新应用B2U3教案

上传人:壹****1 文档编号:507912450 上传时间:2023-10-23 格式:DOC 页数:7 大小:81.51KB
返回 下载 相关 举报
新应用B2U3教案_第1页
第1页 / 共7页
新应用B2U3教案_第2页
第2页 / 共7页
新应用B2U3教案_第3页
第3页 / 共7页
新应用B2U3教案_第4页
第4页 / 共7页
新应用B2U3教案_第5页
第5页 / 共7页
点击查看更多>>
资源描述

《新应用B2U3教案》由会员分享,可在线阅读,更多相关《新应用B2U3教案(7页珍藏版)》请在金锄头文库上搜索。

1、湖北商贸学院教案头页 年 月 日 授课日期班次教学课题:目的要求:After learning this unit, students will be able to: know about the strangest hacks in the future; be aware of the dangers of cell phone use on the road; know how to write a descriptive essay; learn to find information by scanning in reading; conduct a survey on cyber

2、 security.重点难点:1. Vocabulary: security, invasive, remote-control, vulnerability, renowned, genius, identification, malicious, remote, vulnerable, infect, access, invade, embed, clone, aware, humble, stunningly, audience, contestant, cyber, facility, automation, watch2. Structure: what引导的主语从句3. Skill

3、s: to divide and categorize information 教具: Text book, PPT, and blackboard 授课内容:(另用页)教学进程:Section 1: Lead inSection 2: Background informationSection 3: Text understandingSection 4: Study of the Text and language points Section 5: RevisionSection 6: Exercise课外作业: Exercises on Page Text comprehension

4、and Vocabulary II&III Page Structure IV Page Translation V课堂考勤:课后分析:New Applied College English Book 2Unit 3 Public Security: Sci-fi Hacks That Are Now a Reality1. Teaching ObjectiveAfter learning this unit, students will be able to: 2. Key PointsVocabularysecurity, invasive, remote-control, vulnera

5、bility, renowned, genius, identification, malicious, remote, vulnerable, infect, access, invade, embed, clone, aware, humble, stunningly, audience, contestant, cyber, facility, automation, watchStructure what引导的主语从句Skills to divide and categorize information3. Time AllocationContentTeaching period1L

6、ead in2Background information3Text understanding4Study of the Text and language points5Revision6Exercise7Listening 4. Teaching ProceduresPart 1. Lead In Identify the brands of anti-virus software listed on the textbook.Part 2. Introduction of the Background Information The Matrix: It is a 1999 Ameri

7、can science fiction action movie. It depicts a dystopian future in which reality as perceived by most humans is actually a simulated reality called “the Matrix,” created by intelligent machines to control the human population, and their bodies heat and electrical activity are used as an energy sourc

8、e. Computer programmer Neo learns this truth and is drawn into a rebellion against the machines, which involves other people who have been freed from the “dream world.”WarGames: It is a 1983 American Cold War science fiction movie. A young computer hacker unwittingly accesses WOPR (War Operation Pla

9、n Response), a United States military supercomputer programmed to predict possible outcomes of nuclear war. He gets WOPR to run a nuclear war simulation, originally believing it to be a computer game. The simulation causes a national nuclear missile scare and nearly starts World War III.Hackers: It

10、is a 1995 American science fiction movie. A young boy is arrested by the US Secret Service for writing a computer virus and is banned from using a computer until his 18th birthday. Years later, he and his friends discover a plot to unleash a dangerous computer virus, but they must use their computer

11、 skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.Part 3. Understanding of main ideasTask 1 Decide whether the following statements are true (T) or false (F) according to the text.( F ) 1 To remotely control your real car is fun.( T

12、) 2 More and more cars are equipped with computer-controlled functions and become vulnerable to hackers.( F ) 3 Hackers can kill a person by stopping an insulin pump from releasing enough doses.( F ) 4 Many people are aware that a smartphone may watch them once it is hacked.( F ) 5 There is little p

13、otential for a smart TV to get hacked and monitor people in their homes because smart TVs arent that common yet.( T ) 6 Internet-connected appliances and home automation systems can control key functions of a house remotely.( T ) 7 It can be seen in Hollywood movies that genius criminals hack high-e

14、nd surveillance cameras and freeze or change the picture.( T ) 8 An employee may get his access badge cloned without noticing it.Task 2 Ask students to complete the following summary according to the text, in order to have a understanding of the main ideas of the whole text and the structure as well

15、.SUMMARYIntroductionIn the future, hacks will be more personal and invasive. The strangest hacks are introduced below.HacksRemote-controlling a carA cars steering and brakes can be controlled through its computer. A car may be hacked over Wi-fi or with a(n) infected MP3, and unlocked and started just by texting.Cyber murderHackers can kill a person by giving the pacemaker a(n) high-voltage shock over Wi-fi.Spy phoneA phone which has been

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 高等教育 > 研究生课件

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号