大学英语听说二级上课用,详细答案

上传人:e****s 文档编号:321788656 上传时间:2022-07-04 格式:PPT 页数:63 大小:3.08MB
返回 下载 相关 举报
大学英语听说二级上课用,详细答案_第1页
第1页 / 共63页
大学英语听说二级上课用,详细答案_第2页
第2页 / 共63页
大学英语听说二级上课用,详细答案_第3页
第3页 / 共63页
大学英语听说二级上课用,详细答案_第4页
第4页 / 共63页
大学英语听说二级上课用,详细答案_第5页
第5页 / 共63页
点击查看更多>>
资源描述

《大学英语听说二级上课用,详细答案》由会员分享,可在线阅读,更多相关《大学英语听说二级上课用,详细答案(63页珍藏版)》请在金锄头文库上搜索。

1、UNIT-8第二册第二册高等教育出版社高等教育出版社高等教育出版社高等教育出版社北京科技大学北京科技大学北京科技大学北京科技大学UNIT-8UNIT 8Are We Safe on the Internet?UNIT-8UNIT-8The problem of viruses is temporary and will be solved in two years.John McAfeeUNIT-8Background InformationUnit OverviewLesson 1Lesson 2Supplementary ReadingAgendaHome listeningUNIT-8U

2、nit OverviewStrange as it may sound, the computer virus is something of an Information Age marvel. Viruses show us both the vulnerable side and the sophisticated side of human beings. In this unit, studentswill get to know how viruses work and how to stay safe on the internet through reading, listen

3、ing and viewing. Various activities will inspire students to talk about internet security and someeffective measures we can take by using the words and expressions in this unit. And finally, they will conduct related projects with their peers.UNIT-8Background Information1. antivirus (or anti-virus)

4、software It is used to prevent, detect and remove 1. antivirus (or anti-virus) software It is used to prevent, detect and remove malware malware 恶意软件恶意软件恶意软件恶意软件 including computer viruses including computer viruses电脑病毒电脑病毒电脑病毒电脑病毒, worms, worms蠕虫病毒蠕虫病毒蠕虫病毒蠕虫病毒and trojan horses and trojan horses 木马病

5、毒木马病毒木马病毒木马病毒. Such programs may also . Such programs may also prevent and remove adwareprevent and remove adware恶意广告软件恶意广告软件恶意广告软件恶意广告软件and other forms of malware.and other forms of malware.2. viruses A virus is a small piece of software that piggybacks on real 2. viruses A virus is a small piece o

6、f software that piggybacks on real programs. For example, a virus might attach itself to a program such as a programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus spreadsheet program. Each time the spreadsheet

7、 program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc.or wreak havoc.3. e-mail viruses An e-mail virus travels as an attachment to e-mail 3. e-mail viruses

8、An e-mail virus travels as an attachment to e-mail messages, and usually replicates itself by automatically mailing itself to messages, and usually replicates itself by automatically mailing itself to dozens of people in the victims e-mail address book. Some e-mail viruses dozens of people in the vi

9、ctims e-mail address book. Some e-mail viruses dont even require a double-click they launch when you view the infecteddont even require a double-click they launch when you view the infectedmessage in the preview pane of your e-mail software.message in the preview pane of your e-mail software.UNIT-84

10、. Trojan horses A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.5. worms A worm is a small piece of software that us

11、es computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.Background InformationUNIT-8Lesson One

12、Lead-inAudio studioVideo studioSpeaking workshopProject bulletin UNIT-8Lead-inTask 1Task 2Task 3UNIT-8Task 1 Describing the PictureDescribe the picture first and then discuss the potential risks we face on the Internet.What problems are caused by computer viruses?Do you have the experience that your

13、 computer is attacked by viruses?Besides viruses, are there any other internet security problems on the Internet?UNIT-8Task 2 Reflecting on the Reading 1. How do Trojan horses work in an “infected computer? Answer: Once theyre installed, the program will infect other files throughout your system and

14、 potentially wreak havoc on your computer.Read through the Read through the Supplementary Reading Supplementary Reading passage on page passage on page 136, and answer the following questions.136, and answer the following questions.2. What will the developer of the virus do after they get important

15、information from a computer? Answer: The developer can then essentially control your computer, slowing your systems activity or causing your machine to crash.UNIT-83. What is the most common way Trojan horses spread?Answer: Through e-mail attachments.4. What is the easiest way to protect ourselves f

16、rom Trojan horses?Answer: Never open any e-mails or download any attachments from unknown senders.5. What can we do when we need help after our computer is infected by a Trojan horse?Answer: Call our computers manufacturer, our local computer store or a knowledgeable friend.UNIT-8Task 3 Expanding Your Vocabulary A. to give official permission for sth, or for sb to do sthB. to take sth/sb away from a placeC. to say officially in court that sb is to receive a particular punishmentD. a piece of bus

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 经济/贸易/财会 > 经济学

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号