading 2: DestinationSummarisingbut there are _______ things than that. And the danger is growing though it is ________, not certain. There is no __________ yet between the convenience of the world and the peril that we sense __________________ of all that information in the databases which can be employed as a ___________ as well as a tool. worsevaguebalancein the presenceweapon Active reading 2: DestinationActive reading 2: DestinationTalking pointWork in pairs. Read the strange laws on (P37) and discuss the following questions. 1. Which of the laws do you think are easy to obey? 2. How can the government make sure people obey these laws? 3. What laws would you like to introduce in your town or region?clickclickclick Active reading 2: DestinationActive reading 2: DestinationTalking point1. Which of the laws do you think are easy to obey? The 1st and 3rd laws are easy to obey. The 5th is a little inconvenient, but easy enough. The 4th depends on where you come from. --- British eat little garlic so able to cope, --- garlic-loving French seriously affected, --- for some Chinese they find law restrictive for they use a lot garlic in cooking. The 2nd law seems impossible to obey if there is to be a rail service!Back Active reading 2: DestinationActive reading 2: DestinationTalking point2. How can the government make sure people obey these laws? Difficulties (sample answer)Even with CCTV ( closed circuit television 监控录像头) watching every beach and clothes line (for Law 1 and 5) Without garlic-scanners that law (Law 4) might be a problem. The Texan law seems beyond enforcement.Back Active reading 2: DestinationActive reading 2: DestinationTalking point3. What laws would you like to introduce in your town or region? (sample answer) pets’ dropping in public places, putting their bags on seats in crowded places, walking slowly down the middle of crowded streets, … Can you add any more strange laws?Back Active reading 2: DestinationActive reading 2: DestinationRole playWork in pairs and perform the tasks according to the following scenario.ScenarioRole A: You have a complaint to make for the broken sofa you bought a week ago. The shop agrees to refund the money in full. But you have to fill in a form with your personal information. You don’t want to give them the data in detail feeling that it is invasion of your privacy and afraid that the shop will sell the information to other organizations.More Active reading 2: DestinationActive reading 2: DestinationRole playWork in pairs and perform the tasks according to the following scenario.ScenarioRole B: The manager (Role B) tries to persuade you to complete the form and get back the money by claiming that: (1) the shop is a reputable one; (2) they won’t reveal the information to any third party; (3) they would like to get to know their customer better and establish good and stable relationship, etc. Information relatedDifficult sentencesWords to noteLanguage in usePreview Active reading 2: ResourcesActive reading 2: Resources Active reading 2: ResourcesActive reading 2: ResourcesDifficult sentences“If we’ve learned one thing from terrorists, not to mention action movies, it’s that a tool is also a weapon. Globally accepted credit cards and the databases that support them are tools for taking the friction out of commerce. That’s another way of saying that they’re tools for extracting money from people with minimum effort on everyone’s part.” 假如说我们从恐怖分子那里假如说我们从恐怖分子那里————更不用说从动作电影那里更不用说从动作电影那里————学学到了一招,那就是,工具也是武器。

全球通用的信用卡和支持它们的到了一招,那就是,工具也是武器全球通用的信用卡和支持它们的数据库是去除商业摩擦的工具数据库是去除商业摩擦的工具换句话说,换句话说,它们是以让各方最省事的它们是以让各方最省事的方式从人们那里取钱的工具方式从人们那里取钱的工具 “not to mention action movies”是插入语,是插入语,在译文中的位置可在译文中的位置可用破折号处理用用破折号处理用““换句话说换句话说””翻译出翻译出 “That’s another way of saying ”的补充含义 TransAnals Active reading 2: ResourcesActive reading 2: ResourcesDifficult sentences1.“ The more widely my information is known, the greater the number of places where it may be found, and the more likely that theft will occur.” 2. “The more information is correlated to a single identifier, the more damage an instance of identity theft may cause.” The words “more” and “greater” in the first sentence are adverbs to indicate that the situation gradually increases, while the words “more” in the second sentence can be regarded as determiner (限定词) meaning a greater amount of. 上述两句均属于语法中的成比例比较。

该句型用于两个比较部分相互制约,而这成比例递增或递减,通常前者表示条件,后者表示结果TransAnals Ex.More Active reading 2: ResourcesActive reading 2: Resources1. 我的信息流传得越广,可以找到它的地方就越多,发生盗窃的可能性就越大2. 与一个身份被盗的人相关的信息越多,身份盗窃案所造成的破坏就越大Back Active reading 2: ResourcesActive reading 2: ResourcesComplete the sentences with proper words to form comparative:1. _____________ you study, ____________ you will learn. 你越努力学习,学到的知识就越多2. _____________ he got, _____________ he became. 他年纪越大越沉默寡言3. _____________ you get up, _____________ it is. 你起得越早越好The harder the moreThe olderthe quieterThe earlierthe better Active reading 2: ResourcesActive reading 2: ResourcesDifficult sentencesWherever universal identification leads, we don’t yet know how to manage a world in which everything can be linked to me, wherever I am. We don’t know yet how to balance the undoubted convenience of this world with the peril—vague, but apparently near—that we sense in the presence of all that information combined and consolidated, if only logically. 无论通用身份的前景如何,我们尚不知道该如何应付这样一个世界:无论我身在何处,一切都可能与我有关联。

一方面,这个世界给我们提供了无可置疑的种种方便;另一方面,我们又面对着所有这些强化组合的信息(如果是合理的强化组合该多好啊)所带来的种种危险这种危险虽然模糊,但显然离我们很近Trans Words to noteNew Words1.scary 2.offensive 3.tasteful 4.friction5.extract 6.perpetrate7.correlate8.identifier9.peril10. Active reading 1: ResourcesActive reading 1: ResourcesPhrases 1. go about something2. not to mention3. on file4. all the time5. balance … with …6. in the presence of Active reading 2: ResourcesActive reading 2: Resourcesscary a. Especially used for stories, films or situations in which strange or frightening things happen: 1. The following are the synonyms of scary. They have the shades (细微差异细微差异) of meaning. Put them in order of degree from least to most scary. Synonyms of scary:terrifying spooky blood-curdling chilling scary frightening hair-raising creepy spine-chilling Ex.More Active reading 2: ResourcesActive reading 2: Resources他身上有着非常吓人的东西。

There is something scary about him.玛丽不喜欢看恐怖电影Mary does not like watching a scary movieTransTransSynonyms of scary (Key):frightening terrifying scary spooky creepy chilling hair-raising spine-chilling blood-curdling2. Translate the following sentences in to English: Active reading 2: ResourcesActive reading 2: Resourcesoffensive a. Unpleasant, and likely to make people unhappy:Fill in the blanks with offensive, offence, offend:1.He has committed hundreds of _________.2.The woman was terribly __________ and hurt by the words.3.Your comments are ___________ to all women along with ____________ language in your book which looks like an __________ weapon to human beings.Related words: offence n. offend v.offencesoffendedoffensiveoffensive offensive Active reading 2: ResourcesActive reading 2: Resourcestasteful a. Showing good judgment about what is attractive or suitable:Related words: taste n. tasteless a.Complete the sentences with proper words.1.Even in young age she had a _________ for music. So she has a ___________ selection of music now. 2.He is rude with the a ___________ joke about marriage.3.Your dress is ___________ though the shoes are ___________. Change the shoes if you go to the party this evening. tastetastefultastefultastelesstasteless Active reading 2: ResourcesActive reading 2: Resourcesfriction n. Disagreement or quarrel between people:Translate the following sentences in to English:1 这个决定有可能导致两国之间的摩擦。

The decision is likely to lead to friction between the two countriesTransTrans2.她的皮肤上有绳子的擦痕 She has burn marks from the friction of the ropes on her skin. Active reading 2: ResourcesActive reading 2: Resourcesextract v.A. To remove something from a particular place;B. To get someone to tell or give you something when they do not want;C. A short piece of something taken from something such as a book or a letter.Decide which meaning is used with a proper a letter in a bracket.1. The teacher read several extracts ( ) from the novel.2. The army uses force to extract ( ) confessions (供词).3. She felt painful when the dentist extracted ( ) her tooth. ABC Active reading 2: ResourcesActive reading 2: Resourcesperpetrate v. To do something that is harmful, illegal, dishonest, morally wrong. Formal. Synonym: commit Translate the following sentences into Chinese:1.Who could have perpetrated such a dreadful crime? We are determined to catch the perpetrator.2.2. A crime has been perpetrated against the human beings. 谁能犯下如此大罪?我们决心抓住罪犯。

谁能犯下如此大罪?我们决心抓住罪犯 对人类犯下了罪行对人类犯下了罪行TransTrans Active reading 2: ResourcesActive reading 2: Resourcescorrelate v. Two things are connected in a way that is not caused by chance. Often followed by withcorrelation n. correlative a. Complete the sentences with proper words:1.Poverty and poor housing strongly and closely __________with a shorter life expectancy (估计寿命). 2.Citizens should have both rights and their ___________ responsibilities.3.There is a direct/significant ____________ between best-known brands and best-selling brands.correlatecorrelativecorrelation Active reading 2: ResourcesActive reading 2: ResourcesIdentifier n.A person or a thing that identifies something.Related words:identification 辨认;识别;身份证明(官方文件证明) identity 身份;本体;一致identify 认出;辨别出,一致(+ with)identical 完全相同,一摸一样More Active reading 2: ResourcesActive reading 2: ResourcesIdentifier n.Complete the sentences with the words above.•Two of the suspects have been __________ by the witnesses.•Can you show me your ______________, bring some form of ______________, probably your ___________ card, please?•The new number of an ID card will be considered the unique _________ in this area.•This building is __________ to the one next to it.•The twin sisters are _________ in appearance.•The ________________ of the killer is still unknown.identifiedidentificationidentityidentifieridentificationidenticalidenticalidentity Active reading 2: ResourcesActive reading 2: Resourcesperil n.1. Check the synonyms of peril. poison _____; danger _____; risk _____; hazard _____2. Work in pairs to match the verbs and adjectives with peril by writing correct letters in the right column.verbsperilA. avoid, B. escape,C. run, D. face, E. doF. dare, G. defy, H. avert, I. makeadjectivesperilA. approaching, B. deadly,C. serious, D. grave, E. perilousA.B. D. F. B.G. HA. B. C. D.√√√More Active reading 2: ResourcesActive reading 2: Resources3. Choose proper words to complete the following sentences.(1)The fire fighters often put their lives _____ peril to rescue others.(2) A. in B. at C. on D. with(3)(2) Any climber who neglects these simple precautions does so _____ his/her peril. (4) A. in B. for C. at D. without(5)(3) Don’t ignore warning ______ your peril.(6) A. in B. beyond C. at D. withinatat Active reading 2: ResourcesActive reading 2: ResourcesPhrasesFill in the blanks with the words given below. go about somethingnot to mentionon fileall the timebalance … with …in the presence of(1) We will keep your details _______.(2) Click on the icon to open the ____. You can always save the ______ into another directory. on fileVerb + ________: open / close / save / create / copy / access / delete / edit /download a _______. filefilefilefileMore Active reading 2: ResourcesActive reading 2: Resources She _____________ her preparations in a cold way. That’s another way of saying that she ____________ her work in a businesslike quiet way. How shall we _____________ doing our job? went aboutwent aboutgo aboutMoreFill in the blanks with the words given below. go about somethingnot to mentionon fileall the timebalance … with …in the presence of Active reading 2: ResourcesActive reading 2: Resources(1) The supermarket is too far to walk, _______________ the fact that it might be closed.(2) Pollution has a negative effect on the health of everyone, ___________________ the damage to the environment.Not to mention is used to introduce an additional thing that makes a situation even more difficult, surprising, interesting etc. not to mentionnot to mentionMore go about somethingnot to mentionon fileall the timebalance … with …in the presence of Active reading 2: ResourcesActive reading 2: Resources(1) ____________________ of the difficult situation, we should _________ the decrease of income _____ the increase of expense. (2) The president has been _____________ one side of political force ______ another ________________.In the presence ofbalancewithbalancingwithall the timeFill in the blanks with the words given below. go about somethingnot to mentionon fileall the timebalance … with …in the presence of Active reading 1: ResourcesActive reading 1: ResourcesLanguage in useUseful ExpressionsActive reading 1: ResourcesActive reading 1: ResourcesMore Useful Expressions 1.1.可供随时调用可供随时调用2.2.走在街上走在街上3.3.方式令人不舒服方式令人不舒服4.4.从事某事从事某事5.5.令人恼火令人恼火6.6.在档案上在档案上7.7.日益集权化、全球化、日益集权化、全球化、网络化的经济网络化的经济8.8.目前拥有目前拥有9.9.更不用说更不用说10.10.去除摩擦去除摩擦1.be readily available to 2.walk down the street3.be not tasteful in the way4.go about something5.be offensive6.be on file 7.increasingly consolidated, global, networked economy8.in current possession9.not to mention 10.take the friction out ofActive reading 1: ResourcesActive reading 1: ResourcesMore Useful expressions 11.11.以最省事的方式以最省事的方式12.12.各方各方13.13.未经许可使用未经许可使用14.14.行骗行骗15.15.与与……具有相关性具有相关性16.16.通用标识符通用标识符17.17.在在……保持平衡保持平衡18.18.面对面对11.with minimum effort12.on everyone’s part13.unauthorized use14.perpetrate fraud15.correlated to 16.a universal identifier 17.balance … with …18.in the presence ofActive reading 1: ResourcesActive reading 1: Resources Information related Active reading 1: ResourcesActive reading 1: ResourcesActive reading 1: ResourcesActive reading 1: ResourcesPersonal information protectionUniversal identifierPractices for computer securityUsing a public computer in a safe way Active reading 2: ResourcesActive reading 2: ResourcesPersonal information protectionRead the following passage and write an essay about personal information protection in your context. Your writing should include general introduction and tips of personal information protection. You can draw on the resources from the following passage. More Active reading 2: ResourcesActive reading 2: Resources Every day you share personal information about yourself with others. It’s so routine that you may not even realize you’re doing it. You may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, buy a gift online, call home on your cell phone, schedule a doctor’s appointment, or apply for a credit card. Each transaction requires you to share personal information: your bank and credit card account numbers; your income; your Social Security number (SSN); or your name, address, and phone numbers.Personal information protectionMore Active reading 2: ResourcesActive reading 2: ResourcesPersonal information protection It’s important to find out what happens to the personal information you and your children provide to companies, marketers, and government agencies. These organizations may use your information simply to process your order; to tell you about products, services, or promotions; or to share with others. And then there are unscrupulous individuals, like identity thieves, who want your information to commit fraud. Identity theft—the fastest-growing white-collar crime in America—occurs when someone steals your personal identifying information, like your SSN, birth date, or mother’s maiden name, to open new charge accounts, order merchandise, or borrow money. More Active reading 2: ResourcesActive reading 2: ResourcesPersonal information protection These tips are offered to help you manage your personal information wisely, and to help minimize its misuse. Before you reveal any personally identifying information, find out how it will be used and whether it will be shared with others. Ask about company’s privacy policy: Will you have a choice about the use of your information; can you choose to have it kept confidential? Read the privacy policy on any website directed to children. Websites directed to children or that knowingly collect information from kids under 13 must post a notice of their information collection practices. More Active reading 2: ResourcesActive reading 2: ResourcesPersonal information protection Put passwords on all your accounts, including your credit card account, and your bank and phone accounts. Avoid using easily available information — like your mother’s maiden name, your birth date, the last four digits of your SSN, or your phone number — or obvious choices, like a series of consecutive numbers or your hometown football team. Minimize the identification information and the number of cards you carry to what you’ll actually need. Don’t put all your identifying information in one holder in your purse, briefcase, or backpack. More Active reading 2: ResourcesActive reading 2: ResourcesPersonal information protectionKeep items with personal information in a safe place. When you discard receipts, copies of credit applications, insurance forms, physician statements, bank checks and statements, expired charge cards, credit offers you get in the mail, and mailing labels from magazines, tear or shred them. That will help thwart any identity thief who may pick through your trash or recycling bins to capture your personal information. More Active reading 2: ResourcesActive reading 2: ResourcesPersonal information protectionOrder a copy of your credit report. Make sure it’s accurate and includes only those activities you’ve authorized. Each of the nationwide consumer reporting companies — Equifax, Experian, and Trans Union — are required to provide you with a free copy of your credit report, at your request, once every 12 months. Active reading 2: ResourcesActive reading 2: Resources Universal identifierRead the passage and answer questions with “T” for true or “F” for false: There are a number of functions that an “identifier” can perform. It can be used as a means to establish who an individual or an organization is, a means for authentication (to provide proof that one is who one claims to be), a means for authorization (to establish that one has the right to give the instructions that that person wants to give for access to, or use of, information and/or resources) This passage is about the function of identifier. ( )TMore Active reading 2: ResourcesActive reading 2: ResourcesUniversal identifierThe author suggests that identifier is secure. ( ) Clearly a universal identifier may provide great convenience to multiple organizations attempting to assemble a broad profile of the interaction of the individual with his or her society. That convenience includes threats and opportunities for misuse. Such an aggregation of information in the hands of others is likely to be less-than-warmly received by an individual seeking privacy. FMore Active reading 2: ResourcesActive reading 2: ResourcesUniversal identifierThe part is about security approaches for identifier. ( ) For situations requiring increased privacy and/or security or truly unique identification of an individual, biometric factors have often been used: the baby’s footprint and the mother’s fingerprint are recorded at the birth of the child; the photo-ID is used along with one or more numerical identifiers, for many purposes. A retina-scan is another form of unique identifier. Each of these biometric approaches provides a unique ID. TMore Active reading 2: ResourcesActive reading 2: ResourcesUniversal identifierA tradeoff is needed between a society and an individual for a universal identifier. ( ) The desirability and feasibility of using universal identifiers and/or unique identifiers clearly is determined. The characteristics of a given transaction or interaction between the individual and the society will determine the values in the tradeoffs (协调) among privacy, security, and convenience. The values of the society will determine the attractiveness of one resolution of these tensions as compared to others. T Active reading 2: ResourcesActive reading 2: ResourcesPractices for computer securityShould and shouldn’tThe following statements are things that you should do and shouldn’t for computer security. Write “D” for “should” and “N” for “shouldn’t”. Example is given for the first statements. More Active reading 2: ResourcesActive reading 2: ResourcesPractices for computer securityShould and shouldn’t1. Know who you are dealing with. ( ) 2. Use security software that updates automatically. ( ) 3. Keep your Web-browser up-to-date. ( )4. Write down your pass wards in a notebook easy to access. ( ) 5. Save all the important files in computer without backing them up. ( ) D DDNMoreN Active reading 2: ResourcesActive reading 2: ResourcesPractices for computer securityRead the passage and add more suggestions for computer security: To an identity thief, your personal information can provide instant access to your financial accounts, your credit record, and other assets. If you think no one would be interested in YOUR personal information, think again. Don't reply to an email, text, or pop-up message that asks for personal or financial information, and don't click on links in the message. If you want to go to a bank or business's website, type the web address into your browser yourself. More Active reading 2: ResourcesActive reading 2: Resources Don't respond if you get a message – by email, text, pop-up or phone – that asks you to call a phone number to update your account or give your personal information to access a refund. While you can't enjoy the benefits of the Internet without sharing some personal information, you can take steps to share only with organizations you know and trust. Don't give out your personal information unless you first find out how it's going to be used and how it will be protected.Practices for personal security Active reading 2: ResourcesActive reading 2: ResourcesUsing a public computer in a safe way 1. Don't save your logon information. Always log out of Web sites by clicking "log out" on the site. It's not enough to simply close the browser window or type in another address. Many programs (especially Web mail and instant messenger programs) include automatic login features that will save your user name and password. Disable this option so no one can log in as you do.MoreRead the following passage and decide which tip is the most important for you. Active reading 2: ResourcesActive reading 2: ResourcesUsing a public computer in a safe way 2. Don't leave the computer unattended with sensitive information on the screen. If you have to leave the public computer, log out of all programs and close all windows that might display sensitive information.3. Erase your tracks. Internet explorer offers In Private browsing that leaves no trace of specific Web activity. To disable the feature that stores passwords. Before you go to the Web, turn off the Internet Explorer feature that "remembers" your passwords.More Active reading 2: ResourcesActive reading 2: ResourcesUsing a public computer in a safe way 4. Watch for over-the-shoulder snoops. When you use a public computer, be on the look out for thieves who look over your shoulder or watch as you enter sensitive passwords to collect your information.5. Don't enter sensitive information into a public computer. These measures provide some protection against casual hackers who use a public computer after you have. Active reading 2: ResourcesActive reading 2: ResourcesPreview 1.Interview three persons to ask about their views of file-sharing.2.Make an internet search for people’s opinions of file-sharing. Active reading 2: ResourcesActive reading 2: Resources 。

下载提示
相似文档
正为您匹配相似的精品文档
相关文档