




已阅读5页,还剩2页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
精选文库湖北商贸学院教案头页 年 月 日 授课日期班次教学课题:目的要求:After learning this unit, students will be able to: know about the strangest hacks in the future; be aware of the dangers of cell phone use on the road; know how to write a descriptive essay; learn to find information by scanning in reading; conduct a survey on cyber security.重点难点:1. Vocabulary: security, invasive, remote-control, vulnerability, renowned, genius, identification, malicious, remote, vulnerable, infect, access, invade, embed, clone, aware, humble, stunningly, audience, contestant, cyber, facility, automation, watch2. Structure: what引导的主语从句3. Skills: to divide and categorize information 教具: Text book, PPT, and blackboard 授课内容:(另用页)教学进程:Section 1: Lead inSection 2: Background informationSection 3: Text understandingSection 4: Study of the Text and language points Section 5: RevisionSection 6: Exercise课外作业: Exercises on Page Text comprehension and Vocabulary II&III Page Structure IV Page Translation V课堂考勤:课后分析:New Applied College English Book 2Unit 3 Public Security: Sci-fi Hacks That Are Now a Reality1. Teaching ObjectiveAfter learning this unit, students will be able to: 2. Key PointsVocabularysecurity, invasive, remote-control, vulnerability, renowned, genius, identification, malicious, remote, vulnerable, infect, access, invade, embed, clone, aware, humble, stunningly, audience, contestant, cyber, facility, automation, watchStructure what引导的主语从句Skills to divide and categorize information3. Time AllocationContentTeaching period1Lead in2Background information3Text understanding4Study of the Text and language points5Revision6Exercise7Listening 4. Teaching ProceduresPart 1. Lead In Identify the brands of anti-virus software listed on the textbook.Part 2. Introduction of the Background Information The Matrix: It is a 1999 American science fiction action movie. It depicts a dystopian future in which reality as perceived by most humans is actually a simulated reality called “the Matrix,” created by intelligent machines to control the human population, and their bodies heat and electrical activity are used as an energy source. Computer programmer Neo learns this truth and is drawn into a rebellion against the machines, which involves other people who have been freed from the “dream world.”WarGames: It is a 1983 American Cold War science fiction movie. A young computer hacker unwittingly accesses WOPR (War Operation Plan Response), a United States military supercomputer programmed to predict possible outcomes of nuclear war. He gets WOPR to run a nuclear war simulation, originally believing it to be a computer game. The simulation causes a national nuclear missile scare and nearly starts World War III.Hackers: It is a 1995 American science fiction movie. A young boy is arrested by the US Secret Service for writing a computer virus and is banned from using a computer until his 18th birthday. Years later, he and his friends discover a plot to unleash a dangerous computer virus, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.Part 3. Understanding of main ideasTask 1 Decide whether the following statements are true (T) or false (F) according to the text.( F ) 1 To remotely control your real car is fun.( T ) 2 More and more cars are equipped with computer-controlled functions and become vulnerable to hackers.( F ) 3 Hackers can kill a person by stopping an insulin pump from releasing enough doses.( F ) 4 Many people are aware that a smartphone may watch them once it is hacked.( F ) 5 There is little potential for a smart TV to get hacked and monitor people in their homes because smart TVs arent that common yet.( T ) 6 Internet-connected appliances and home automation systems can control key functions of a house remotely.( T ) 7 It can be seen in Hollywood movies that genius criminals hack high-end surveillance cameras and freeze or change the picture.( T ) 8 An employee may get his access badge cloned without noticing it.Task 2 Ask students to complete the following summary according to the text, in order to have a understanding of the main ideas of the whole text and the structure as well.SUMMARYIntroductionIn the future, hacks will be more personal and invasive. The strangest hacks are introduced below.HacksRemote-controlling a carA cars steering and brakes can be controlled through its computer. A car may be hacked over Wi-fi or with a(n) infected MP3, and unlocked and started just by texting.Cyber murderHackers can kill a person by giving the pacemaker a(n) high-voltage shock over Wi-fi.Spy phoneA phone which has been infected with malware can be turned into a(n) full-fledged “spy phone.”HacksWhen your TV watches youPeople may be monitored in their homes through the embedded web camera and microphone.Hijacking a houseWith Internet-connected appliances and home automation systems, a hacker may invade a home and hijack major systems and appliances.Spying on surveillance camerasHigh-end surveillance cameras can be hacked, letting a person freeze or change the picture.Cloning attacksA hacker may use a(n) weaponized longer range radio-frequency identification reader to copyemployees access badges.SuggestionsYour participation and awareness will make a difference in fighting against malicious hackers.Part 4. Study of the Text and language points1. something thats only possible on a Hollywood set. 此处的set 是指“(电影)场地,(戏剧)舞台”,即a stage or other place where a film or television program is made or where a play is performed。 然而,这里的a Hollywood set 可以理解成“好莱坞电影”。2.invasive: a. 侵入的,侵袭的【拓展】invade: v. 侵入,侵袭 invasion: n. 侵犯,侵略e.g. We found invasive cancer during the examination. At that time, the country was unable to resist the foreign invasion.3. the strangest hacks that show where the future is headed. 此处的head 为不及物动词,意为“朝行进”(go in a particular direction), 再如:He decided to head for home quickly.4. vulnerability: n. 脆弱性,易伤性 【拓展】vulnerable: a. 脆弱的,易受伤害的e.g. In cases of food poisoning, young children are especially vulnerable.5. how to unlock a car and start it just by texting. 此处的text 作动词,意为“发短信”(send a written message to sb. using a mobile phone)。6.And back in 2010, a fired auto center employee hacked into 100 cars in Texas, causing them to honk uncontrollably before he remotely disabled them.1) auto center: a particular place where cars are designed, made, sold or repaired 汽车中心2) hack into: 非法侵入(他人的计算机系统)e.g. He tries to hack into the companys computers.3) 该句中的现在分词结构作结果状语,画线部分的字面意思为“在使汽车失灵前,让喇叭不加控制地鸣响”,但是可灵活地译为“致使喇叭失控、车子失灵”,避免翻译腔。类似的用法再如:He made a mistake, causing us a lot of trouble.7. renowned: a. 享有声誉的,有声望的,有名的 【拓展】renown: n. 名誉,声望e.g. He won renown as a fair judge.8. high-voltage: a. 高电压的 e.g. high-voltage power lines 高压电线9.insulin pump: a medical device that is used for the administration of insulin in the treatment of diabetes mellitus 胰岛素泵10.But what many fail to realize is the awesome potential of a smartphone to watch you1) 画线部分为what 引导的主语从句,再比如:What everyone expects is an environment-friendly society.2) 此处的watch 意为“监视,监控”。11. Research into hacking smart TV sets is now taking off.此处的take off 是指“迅速流行”,即become successful or popular very quickly or suddenly。e.g. The new magazine has really taken off.12. With Internet-connected appliances starting to enter the picture and the arrival of home automation systems that can control key functions of a house remotely1) 这是一个由介词with 引导的伴随状语,with 通常可以翻译成“随着”。再如:The shadows lengthened with the sunset approaching.2) enter the picture 意为“介入,发挥作用”,其近义短语有:play a role。e.g. Things started to change when the Internet entered the picture.13. Thats now a reality with a new hack that uses a weaponized, longer range radio-frequency identification reader to copy employees access badges.1) identification: n. 辨认,确认;身份证明【拓展】identify: v. 确认;发现;说明身份 identity: n. 身份;特征e.g. Passengers were asked to identify their own suitcases before they were put on the plane. Do you have any proof of identity?2) 该句先用thats now a reality 说明“这是现实”,再用with 引出具体的事实。翻译时可以先说具体的事实“新的黑客袭击会使用一种更大范围的武器化的无线电频率身份识别器来复制员工的出入证”,再总结“这已经成为了现实”。14.All a criminal has to do is walk past you, and youve been cloned.该句画线部分是一个省略了关系代词that 的定语从句。再如:All (that) you need to do is try your best.15.confident: a. 自信的【拓展】confidence: n. 信心,自信心 gain / lose confidence: 获得/ 失去信心 take sb. into your confidence: 向某人吐露秘密e.g. After the failure, he loses confidence in his abilities. She took me into her confidence and told me about the problems she was facing.16.make a difference: 产生作用,产生影响【拓展】make no difference: 没有作用或影响 make some difference: 产生一些作用或影响 make a big / a lot of difference: 产生很大作用或影响 make any difference: 产生任何作用或影响 make all the difference: 关系重大,大不相同e.g. I dont think it makes a big difference what color it is. The rain didn
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- T/CNCA 047-2023矿用防爆步进电动机通用技术条件
- 上海交通安全试题及答案
- 酒店承包协议书范本9篇
- 服装收购合同6篇
- 技术转让和合作生产合同书2篇
- 棕榈种苗买卖合同6篇
- 培训学校安全事故处理协议书8篇
- 设计主管工作总结
- 幼儿园爱国卫生安全月专题教育
- 工业产品设计展出
- 公司外聘法人协议书
- 人力资源管理视角下岗位胜任力素质模型的构建与优化
- 2025年4月自考00041基础会计学试题及答案含评分标准
- 经济学中的时间价值试题及答案解读
- 2025年平面设计师专业能力测试卷:平面设计作品集制作与展示策略分析技巧试题
- 承包矿山运输协议书
- 员工持股协议书合同
- 2025年人保财险陕西省分公司招聘(57人)笔试参考题库附带答案详解
- 《ISO 37001-2025 反贿赂管理体系要求及使用指南》专业解读和应用培训指导材料之5:7支持(雷泽佳编制-2025A0)
- 《铁路轨道维护》课件-扣件螺栓涂油作业
- 初三班级学生中考加油家长会课件
评论
0/150
提交评论