1、Unit 4 Information Security,Learning Objectives,In this unit, you will: 1. learn about information security; 2. familiarize yourself with the words, expressions, and sentence patterns related to the theme of this unit; 3. use these words, expressions, and sentence patterns correctly; 4. research inf
2、ormation security; 5. give an oral presentation to the class about information security; 6. learn to use examples, anecdotes, and statistics in your writing.,Part I Approaching the Topic,Part II Understanding the Text,Part III Exploring the Topic,Part IV Integrated Exercises,Part V Writing Strategy,
3、Part I Approaching the Topic,Task 1 Brainstorming,Task 2 Surfing and Reporting,Task 3 Watching and Retelling,Task 4 Vocabulary Preview,1. Discuss the pictures above with your partner and make a list of no less than 10 words to discuss information security.2. What films have you seen about hackers? C
4、an you name some of them?,Task 1 Brainstorming,Unit 4 Part I Task 1,1. Work in groups and find information on the Internet about the following terms.,Task 2 Surfing and Reporting,Unit 4 Part I Task 2,Web resources http:/en.wikipedia.org http:/www.fbi.gov http:/www.gutenberg.org/wiki/Main_Page http:/
5、www.dataliberation.org/home,Answers for reference:,Unit 4 Part I Task 2,2. Find detailed information about the following hackers, then present your research to the class, optionally using PowerPoint.,Unit 4 Part I Task 2,American,Sept. 9, 1941,Creator of the C programming language; Key developer of
6、the Unix operation system,American,Aug. 11, 1950,Creator of the Apple I and Apple II computers; Co-founder of Apple.Inc.,Unit 4 Part I Task 2,Russian,Mar. 11, 1971,Fraudulently transferring US$10.7 million via Citibanks computers in 1994,British,June 8, 1955,Inventing the World Wide Web,Finnish,Dec.
7、 28, 1969,Developing the Linux kernel,Task 3 Watching and Retelling,1. Watch the video clip “The Creation of the Computer”. Fill in the blanks with the information you have heard. Use the glossary below as a reference.,Unit 4 Part I Task 3,Unit 4 Part I Task 3,Our world is increasingly filled with c
8、ountless wonders that would not have been possible without one machine, the computer. Although computers are enormously intricate, their most basic component 1) simple devices that can be 2) either one of two states: on or off. The computer creates its magic by calculating with a 3) that far surpass
9、es its human inventors. Today computers are so commonplace that wed take them 4). But not long ago, computers only exist in the imagination of a few visionaries.The search for machines that could figure quickly and accurately has 5) for,consists of,_,switched to,_,speed and accuracy,_ _,for granted,
10、_ _,seized the human imagination,_,Unit 4 Part I Task 3,thousands of years. In fact, the computers family tree has roots so deep in the past, its impossible to know exactly where they begin. By the early 19th century, the European industrial revolution was 6) , and the development in production and
11、commerce came from the maturing fields of engineering: navigation, surveying, finance, and science. The practical application of these fields 7) volume after volume of table. The actual figuring was done by people who specialized in mathematical computation. These human computers toiled over their t
12、ables incessantly, monotonously, and made mistakes. 8) . The requirement for accurate tables introduced one of the most eccentric and brilliant figures into,well underway,_,Typically, tables were full of errors,_ _,relied on,_,Unit 4 Part I Task 3,the story of computers, Charles Babbage.Charles Babb
13、age demonstrated his brilliance in mathematics 9) . In 1820, Babbage was checking the accuracy of calculations made for royal astronomical society and kept finding errors. 10) that would calculate the tables and directly print the results. He called the machine the difference engine. He drew up plan
14、s for a section of the device and had it built with his own funds in 1822.,He reasoned that a machine can be constructed,_ _,while attending Trinity College in Cambridge,_,Unit 4 Part I Task 3,【Script】,2. Watch the video again and then discuss the main idea with the group.,Script,Unit 4 Part I Task
15、3,Task 4 Vocabulary Preview,Read the words and phrases below, paying attention to the pronunciation. Use the scale below to give yourself a score for each word. After finishing the study of the unit, score yourself again to check your improvement.,Unit 4 Part I Task 4,Unit 4 Part I Task 4,Glossary f
16、or Main Reading,Unit 4 Part I Task 4,Unit 4 Part I Task 4,Glossary for Related Reading,Unit 4 Part I Task 4,Unit 4 Part I Task 4,Unit 4 Part I Task 4,Part II Understanding the Text,Main Reading,Related Reading,Part II Understanding the Text,Main Reading,Text-related Information,Text Analysis,Languag
17、e Points,Translation of the Texts,Tasks,Text-related Information,1. hacker,Unit 4 Part II Main Reading,Unit 4 Part II Main Reading,2. moveable type,Unit 4 Part II Main Reading,3. Internet neutrality,Text Analysis,Unit 4 Part II Main Reading,Unit 4 Part II Main Reading,Unit 4 Part II Main Reading,Uni
18、t 4 Part II Main Reading,Language Points,Unit 4 Part II Main Reading,1. To programmers, “hacker”, in the most literal sense, is someone who can make a computer do what he wants whether the computer wants to or not. (L3),Paraphrase:,To programmers the most original and precise meaning of the word “ha
19、cker” refers to someone who can use a computer to do what he wants even if the computer does not want to do it.,【译文】,对于程序员来说,“黑客”最精确的意义是 指能让电脑去做他想要的事情的人,无论 电脑本身愿意与否。,Unit 4 Part II Main Reading,e.g.,The literal meaning of “know your ropes” is “to know a lot about ropes”, while figuratively it means
20、“to know a lot about how to do something”. I was using the word in its literal sense.,literal a. concerned with the basic or usual meaning of a word or phrase 文字的,照字面上的,Unit 4 Part II Main Reading,2. There is a gradual continuum between rule-breaking that is merely ugly and rule-breaking that is bri
21、lliantly imaginative. (L12),Paraphrase:,Between the two extremes, i.e., the ugliest and the most imaginative rule breaking, there exist a scale of related things that change gradually without any clear dividing points.,【译文】,从丑陋地破坏规则到极富想象力地破坏规则,两者之间是一个渐进式的连续体。,Unit 4 Part II Main Reading,e.g.,The hos
22、pital has made gradual improvements in health care. I advocate a policy of gradual reform.,1) gradual a. happening slowly over a long period of time 逐渐的,逐步的,e.g.,All the organisms in an ecosystem are part of an evolutionary continuum. His motives for volunteering lie somewhere on the continuum betwe
23、en charitable and self-serving.,2) continuum plural continuums or continua n. a scale of related things on which each one is only slightly different from the one before 统一体,Unit 4 Part II Main Reading,e.g.,A museum should aim to entertain as well as educate. She entertained the children with stories
24、, songs and drama.,3. entertain (L18) vi.& vt. to hold the attention of somebody with something amusing or diverting 使有兴趣,e.g.,They like to entertain their friends at their summer home. Mark usually does the cooking when we entertain., to invite people to your home for a meal, party, etc., or to tak
25、e your companys customers somewhere to have a meal, drinks, etc. 招待,Unit 4 Part II Main Reading,e.g.,Always keep a first-aid kit handy. Sally keeps her make-up kit in her bag.,4. kit (L20) n. a set of articles or implements used for a specific purpose 成套工具,工具包,Unit 4 Part II Main Reading,e.g.,The po
26、lice believe the motive for this murder was jealousy. She denied that her offer to help was based on selfish motives. The motives behind the decision remain obscure.,5. motive (L25) n. an emotion, desire, physiological need, or similar impulse that acts as an incitement to action 动机,Unit 4 Part II M
27、ain Reading,e.g.,He took revenge on his employers by setting fire to the factory. She is seeking revenge for the murder of her husband. The murder was an act of revenge for the earlier killings.,6. revenge (25) n. the act of taking vengeance for injuries or wrongs; retaliation 复仇,报复,Unit 4 Part II M
28、ain Reading,e.g.,The scientist is distinguished in many spheres of knowledge. She is distinguished for her achievements in genetic research.,7. distinguished (L34) a. characterized by excellence or distinction 卓越的,杰出的,Unit 4 Part II Main Reading,e.g.,The book was translated into many versions and so
29、ld all over the world. The two newspapers gave different versions of what happened.,8. version (L35) n. a copy of something that has been changed so that it is slightly different 版本,Unit 4 Part II Main Reading,9. But even factoring in their annoying eccentricities, the disobedient attitude of hacker
30、s is a net win. (L37),Paraphrase:,But even if we take into account the annoying eccentricities of hackers, the pros of their disobedient attitude still outweighs the cons.,【译文】,但是即便把这种恼人的反常行为考虑进来,黑客们的叛逆态度仍然是一种净赢。,e.g.,We dont factor in additional costs such as shipping insurance, tariffs, and biling
31、ual labels. Fatigue may have factored in the fatal air crash in south America.,factor in to figure in 包括,把计算在内,Unit 4 Part II Main Reading,e.g.,Educational systems more often than not reflect the essential nature of that society. More often than not, the greater part of the journey is spent on roads
32、.,10. more often than not (L47) usually 多半,往往,Unit 4 Part II Main Reading,e.g.,John decided to go off on his own.,11. go off (L53) to leave 动身,离开,e.g.,Specialists were able to deactivate the bomb before it went off., to explode or fire 爆炸,Unit 4 Part II Main Reading,e.g.,The government imposed a ban
33、 on the sale of ivory. Parents tend to impose their own moral values on their children.,12. impose (L56) vt. to apply or make prevail by authority 强制实行,Unit 4 Part II Main Reading,e.g.,By definition, interplanetary travel is travel between bodies in a given star system. By definition, data mining is
34、 defined as mining the useful information from plenty of data.,13. by definition (L67) because of its own features 根据定义,就定义来看,Unit 4 Part II Main Reading,e.g.,By definition, interplanetary travel is travel between bodies in a given star system. By definition, data mining is defined as mining the use
35、ful information from plenty of data.,14. harsh (L69) a. extremely severe or stern 严厉的,Unit 4 Part II Main Reading,15. If I were a legislator, I would be interested in this mysteryfor the same reason that, if I were a farmer and suddenly heard a lot of squawking coming from my henhouse one night, I w
36、ould want to go out and investigate. (L71),Paraphrase:,If I were a farmer and suddenly heard a lot of sharp angry noise coming from my henhouse one night, I would want to go out and check out the cause. Similarly, if I were a law-maker, I would be interested in the mysterious phenomenon that hackers
37、 unanimously protest against copyright laws.,【译文】,如果我是立法者,我会对这个谜团感兴趣,正如假设我是农民,某个晚上突然听到鸡棚里传来一阵咯咯的叫声,我一定会想出去看看。,Unit 4 Part II Main Reading,16. Could it be that such laws, though intended to protect America, will actually harm it? (L78),Paraphrase:,There might be a slight possibility that although suc
38、h laws are aimed to protect America, will turn out to do harm to it.,【译文】,有没有可能这些法律,尽管其本意是为了保护美国,实际上却反而伤害了它呢?,e.g.,I intended to catch the early train, but I didnt get up in time. I never intended things to turn out the way they did.,intend a. to have as a plan or purpose 打算,想要,Translation of the Te
39、xts,For Main Reading,Unit 4 Part II Main Reading,Task 1 Guessing Meaning from Context,Guess the meaning of the following words and phrases from context. The letter in the parentheses refers to the paragraph in which the word can be found. Choose which meaning best fits the word.,Task,Unit 4 Part II
40、Main Reading,a,_,c,_,e,_,Unit 4 Part II Main Reading,b,d,_,_,f,_,Unit 4 Part II Main Reading,c,_,d,_,f,_,e,_,a,_,b,_,Unit 4 Part II Main Reading,d,a,e,c,_,_,_,_,b,_,Unit 4 Part II Main Reading,e,a,d,b,c,_,_,_,_,_,Answer the following questions. 1) What does a hacker do?2) How are the two senses of “
41、hack” connected?,Task 2 Understanding Main Ideas and Important Details in the Text,Task,A hacker usually breaks into other peoples computers and makes a computer do what he wants whether the computer wants to or not.,The two senses of “hack”, whether it is a compliment or an offence, have something
42、in common: they both break the rules.,Unit 4 Part II Main Reading,_ _ _,_ _ _,3) Do the police understand hackers behavior? Why or why not?4) Who contributes to the development of the next generation of computer technology?,No, they dont. It is because the motive of hackers intellectual curiosityis
43、totally different from the usual criminal motives.,Outsiders, including hackers, make great contributions to the development of the next generation of computer technology.,_ _ _,_ _ _,Unit 4 Part II Main Reading,5) Why do programmers oppose laws to protect intellectual property?6) What does the last
44、 sentence “In those countries, people color inside the lines” mean?,It is because they will strangle the innovative and creative spirit of Americans and eventually will do harm to the whole nation.,It means peoples behavior and thinking pattern are confined to rules in those countries.,_ _ _,_ _,Uni
45、t 4 Part II Main Reading,2. Review the text to find information about the pros and cons of hacking. List them in the table below.,Unit 4 Part II Main Reading,someone who can make a computer do what he wants whether the computer wants to or not,used when you do something so clever that you somehow be
46、at the system,someone who breaks into computers,used when you do something in an ugly way,Unit 4 Part II Main Reading,annoying those in authority,protect intellectual property,making them good programmers,a threat to intellectual freedom that hackers need to do their job,Part II Understanding the Text,Related Reading,Language Points,Tasks,Translation of the Texts,Language Points,Unit 4 Part II Related Reading,e.g.,The company needs to update its archaic computer systems. In practice the rules were as unrealistic as they were archaic.,