大学英语第二册课件:Unit 3 Active reading_2

上传人:re****.1 文档编号:569741528 上传时间:2024-07-30 格式:PPT 页数:107 大小:9.53MB
返回 下载 相关 举报
大学英语第二册课件:Unit 3 Active reading_2_第1页
第1页 / 共107页
大学英语第二册课件:Unit 3 Active reading_2_第2页
第2页 / 共107页
大学英语第二册课件:Unit 3 Active reading_2_第3页
第3页 / 共107页
大学英语第二册课件:Unit 3 Active reading_2_第4页
第4页 / 共107页
大学英语第二册课件:Unit 3 Active reading_2_第5页
第5页 / 共107页
点击查看更多>>
资源描述

《大学英语第二册课件:Unit 3 Active reading_2》由会员分享,可在线阅读,更多相关《大学英语第二册课件:Unit 3 Active reading_2(107页珍藏版)》请在金锄头文库上搜索。

1、MappingMappingEmbarkationEmbarkationNavigationNavigationDestinationDestinationResourcesACTIVE READING 2Developing the skills of reasoning and argument;Understanding the authors flow of thinking in building up his points.Appreciating the creation of tone through repetition, association and other styl

2、istic devices. Active reading 2: MappingActive reading 2: MappingPicture descriptionPersonal informationActive reading 2: EmbarkationActive reading 2: Embarkation Chasing Escaping Personal data Video watchingPicture descriptionChasing Look at the pictures and discuss the questions in groups. MoreAct

3、ive reading 2:Active reading 2: EmbarkationEmbarkationActive reading 2:Active reading 2: EmbarkationEmbarkationPicture descriptionpaparazziMoreWho are they? What are they doing?clickActive reading 2:Active reading 2: EmbarkationEmbarkationPicture description Photographers taking pictures. called pap

4、arazzi who follow famous people in order to take pictures to sell to newspaper or magazine. how much the pictures worth is depended on how negatively they portray the famous peopleActive reading 2:Active reading 2: EmbarkationEmbarkationPicture descriptionEscapingMoreHow do people respond to paparaz

5、zi? Are they happy with it? Active reading 2:Active reading 2: EmbarkationEmbarkationMoreWhy does she raise hand, wear glasses and look down?What happens to the car?Fatal accident? Why?clickActive reading 2:Active reading 2: EmbarkationEmbarkationPrincess Diana; avoid having pictures taken; chased b

6、y many journalists; escaping from paparazzi; car accident in Paris in 1998; Expressions you needActive reading 2:Active reading 2: EmbarkationEmbarkation What are the people doing? Why are they raising their hands? Why do they all wear dark glasses?MoreclickActive reading 2:Active reading 2: Embarka

7、tionEmbarkationavoid having pictures taken; protect their privacy; wear dark glasses to cover faces; raise hands to refuse; many journalists chase; escaping from paparazzi; car accident in ParisExpressions you needActive reading 1:Active reading 1: EmbarkationEmbarkationDo you have a bank card? What

8、 is it?Do you do this?Do you have your personal data in the bank? Is it safe? While you withdrawing money from ATM doing this, what thing do you want to avoid most? Moreclickkey in his (PIN) number (密码) at a ATM (automated teller machine) withdraw money (取钱) deposit money (存钱), overdraw (透支) fill in

9、 a form ID card (身份证) credit card debit card (借记卡)Expressions you needActive reading 2:Active reading 2: EmbarkationEmbarkationActive reading 2:Active reading 2: EmbarkationEmbarkation Personal data refers to recorded information of an individual including his or her name, address, email address, ph

10、one number, ethnicity (种族), nationality, origin (原籍), color, religious or political beliefs or associations (团体), age, sex , marital status (婚姻状况), family status, identifying number, finger prints, blood type, health care history including information on physical/mental disability, educational, fina

11、ncial, criminal, employment history.Personal dataPair work. Read the passage and tell your partner how many items are included in personal data.MoreActive reading 2:Active reading 2: EmbarkationEmbarkationWhat types of personal data are needed in the form? MoreclickActive reading 2:Active reading 2:

12、 EmbarkationEmbarkationA Register Form of a Freshmen新生入学登记表姓姓 名名性性 别别民民 族族籍籍 贯贯出生日期出生日期政治面貌政治面貌身份证号身份证号毕业学校毕业学校联系方式联系方式通讯地址通讯地址电话联系电话联系手手 机机MoreIs there any more personal data required in your universitys register form? Can you translate it into English?clickActive reading 2:Active reading 2: Embark

13、ationEmbarkationExpressions you needID card number, sex, date and place of birth, telephone number, education, address, group membership, marriage status, hometown Active reading 2:Active reading 2: EmbarkationEmbarkationVideo Watching Watch the video and complete the sentences with best answers:1.

14、According to the speaker, your personal information is your _. A. dress B. money C. house2. The speaker suggests that if your identity if stolen you should _. A. forget it B. do something to defend yourself C. tell everyone about your storyBMoreScriptBActive reading 2:Active reading 2: EmbarkationEm

15、barkationVideo watching3. We should create a culture of security for _. A. personal information B. information technology C. our countryAActive reading 2:Active reading 2: EmbarkationEmbarkationScripts of personal informationFormer Chairman Deborah Platt Majors: Lets treat our personal information a

16、s we would our cash. Lets safeguard it, whether were at home, whether its in our purse or our wallet, or at our office.Nicole M. Robinson: Your personal information is cash, and in the wrong hands it can destroy your life.Betsy Broder: The FTC plays a central role in helping victims avoid and recove

17、r from identity theft. So we have developed substantial consumer education material thats available on our website, at ftc.gov/idtheft.MoreActive reading 2:Active reading 2: EmbarkationEmbarkationScripts of personal informationTom Karr: Identity theft is serious, but even if your identity has been s

18、tolen, and there has been fraudulent accounts opened in your name, you can defend yourself and get those resolved in your favor. Sandra Penaherrera: There are times when you just do not want to finish and you just want to say, forget it, I cant do this anymore, but you have to find that way inside o

19、f you to just keep going, because this is something that if you dont clear, it definitely affects the rest of your life.MoreActive reading 2:Active reading 2: EmbarkationEmbarkationScripts of personal informationFormer Chairman Deborah Platt Majors: What I want is for us to create a culture of secur

20、ity for our personal information, so that this crime, in the future, will be diminished greatly.Text organisationText explorationText evaluation Understanding text Interpreting Insights into the text Critical thinkingActive reading 2: NavigationActive reading 2: NavigationActive reading 2: Navigatio

21、nActive reading 2: NavigationText organizationA low danger to top warns of a severe threatGuardedElevatedHighLowdangerSeverethreatThe writer is creating an atmosphere of fear Color alert: threat levelsParas 1-2Paras 3- 4Paras 5-7Paras 8-9Paras 10-11Active reading 2: NavigationActive reading 2: Navig

22、ationLow danger(paras 1-2)Not scary if people try to sell me things.Does not matter if Amazon knows about you to sell you books.BackText organizationActive reading 2: NavigationActive reading 2: NavigationGuarded(paras 3-4)My face is scanned by a camera of a salesperson.A salesperson may know about

23、me by scanning my face with a camera.BackText organizationActive reading 2: NavigationActive reading 2: NavigationElevated(paras 5-7)Information might be collected by sb. unknown who can do anything he/she likes.A tool like databases to support credit cards can also be a weapon.BackText organization

24、Active reading 2: NavigationActive reading 2: NavigationHigh(paras 8-9)Identity theft occurs with personal data more and more widely known Who collects personal data is unknownBackText organizationActive reading 2: NavigationActive reading 2: NavigationSevere threat(paras 10-11)No balance between co

25、nvenience and peril.Things like universal identifier lead to worse thingsBackText organizationActive reading 2: NavigationActive reading 2: NavigationText explorationUnderstanding text 1. Discuss in groups. What is the word “numbers” in the title referred to? The many numbers we are identified by wi

26、th credit cards, identity card, accounts, etc. Those numbers are so important that it is by our numbers that we are known by people.clickMoreActive reading 2: NavigationActive reading 2: NavigationUnderstanding text2. Check the following reasons for which the writer objects personal information bein

27、g collected. Find evidence in the text to support your points. According to the writer, it is unknown (1) when _, (2) about what _, (3) by whom _, (4) where_, (5) why_, and (6) how_ personal information is collected and used. So it is dangerous.MoreActive reading 2: NavigationActive reading 2: Navig

28、ationby whomPara 5: Is it scary if the camera doesnt belong to a salesperson?Para 6: or anyone in current possession;The party might be ethical, might. where Para 6: information moves everywhere; to a place where the owner ;Para 9: the greater the number of places where it may be found; Para 11: whe

29、rever I amwhyPara 8: But it might be a problem if its neither. howPara 6: can do whatever he or she likes with it; Para 10: There are worse things than identity theft, . Sample answersActive reading 2: NavigationActive reading 2: NavigationInterpreting Understanding writers stylistic devices Form fi

30、ve groups in the whole class and each group is to do one task:Group One: Find more examples of Repetition from the text.Group Two: Find more examples of Association and Passive structure from the text.Group Three: Find more examples of Negative words and phrases from the text.Group Four: Find more e

31、xamples of Parallel structures from the text.Group Five: Find more examples of Vague or non-specific words or phrases from the text.clickclickclickclickclickActive reading 2: NavigationActive reading 2: Navigation Understanding writers stylistic devices Group One: RepetitionThat party might be ethic

32、al might ; that a tool are tools theyre tools; So its not a problem; And its not a problem But it might be a problem ; use of the information my information is known The more information ; we dont yet know We dont yet know. BackActive reading 2: NavigationActive reading 2: NavigationUnderstanding wr

33、iters stylistic devices Group Two: Association and passive structureAssociation: weapons with credit cards death and ruin with universal identifiersPassive structures: my information is known information is correlated can be linked to meBackActive reading 2: NavigationActive reading 2: NavigationUnd

34、erstanding writers stylistic devices Group Three: Negative words and phrases weapon, problem, theft, perpetrate, fraud, damage, died, ruined, worse, peril BackActive reading 2: NavigationActive reading 2: Navigation Understanding writers stylistic devices Group Four: Parallel structures The more wid

35、ely my information is known, the greater the number of places where it may be found, and the more likely that theft will occur. The more information is correlated to a single identifier, the more damage an instance of identity theft may cause. BackActive reading 2: NavigationActive reading 2: Naviga

36、tion Understanding writers stylistic devices Group Five: Vague or non-specific words or phrasesmight, probably, may, sooner or later, anyone in current possession, whatever he or she likes, worse things, wherever, vague, but apparently near BackActive reading 2: NavigationActive reading 2: Navigatio

37、nText EvaluationInsights into the textWork in groups and discuss the questions, each group with one question only. 1 Do you think the passage is effective in creating a feeling of fear? 2 Does the writer explain why organizations collect so much personal information? 3 Does the writer describe a spe

38、cific, current threat? 4 Does the writer suggest that the danger is growing? 5 Does the writer say whom we should be frightened of? 6 Are you more worried about personal information being collected after reading the passage? TransTransTransTransTransTransActive reading 2: NavigationActive reading 2:

39、 NavigationText evaluation1 Do you think the passage is effective in creating a feeling of fear? Sample answer:Yes.: (1) stylistic devices and writing techniques are used to create an atmosphere of fear. (2) from clear and specific such as Amazon, salesperson to vague and general like worse things.

40、(3) from low danger to warns of peril which is vague, sensed, near like a horror film in which danger is sensed but not sure what, where and when.No.: Unconvinced by the writers fears. BackActive reading 2: NavigationActive reading 2: NavigationText evaluation2 Does the writer explain why organizati

41、ons collect so much personal information? Sample answer:It is left fairly vague (typical of the writers chosen style here), but some information is given: (1) Amazon wants to target consumers with books they are likely to be attracted to, (2) The credit card companies want to make shopping easy.Back

42、Active reading 2: NavigationActive reading 2: NavigationText evaluation3 Does the writer describe a specific, current threat? Sample answerYes. Identity theft, but the main emphasis is on what comes next with even more organized and developed forms of information collection and storage. The threat i

43、s not very precise as yet since the full implications are unknown.BackActive reading 2: NavigationActive reading 2: NavigationText evaluation4 Does the writer suggest that the danger is growing?Sample answer lYes, in the final three paragraphs. For example, “I havent mentioned identity theft yet,” (

44、in Para 9); l“The morethe greater and the more likely ” (Para 9); l“Identity theft is much fear There are worse things than identity theft, ” (Para 10); l“We dont yet know how to balance ” (Para 11)BackActive reading 2: NavigationActive reading 2: NavigationText evaluation 5 Does the writer say whom

45、 we should be frightened of? Sample answer No, only of vague hostile forcesBackActive reading 2: NavigationActive reading 2: NavigationText evaluation6. Are you more worried about personal information being collected after reading the passage? Sample answerYes Nervousness seems the natural reaction,

46、 but (1) taking adequate precautions, (2) the writer is indulging in scare-mongering (3) does not matter if someone can gain access to our address, hobbies and bank balance (4)large quantity of information available makes its detailed analysis less probable. BackActive reading 2: NavigationActive re

47、ading 2: NavigationText evaluationCritical thinking1. What sort of information does your school have about you? 2. Do you think its legitimate for shops to automatically collect personal information?3. Do you think its legitimate for other organizations to collect personal information? Which ones? W

48、hy?4. How worried are you that criminals could obtain your personal information?5. Which is more frightening, a paper record or a computer database? Why?clickclickclickclickclickActive reading 2: NavigationActive reading 2: NavigationText evaluationCritical thinking1 What sort of information does yo

49、ur school have about you? Sample answer where students come from, their parents, their school grades membership, age .BackActive reading 2: NavigationActive reading 2: NavigationText evaluation2. Do you think its legitimate for shops to automatically collect personal information? Sample answer Opini

50、on against: invasion of their privacy; Other opinions: content as long as it does not go too far. Writers opinion: in the case of a reputable company (like Amazon) trying to get to know its customers better, it is not offensive, but when it comes to companies selling our data to other organizations,

51、 we are likely to become less happy about it. BackActive reading 2: NavigationActive reading 2: NavigationText evaluation3. Do you think its legitimate for other organizations to collect personal information? Which ones? Why? Sample answerPositive: (1) It might be of great benefit if a hospital has

52、full records of our health and of any problems we have; (2) An airline might keep a record of our travelling patterns so they can email us offers on those routes.Negative: (1) There might be other people who we do not want to know of our movements. (2) If this information is in the hands of insurers

53、 or employers, it might be less beneficial and cost us many opportunities. BackActive reading 2: NavigationActive reading 2: NavigationText evaluation4. How worried are you that criminals could obtain your personal information? Sample answerConsiderations are given to: the size of the risk, the amou

54、nt of damage which might be done the place where the risk is most severe .BackActive reading 2: NavigationActive reading 2: NavigationText evaluation5. Which is more frightening, a paper record or a computer database? Why? Sample answerPaper : in one place and takes time to access. Less probable to

55、enter a building and change information on a paper document than puter databases: Information on computer databases can be accessed from anywhere and sorted far more quickly. Hacking might also be more probable. BackSummarisingTalking pointRole playActive reading 2: DestinationActive reading 2: Dest

56、inationActive reading 2: DestinationActive reading 2: DestinationSummarizing The writer tries to create a feeling of fear in order to warn readers of the threat involved in the ever-increasing amounts of data on people being collected. With various stylistic devices, the writer _ readers along his t

57、hought-path step by step to the _ that collecting personal information places people _ because we dont know who collects it for what purposes. And neither do we know where the information goes and how it is _. According to the writer, _ is much feared in society, leadspointin perilusedidentity theft

58、MoreListen to the passage and fill in the blanks. Active reading 2: DestinationActive reading 2: DestinationSummarisingbut there are _ things than that. And the danger is growing though it is _, not certain. There is no _ yet between the convenience of the world and the peril that we sense _ of all

59、that information in the databases which can be employed as a _ as well as a tool. worsevaguebalancein the presenceweaponActive reading 2: DestinationActive reading 2: DestinationTalking pointWork in pairs. Read the strange laws on (P37) and discuss the following questions. 1. Which of the laws do yo

60、u think are easy to obey? 2. How can the government make sure people obey these laws? 3. What laws would you like to introduce in your town or region?clickclickclickActive reading 2: DestinationActive reading 2: DestinationTalking point1. Which of the laws do you think are easy to obey? The 1st and

61、3rd laws are easy to obey. The 5th is a little inconvenient, but easy enough. The 4th depends on where you come from. - British eat little garlic so able to cope, - garlic-loving French seriously affected, - for some Chinese they find law restrictive for they use a lot garlic in cooking. The 2nd law

62、 seems impossible to obey if there is to be a rail service!BackActive reading 2: DestinationActive reading 2: DestinationTalking point2. How can the government make sure people obey these laws? Difficulties (sample answer)Even with CCTV ( closed circuit television 监控录像头) watching every beach and clo

63、thes line (for Law 1 and 5) Without garlic-scanners that law (Law 4) might be a problem. The Texan law seems beyond enforcement.BackActive reading 2: DestinationActive reading 2: DestinationTalking point3. What laws would you like to introduce in your town or region? (sample answer) pets dropping in

64、 public places, putting their bags on seats in crowded places, walking slowly down the middle of crowded streets, Can you add any more strange laws?BackActive reading 2: DestinationActive reading 2: DestinationRole playWork in pairs and perform the tasks according to the following scenario.ScenarioR

65、ole A: You have a complaint to make for the broken sofa you bought a week ago. The shop agrees to refund the money in full. But you have to fill in a form with your personal information. You dont want to give them the data in detail feeling that it is invasion of your privacy and afraid that the sho

66、p will sell the information to other organizations.MoreActive reading 2: DestinationActive reading 2: DestinationRole playWork in pairs and perform the tasks according to the following scenario.ScenarioRole B: The manager (Role B) tries to persuade you to complete the form and get back the money by

67、claiming that: (1) the shop is a reputable one; (2) they wont reveal the information to any third party; (3) they would like to get to know their customer better and establish good and stable relationship, etc.Information relatedDifficult sentencesWords to noteLanguage in usePreview Active reading 2

68、: ResourcesActive reading 2: ResourcesActive reading 2: ResourcesActive reading 2: ResourcesDifficult sentences“If weve learned one thing from terrorists, not to mention action movies, its that a tool is also a weapon. Globally accepted credit cards and the databases that support them are tools for

69、taking the friction out of commerce. Thats another way of saying that theyre tools for extracting money from people with minimum effort on everyones part.” 假如说我们从恐怖分子那里假如说我们从恐怖分子那里更不用说从动作电影那里更不用说从动作电影那里学学到了一招,那就是,工具也是武器。全球通用的信用卡和支持它们的到了一招,那就是,工具也是武器。全球通用的信用卡和支持它们的数据库是去除商业摩擦的工具。数据库是去除商业摩擦的工具。换句话说,换句话

70、说,它们是以让各方最省事的它们是以让各方最省事的方式从人们那里取钱的工具。方式从人们那里取钱的工具。 “not to mention action movies”是插入语,是插入语,在译文中的位置可在译文中的位置可用破折号处理。用用破折号处理。用“换句话说换句话说”翻译出翻译出 “Thats another way of saying ”的补充含义。 TransAnalsActive reading 2: ResourcesActive reading 2: ResourcesDifficult sentences1.“ The more widely my information is kn

71、own, the greater the number of places where it may be found, and the more likely that theft will occur.” 2. “The more information is correlated to a single identifier, the more damage an instance of identity theft may cause.” The words “more” and “greater” in the first sentence are adverbs to indica

72、te that the situation gradually increases, while the words “more” in the second sentence can be regarded as determiner (限定词) meaning a greater amount of. 上述两句均属于语法中的成比例比较。该句型用于两个比较部分相互制约,而这成比例递增或递减,通常前者表示条件,后者表示结果。TransAnals Ex.MoreActive reading 2: ResourcesActive reading 2: Resources1. 我的信息流传得越广,可

73、以找到它的地方就越多,发生盗窃的可能性就越大。2. 与一个身份被盗的人相关的信息越多,身份盗窃案所造成的破坏就越大。BackActive reading 2: ResourcesActive reading 2: ResourcesComplete the sentences with proper words to form comparative:1. _ you study, _ you will learn. 你越努力学习,学到的知识就越多。2. _ he got, _ he became. 他年纪越大越沉默寡言。3. _ you get up, _ it is. 你起得越早越好。Th

74、e harder the moreThe olderthe quieterThe earlierthe betterActive reading 2: ResourcesActive reading 2: ResourcesDifficult sentencesWherever universal identification leads, we dont yet know how to manage a world in which everything can be linked to me, wherever I am. We dont know yet how to balance t

75、he undoubted convenience of this world with the perilvague, but apparently nearthat we sense in the presence of all that information combined and consolidated, if only logically. 无论通用身份的前景如何,我们尚不知道该如何应付这样一个世界:无论我身在何处,一切都可能与我有关联。一方面,这个世界给我们提供了无可置疑的种种方便;另一方面,我们又面对着所有这些强化组合的信息(如果是合理的强化组合该多好啊)所带来的种种危险。这

76、种危险虽然模糊,但显然离我们很近。TransWords to noteNew Words1.scary 2.offensive 3.tasteful 4.friction5.extract 6.perpetrate7.correlate8.identifier9.peril10. Active reading 1: ResourcesActive reading 1: ResourcesPhrases 1. go about something2. not to mention3. on file4. all the time5. balance with 6. in the presence

77、 ofActive reading 2: ResourcesActive reading 2: Resourcesscary a. Especially used for stories, films or situations in which strange or frightening things happen: 1. The following are the synonyms of scary. They have the shades (细微差异细微差异) of meaning. Put them in order of degree from least to most sca

78、ry. Synonyms of scary:terrifying spooky blood-curdling chilling scary frightening hair-raising creepy spine-chilling Ex.MoreActive reading 2: ResourcesActive reading 2: Resources他身上有着非常吓人的东西。 There is something scary about him.玛丽不喜欢看恐怖电影。Mary does not like watching a scary movieTransTransSynonyms of

79、 scary (Key):frightening terrifying scary spooky creepy chilling hair-raising spine-chilling blood-curdling2. Translate the following sentences in to English:Active reading 2: ResourcesActive reading 2: Resourcesoffensive a. Unpleasant, and likely to make people unhappy:Fill in the blanks with offen

80、sive, offence, offend:1.He has committed hundreds of _.2.The woman was terribly _ and hurt by the words.3.Your comments are _ to all women along with _ language in your book which looks like an _ weapon to human beings.Related words: offence n. offend v.offencesoffendedoffensiveoffensive offensiveAc

81、tive reading 2: ResourcesActive reading 2: Resourcestasteful a. Showing good judgment about what is attractive or suitable:Related words: taste n. tasteless a.Complete the sentences with proper words.1.Even in young age she had a _ for music. So she has a _ selection of music now. 2.He is rude with

82、the a _ joke about marriage.3.Your dress is _ though the shoes are _. Change the shoes if you go to the party this evening. tastetastefultastefultastelesstastelessActive reading 2: ResourcesActive reading 2: Resourcesfriction n. Disagreement or quarrel between people:Translate the following sentence

83、s in to English:1 这个决定有可能导致两国之间的摩擦。The decision is likely to lead to friction between the two countriesTransTrans2.她的皮肤上有绳子的擦痕。 She has burn marks from the friction of the ropes on her skin.Active reading 2: ResourcesActive reading 2: Resourcesextract v.A. To remove something from a particular place

84、;B. To get someone to tell or give you something when they do not want;C. A short piece of something taken from something such as a book or a letter.Decide which meaning is used with a proper a letter in a bracket.1. The teacher read several extracts ( ) from the novel.2. The army uses force to extr

85、act ( ) confessions (供词).3. She felt painful when the dentist extracted ( ) her tooth. ABCActive reading 2: ResourcesActive reading 2: Resourcesperpetrate v. To do something that is harmful, illegal, dishonest, morally wrong. Formal. Synonym: commit Translate the following sentences into Chinese:1.W

86、ho could have perpetrated such a dreadful crime? We are determined to catch the perpetrator.2.2. A crime has been perpetrated against the human beings. 谁能犯下如此大罪?我们决心抓住罪犯。谁能犯下如此大罪?我们决心抓住罪犯。 对人类犯下了罪行。对人类犯下了罪行。TransTransActive reading 2: ResourcesActive reading 2: Resourcescorrelate v. Two things are c

87、onnected in a way that is not caused by chance. Often followed by withcorrelation n. correlative a. Complete the sentences with proper words:1.Poverty and poor housing strongly and closely _with a shorter life expectancy (估计寿命). 2.Citizens should have both rights and their _ responsibilities.3.There

88、 is a direct/significant _ between best-known brands and best-selling brands.correlatecorrelativecorrelationActive reading 2: ResourcesActive reading 2: ResourcesIdentifier n.A person or a thing that identifies something.Related words:identification 辨认;识别;身份证明(官方文件证明) identity 身份;本体;一致identify 认出;辨别

89、出,一致(+ with)identical 完全相同,一摸一样MoreActive reading 2: ResourcesActive reading 2: ResourcesIdentifier n.Complete the sentences with the words above.Two of the suspects have been _ by the witnesses.Can you show me your _, bring some form of _, probably your _ card, please?The new number of an ID card w

90、ill be considered the unique _ in this area.This building is _ to the one next to it.The twin sisters are _ in appearance.The _ of the killer is still unknown.identifiedidentificationidentityidentifieridentificationidenticalidenticalidentityActive reading 2: ResourcesActive reading 2: Resourcesperil

91、 n.1. Check the synonyms of peril. poison _; danger _; risk _; hazard _2. Work in pairs to match the verbs and adjectives with peril by writing correct letters in the right column.verbsperilA. avoid, B. escape,C. run, D. face, E. doF. dare, G. defy, H. avert, I. makeadjectivesperilA. approaching, B.

92、 deadly,C. serious, D. grave, E. perilousA.B. D. F. B.G. HA. B. C. D.MoreActive reading 2: ResourcesActive reading 2: Resources3. Choose proper words to complete the following sentences.(1)The fire fighters often put their lives _ peril to rescue others.(2) A. in B. at C. on D. with(3)(2) Any climbe

93、r who neglects these simple precautions does so _ his/her peril. (4) A. in B. for C. at D. without(5)(3) Dont ignore warning _ your peril.(6) A. in B. beyond C. at D. withinatatActive reading 2: ResourcesActive reading 2: ResourcesPhrasesFill in the blanks with the words given below. go about someth

94、ingnot to mentionon fileall the timebalance with in the presence of(1) We will keep your details _.(2) Click on the icon to open the _. You can always save the _ into another directory. on fileVerb + _: open / close / save / create / copy / access / delete / edit /download a _. filefilefilefileMoreA

95、ctive reading 2: ResourcesActive reading 2: Resources She _ her preparations in a cold way. Thats another way of saying that she _ her work in a businesslike quiet way. How shall we _ doing our job? went aboutwent aboutgo aboutMoreFill in the blanks with the words given below. go about somethingnot

96、to mentionon fileall the timebalance with in the presence ofActive reading 2: ResourcesActive reading 2: Resources(1) The supermarket is too far to walk, _ the fact that it might be closed.(2) Pollution has a negative effect on the health of everyone, _ the damage to the environment.Not to mention i

97、s used to introduce an additional thing that makes a situation even more difficult, surprising, interesting etc. not to mentionnot to mentionMore go about somethingnot to mentionon fileall the timebalance with in the presence ofActive reading 2: ResourcesActive reading 2: Resources(1) _ of the diffi

98、cult situation, we should _ the decrease of income _ the increase of expense. (2) The president has been _ one side of political force _ another _.In the presence ofbalancewithbalancingwithall the timeFill in the blanks with the words given below. go about somethingnot to mentionon fileall the timeb

99、alance with in the presence ofActive reading 1: ResourcesActive reading 1: ResourcesLanguage in useUseful ExpressionsActive reading 1: ResourcesActive reading 1: ResourcesMoreUseful Expressions 1.1.可供随时调用可供随时调用2.2.走在街上走在街上3.3.方式令人不舒服方式令人不舒服4.4.从事某事从事某事5.5.令人恼火令人恼火6.6.在档案上在档案上7.7.日益集权化、全球化、日益集权化、全球化、

100、网络化的经济网络化的经济8.8.目前拥有目前拥有9.9.更不用说更不用说10.10.去除摩擦去除摩擦1.be readily available to 2.walk down the street3.be not tasteful in the way4.go about something5.be offensive6.be on file 7.increasingly consolidated, global, networked economy8.in current possession9.not to mention 10.take the friction out ofActive

101、 reading 1: ResourcesActive reading 1: ResourcesMoreUseful expressions 11.11.以最省事的方式以最省事的方式12.12.各方各方13.13.未经许可使用未经许可使用14.14.行骗行骗15.15.与与具有相关性具有相关性16.16.通用标识符通用标识符17.17.在在保持平衡保持平衡18.18.面对面对11.with minimum effort12.on everyones part13.unauthorized use14.perpetrate fraud15.correlated to 16.a universal

102、 identifier 17.balance with 18.in the presence ofActive reading 1: ResourcesActive reading 1: ResourcesInformation related Active reading 1: ResourcesActive reading 1: ResourcesActive reading 1: ResourcesActive reading 1: ResourcesPersonal information protectionUniversal identifierPractices for comp

103、uter securityUsing a public computer in a safe wayActive reading 2: ResourcesActive reading 2: ResourcesPersonal information protectionRead the following passage and write an essay about personal information protection in your context. Your writing should include general introduction and tips of per

104、sonal information protection. You can draw on the resources from the following passage. MoreActive reading 2: ResourcesActive reading 2: Resources Every day you share personal information about yourself with others. Its so routine that you may not even realize youre doing it. You may write a check a

105、t the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, buy a gift online, call home on your cell phone, schedule a doctors appointment, or apply for a credit card. Each transaction requires you to share personal information: your bank and credit card account numbers;

106、your income; your Social Security number (SSN); or your name, address, and phone numbers.Personal information protectionMoreActive reading 2: ResourcesActive reading 2: ResourcesPersonal information protection Its important to find out what happens to the personal information you and your children p

107、rovide to companies, marketers, and government agencies. These organizations may use your information simply to process your order; to tell you about products, services, or promotions; or to share with others. And then there are unscrupulous individuals, like identity thieves, who want your informat

108、ion to commit fraud. Identity theftthe fastest-growing white-collar crime in Americaoccurs when someone steals your personal identifying information, like your SSN, birth date, or mothers maiden name, to open new charge accounts, order merchandise, or borrow money. MoreActive reading 2: ResourcesAct

109、ive reading 2: ResourcesPersonal information protection These tips are offered to help you manage your personal information wisely, and to help minimize its misuse. Before you reveal any personally identifying information, find out how it will be used and whether it will be shared with others. Ask a

110、bout companys privacy policy: Will you have a choice about the use of your information; can you choose to have it kept confidential? Read the privacy policy on any website directed to children. Websites directed to children or that knowingly collect information from kids under 13 must post a notice

111、of their information collection practices. MoreActive reading 2: ResourcesActive reading 2: ResourcesPersonal information protection Put passwords on all your accounts, including your credit card account, and your bank and phone accounts. Avoid using easily available information like your mothers ma

112、iden name, your birth date, the last four digits of your SSN, or your phone number or obvious choices, like a series of consecutive numbers or your hometown football team. Minimize the identification information and the number of cards you carry to what youll actually need. Dont put all your identif

113、ying information in one holder in your purse, briefcase, or backpack. MoreActive reading 2: ResourcesActive reading 2: ResourcesPersonal information protectionKeep items with personal information in a safe place. When you discard receipts, copies of credit applications, insurance forms, physician st

114、atements, bank checks and statements, expired charge cards, credit offers you get in the mail, and mailing labels from magazines, tear or shred them. That will help thwart any identity thief who may pick through your trash or recycling bins to capture your personal information. MoreActive reading 2:

115、 ResourcesActive reading 2: ResourcesPersonal information protectionOrder a copy of your credit report. Make sure its accurate and includes only those activities youve authorized. Each of the nationwide consumer reporting companies Equifax, Experian, and Trans Union are required to provide you with

116、a free copy of your credit report, at your request, once every 12 months. Active reading 2: ResourcesActive reading 2: Resources Universal identifierRead the passage and answer questions with “T” for true or “F” for false: There are a number of functions that an “identifier” can perform. It can be u

117、sed as a means to establish who an individual or an organization is, a means for authentication (to provide proof that one is who one claims to be), a means for authorization (to establish that one has the right to give the instructions that that person wants to give for access to, or use of, inform

118、ation and/or resources) This passage is about the function of identifier. ( )TMoreActive reading 2: ResourcesActive reading 2: ResourcesUniversal identifierThe author suggests that identifier is secure. ( ) Clearly a universal identifier may provide great convenience to multiple organizations attemp

119、ting to assemble a broad profile of the interaction of the individual with his or her society. That convenience includes threats and opportunities for misuse. Such an aggregation of information in the hands of others is likely to be less-than-warmly received by an individual seeking privacy. FMoreAc

120、tive reading 2: ResourcesActive reading 2: ResourcesUniversal identifierThe part is about security approaches for identifier. ( ) For situations requiring increased privacy and/or security or truly unique identification of an individual, biometric factors have often been used: the babys footprint an

121、d the mothers fingerprint are recorded at the birth of the child; the photo-ID is used along with one or more numerical identifiers, for many purposes. A retina-scan is another form of unique identifier. Each of these biometric approaches provides a unique ID. TMoreActive reading 2: ResourcesActive

122、reading 2: ResourcesUniversal identifierA tradeoff is needed between a society and an individual for a universal identifier. ( ) The desirability and feasibility of using universal identifiers and/or unique identifiers clearly is determined. The characteristics of a given transaction or interaction

123、between the individual and the society will determine the values in the tradeoffs (协调) among privacy, security, and convenience. The values of the society will determine the attractiveness of one resolution of these tensions as compared to others. TActive reading 2: ResourcesActive reading 2: Resour

124、cesPractices for computer securityShould and shouldntThe following statements are things that you should do and shouldnt for computer security. Write “D” for “should” and “N” for “shouldnt”. Example is given for the first statements. MoreActive reading 2: ResourcesActive reading 2: ResourcesPractice

125、s for computer securityShould and shouldnt1. Know who you are dealing with. ( ) 2. Use security software that updates automatically. ( ) 3. Keep your Web-browser up-to-date. ( )4. Write down your pass wards in a notebook easy to access. ( ) 5. Save all the important files in computer without backing

126、 them up. ( ) D DDNMoreNActive reading 2: ResourcesActive reading 2: ResourcesPractices for computer securityRead the passage and add more suggestions for computer security: To an identity thief, your personal information can provide instant access to your financial accounts, your credit record, and

127、 other assets. If you think no one would be interested in YOUR personal information, think again. Dont reply to an email, text, or pop-up message that asks for personal or financial information, and dont click on links in the message. If you want to go to a bank or businesss website, type the web ad

128、dress into your browser yourself. MoreActive reading 2: ResourcesActive reading 2: Resources Dont respond if you get a message by email, text, pop-up or phone that asks you to call a phone number to update your account or give your personal information to access a refund. While you cant enjoy the be

129、nefits of the Internet without sharing some personal information, you can take steps to share only with organizations you know and trust. Dont give out your personal information unless you first find out how its going to be used and how it will be protected.Practices for personal securityActive read

130、ing 2: ResourcesActive reading 2: ResourcesUsing a public computer in a safe way 1. Dont save your logon information. Always log out of Web sites by clicking log out on the site. Its not enough to simply close the browser window or type in another address. Many programs (especially Web mail and inst

131、ant messenger programs) include automatic login features that will save your user name and password. Disable this option so no one can log in as you do.MoreRead the following passage and decide which tip is the most important for you.Active reading 2: ResourcesActive reading 2: ResourcesUsing a publ

132、ic computer in a safe way 2. Dont leave the computer unattended with sensitive information on the screen. If you have to leave the public computer, log out of all programs and close all windows that might display sensitive information.3. Erase your tracks. Internet explorer offers In Private browsin

133、g that leaves no trace of specific Web activity. To disable the feature that stores passwords. Before you go to the Web, turn off the Internet Explorer feature that remembers your passwords.MoreActive reading 2: ResourcesActive reading 2: ResourcesUsing a public computer in a safe way 4. Watch for o

134、ver-the-shoulder snoops. When you use a public computer, be on the look out for thieves who look over your shoulder or watch as you enter sensitive passwords to collect your information.5. Dont enter sensitive information into a public computer. These measures provide some protection against casual hackers who use a public computer after you have.Active reading 2: ResourcesActive reading 2: ResourcesPreview 1.Interview three persons to ask about their views of file-sharing.2.Make an internet search for peoples opinions of file-sharing. Active reading 2: ResourcesActive reading 2: Resources

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 高等教育 > 研究生课件

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号