Presentation is loading. Please wait.

Presentation is loading. Please wait.

Company LOGO Experiencing English 2. Company LOGO Unit 8 Computers And Security.

Similar presentations


Presentation on theme: "Company LOGO Experiencing English 2. Company LOGO Unit 8 Computers And Security."— Presentation transcript:

1 Company LOGO Experiencing English 2

2 Company LOGO Unit 8 Computers And Security

3 Company LOGO Unit 8 Computers and Security In this unit, you will first listen, and then talk about computers and security ; read about computer viruses and the damage they may inflict ; learn new words and expressions; write about what should be done to protect against computer viruses ; practice the use of omission and emphasis ; write an Internet notice check goals; visit Culture Salon for an introduction to milestones in computer history

4 Company LOGO Listen Unit 8 Computers and Security Talkand Part I

5 Directions: Listen to the following passage and fill in the missing words in the blanks. Have you ever listed everything the computer does to enhance modern life? From finding research to doing research, from ________ use to home use, from ________ with friends and family to searching for a job, computers simplify our lives and allow us to learn and ________ things with the click of a mouse. The Internet is like a highway system, moving bits of information across telephone lines and cables with such speed that when we ________ the web address or search for websites, within seconds the information appears on the computer screen. The ________ of the computer and the Internet has revolutionized how we live and work. How did we ever ________ without computers?

6 Directions: Listen to the following passage and fill in the missing words in the blanks.  There is ________ in all things and the computer is not an exception. While it provides us with many good things at our fingertips, there are those who ________ programs that infect the computer with "viruses" which destroy its ________ and frustrate the computer owner. Anti-virus programs, however, are ________ to combat the problem. Cybercrime is also rising as Internet privacy is violated in a variety of ways, creating the need for better Internet security systems to be developed.

7 Company LOGO Unit 8 Computers and Security Directions: Listen to the following paragraphs and decide which picture is described in detail.

8 Unit 8 Computers and Security Unit 8 Computers and Security The photos are all related to Computers and Security. Describe them to your classmates with the help of the following question.  What are the basic skills you need to be effective in using computers ?  How do you think the Internet can help in our modern life? Explain.  How can you avoid being a victim of cybercrime?

9 Communicative tasks (1) Topic: Talking about computers and security Roles: Brian and Pei Situation: Brian likes to download funny game software from the Internet, but he doesn't feel it's very funny now because his computer crashes frequently these days. He poured out his worries to Pei who advised him to install anti-virus software. Tips: Suggested expressions and sentences for talking about computers and security  download unlicensed / unauthorized / unsupported software  cause conflicts with existing software  install firewall / anti-virus software on one's computer  hacker  restart one's computer  Can you help me out here?  My computer is acting very strange / won't start.  My laptop does not work properly / crashes a lot these days.

10 Topic: Talking about computers and security Roles: Victor and Lingling Situation: Victor was excited to get an email from a "Lucy" with the subject "I Love You", but his excitement vanished too quickly with a click on the attached file. It was the Love Bug virus. Lingling suggested that he never open an attachment unless he's been told to expect it and always keep the anti-virus system active. Tips: Suggested expressions and sentences for talking about computers and security  be infected by viruses transmitted via email attachments  click on the attached file  spread the virus / bug  delete the message  empty the Recycle Bin  mess up the computer  run some anti-virus software on one's computer  clean off the virus  Is there any message in the email?  Viruses come in email with an attached file. Communicative tasks (2)

11 Company LOGO Read Unit 8 Computers and Security Exploreand Part II

12 Passage A You Are the Weakest Link, Goodbye Unit 8 Computers and Security Passage B So Sorry to Bug You

13 You Are the Weakest Link, Goodbye Passage A You Are the Weakest Link, Goodbye

14 Think about it  Do you often download free software from the Internet? Explain.  Have you installed anti-virus software on your computer? What is it?  Is it possible for us to find a way to get rid of computer viruses permanently?  How do computer viruses spread? How should companies and other organizations as well as home users protect themselves against computer viruses?

15 Passage A Preview Check

16 1. Who so employees turn to for help when their computers are affected by a virus? They turn to their IT staff in their company.

17 2. What are the several malicious computer viruses mentioned in the passage? Viruses such as Melissa, the Love Bug, etc.

18 3. Are employees always alert to computer viruses? Explain. No, they aren’t. They forget about the harm a computer virus may bring when that virus is off news headlines.

19 4. What are the cases when employees might put their company at risk? They open unsolicited attachments and download unauthorized software.

20 5. Do you agree with author that the human factor is the most important to protect a company against virus attack? Explain. Open.

21 Text Framework  Part I: (1-3): The problem of computer viruses and the application of anti-software.  Part II (4-7) : Even with the guarantee of anti-virus software, computer security is a myth.  Part III (8-10) : The human reasons for the spread of computer viruses.  Part IV (11-12) : The solution to the problem of computer viruses: education of the employees to make them practice safe computing.

22 You Are the Weakest Link, Goodbye 1. Do you remember the good old days? Innocent times spent sharing documents and executable files without a care in the world. Okay, every month or so you might encounter a boot sector virus — but they were easy to deal with even if the anti-virus software didn't pick them up. Innocent

23 2. But those long lazy summers disappeared too fast. Macro Viruses made Information Technology (IT) administrators grow up fast as they realized there was a type of virus which could spread very quickly throughout an organization. It wasn't unusual to find hundreds of computers within personal company infected by viruses transmitted via email attachments. The IT staff were amongst the fittest departments in your company, running from Personal Computer (PC) to the next cleaning them up.Macro Viruses infectefit You Are the Weakest Link, Goodbye

24 3. There had to be a better way. Companies now realize that viruses aren't "urban myths", and can have a serious impact on their operations. They invest in anti-virus software on the desktops, servers and email gateways and even put in place procedures to ensure their anti- virus is up-to-date with the very latest detection routines.emailis up-to-date with 4. It sounds like companies have put in place adequate defenses to protect against viruses. But have they? You Are the Weakest Link, Goodbye

25 5. Anti-virus software detects most of the viruses your users are likely to encounter — often without the user even knowing. However, the software must be updated regularly, preferably daily in any large company. Even then, a very new virus can infect your users. With the rapid transmission of files through networks and the Internet, a virus can spread a considerable distance before it can be identified and protected against. Fortunately, only a few viruses ever do this but the likes of Melissa and the love bug can inflict serious damage before their progress is stopped. Whilst employees become suddenly aware during the ensuing media excitement, they soon forget about the virus threat as the stories disappear from the news headlines. InternetconsiderableMelissathe love bug Whilst employees become suddenly aware during the ensuing media excitement, they soon forget about the virus threat as the stories disappear from the news headlines. You Are the Weakest Link, Goodbye

26 6. This is the danger. Complacency can set in when there is no perceived "action" on the virus front with no global crisis, and the importance of being vigilant about viruses recedes in your users' minds. They forget what the big deal was in the first place — after all, the anti-virus software deals with the viruses, doesn't it? And isn't it the IT department's job to look after this sort of thing?Complacencyperceived "action" on the virus front You Are the Weakest Link, Goodbye

27 7. Before you know it your users are opening unsolicited attachments once more, downloading unauthorized software, and putting your company's data and credibility at risk. All because the users think that they are working in a safe environment. Employees see anti- virus software, firewalls and IT departments as guarantees that their computers will work and will be safe. Of course, there aren't any guarantees. Anti-virus software plays one, (albeit important), part in the defense of your company from malicious attack but the security of your computer system is only as strong as the weakest link. And that, more often than not, is the human factor.solicit, (albeit important), the security of your computer system is only as strong as the weakest link. And that, more often than not, is the human factor. You Are the Weakest Link, Goodbye

28 8. No employer wants to come across as a killjoy or an ogre. Most will willingly accept that the happiest employees are those who feel that they are respected and trusted by their employer. Many companies accept that employees will send and receive a certain amount of personal email and make the odd personal telephone call.come across 9. However, the worry comes when employees start risking company security in pursuit of personal amusement. Funny screensavers and games downloaded from the Internet can seem harmless enough but they could easily be harboring a dangerous virus.harbor You Are the Weakest Link, Goodbye

29 10. Software downloaded from the net is often unlicensed and unsupported, and may cause conflicts with existing software in use at your company. Unlicensed, pirated software is an ideal vector for a computer virus. Virus writers and hackers often use such software as the ideal "kick-start" for their virus distribution.pirate You Are the Weakest Link, Goodbye

30 11. It is vitally important that employees (should) be educated about the virus threat but this cannot be an one-off event. The potential threat should always be in the back of an employee's mind and precautionary measures should be taken as a matter of course. There is no harm in reminding people about what could happen if they let their guard down. In the end, education is the key to a virus-free environment and this is a continual process. It may not be the most exciting thing on the agenda but it works.agenda You Are the Weakest Link, Goodbye

31 12. The lesson is simple. You can have the best software in the world protecting your company's defenses; you can even be the biggest IT company in the world; but without your users practicing safe computing they will always be the weakest link. You Are the Weakest Link, Goodbye

32 Summary The weakest link in the protection of a company’s computers against viruses is the individual computer user. There is a strong tendency that the employees assure it is the company’s computer security experts’ job to worry about the viruses and they can bring the problem under control. But everyone must do their share to prevent viruses. Any unsolicited email attachment or any untested type of software may contain a virus. Even the best antivirus software is not always effective and must be frequently updated. Constant education of all employees about viruses is the key to virus prevention. No one should ever be allowed to relax their defenses, even if this means the company must have some rules set that employees might not like.

33 The Internet The Internet is a computer network made up of thousands of networks worldwide. An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.

34 Email Electronic Mail (email) is the most frequently used application of the Internet. Many people who have access to the Internet at school, home, and work, use the Internet for no other purpose than to send and receive email. Email allows computer users locally and worldwide to exchange messages. Each user of email has a mailbox address to which messages are sent. Messages sent through email can arrive within a matter of seconds.

35 Computer Virus A computer virus is a program that invades your computer system, hides there, and makes copies of itself. Viruses spread when you launch an infected application or start up your computer from a disk that has infected system files. All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt

36 Macro Viruses Macro viruses are computer viruses that use an application's own macro programming language to distribute themselves. These macros have the potential to inflict damage to the document or to other computer software. The infecting files can be modified or deleted and may not be recoverable.

37 Melissa Melissa affects Word documents. If launched, the macro virus will attempt to start Microsoft Outlook to send copies of the infected document via email to up to 50 people in Outlook’s address book as an attachment.

38 The Love Bug The Love Bug virus is also called the Love-letter Virus, or simply I Love You.nThe virus is circulating through email and affecting many customers. If run, the virus could overwrite.jpg,.mp3, and other file types, and attempt to send a copy of itself to everyone in the recipient's address book. The e-mail containing the virus typically carries a subject line of "ILOVEYOU". Inside the mail is a short message saying "Kindly check the attached LOVELETTER coming from me" and an attachment named LOVE- LETTER-FOR-YOU.txt.vbs.

39 Innocent adj. 1. Uncorrupted by evil, malice, or wrongdoing; sinless: eg. an innocent child. 2. Not guilty of a specific crime or offense; legally blameless: eg. Mr. Smith is innocent of all charges. 3. Within, allowed by, or sanctioned by the law; lawful. 4. Not dangerous or harmful; innocuous:

40 infect v. 1. To contaminate with a pathogenic microorganism or agent. 传染:通过致病的微生物或媒介来传染 3. To invade and produce infection in. 感染:侵入并发生感染 4. To contaminate or corrupt: eg. envy that infected their thoughts; a society that was infected by racism. 5. To affect in a contagious way: 使受影响:以感染的方式来影响: eg. “His fear infected me, and... I followed as fast as I could”

41 1. Suited, adapted, or acceptable for a given circumstance or purpose: eg. It’s not a fit time for flippancy. 2. Appropriate; proper: eg. Do as you see fit./ 你认为怎么合适就怎么做. 3. Physically sound; healthy: fit adj.

42 Up to date The newest, the latest, the most recent Be up-to-date with sth.: the equipped with the latest achievements of sth.

43 Considerable adj. 1. Large in amount, extent, or degree:  a writer of considerable influence. 2. Worthy of consideration; significant:  The economy was a considerable issue in the campaign. 3. n.Informal  A considerable amount, extent, or degree.

44 Whilst employees become suddenly aware during the ensuing media excitement, they soon forget about the virus threat as the stories disappear from the news headlines. 当媒体轰动,争相报道时,员工会 突然警觉起来,而一旦新闻头条不再 报道这些事件,他们就会很快将其抛 之脑后。

45 Complacency n. 1. A feeling of contentment or self-satisfaction, especially when coupled with an unawareness of danger or trouble. 自满 : 一种满足或自满,尤指未意识到危险或麻烦时 2. An instance of contented self-satisfaction. 自鸣得意:一种得意的自我满足

46 Complacency can set in when there is no perceived "action" on the virus front with no global crisis, and the importance of being vigilant about viruses recedes in your users' minds. 若病毒战线没有能察觉到的 “ 大动作 ” ,也 没有全球性的危机,人们就会变得洋洋自得, 对病毒保持警惕的重要性的意识就会在用户 的脑子中渐渐淡化。 ( 并列复合句 )

47 Solicit v. 1. To seek to obtain by persuasion, entreaty, or formal application:  a candidate who solicited votes among the factory workers. 2. To petition persistently; importune:  solicited the neighbors for donations. 3. To entice or incite to evil or illegal action. / 教唆 4. To approach or accost (a person) with an offer of sexual services. 勾引 5. v.intr. (不及物动词) To make solicitation or petition for s

48 Albeit conj. Even though; although; notwithstanding:  clear albeit cold weather. 虽然天冷但仍很晴朗 The phrase “ albeit important ” in the text functions as an insertion in the sentence, which means “ though important ” and will not hazard the grammatical correctness of the sentence when canceled.

49 the security of your computer system is only as strong as the weakest link. And that, more often than not, is the human factor. 在保护公司不受恶意攻击的战斗中,只能 起到一定的作用。公司的计算机系统安全 与否实际上系于最薄弱的一个环节。 而这个环节往往就是人的因素。

50 Come across v phr. 1. To meet or find by chance:  came across my old college roommate in town today. 2. Slang 3. To do what is wanted. 4. To pay over money that is demanded:  came across with the check. / 开支票支付 5. To give an impression:  “He comes across as a very sincere, religious individual”.

51 Harbor v. 1. To give shelter to: / 窝藏:  harbor refugees; harbor a fugitive. / 收留难民;窝藏 逃犯 2. To provide a place, home, or habitat for:  a basement that harbors a maze of pipes; streams that harbor trout and bass. 3. To entertain or nourish (a specified thought or feeling): / 持有或抱有(某种特殊的思想或感情)  harbor a grudge.

52 Pirate v. 1. To attack and rob (a ship at sea). / 抢劫(海上船只) 2. To take (something) by piracy. / 剽窃,盗用:通过剽 窃途径获得 3. To make use of or reproduce (another's work) without authorization. / 非法翻印,非法仿制:未经授 权而使用或复制他人(作品) 4. v.intr. (不及物动词)  To act as a pirate; practice piracy.

53 Agenda n. 【复数】 agendas A list or program of things to be done or considered: / 议事日程:给待做或待议诸事项所列的目录清单 或

54 Languag e Focus

55 Keys to exercise 4 1. adequate 2. vitally 3. document 4. distribution 5 urban 6. potential 7. continual 8. infecting 9. threat 10. undated

56 Keys to exercise 5 1. let down 2 came across as 3. in the back of … mind 4. as a matter of course 5. cleaning up

57 Exercise 6: Translate the following sentences into English. 1. 为了追求正健康的饮食,人们现在比过去吃 愈多。 (in pursuit of) In pursuit of a healthier diet, people are eating more fish than they used to.

58 Exercise 6: Translate the following sentences into English. 2. 我们需要在坏天气到来之前叫人把屋顶修一 修。 (set in) We need to have the roof repaired before the bad whether sets in.

59 Exercise 6: Translate the following sentences into English. 3. 这种疾病正在蔓延,所以儿童都有被传染 的危险。 (at risk) The diseases are spreading, and all young children are at risk.

60 Exercise 6: Translate the following sentences into English. 4. 信息通过电话线从一台电脑传到另一台电 脑。 (transmit) The information is transmitted from one computer to another through a telephone line.

61 Exercise 6: Translate the following sentences into English. 5. 杰克是个相当好的赛跑运动员。他在大多 数情况下都能获胜。 (more often than not) Jack is a fairly good runner. He wins more often than not.

62 Write about it Directions: Write a paragraph of around 80 words explaining that companies should do more than invest in anti-virus software to protect against computer viruses. The following points may help you to organize your writing. And the first sentence has been written for you.

63 Write about it Points for your reference: 1) It is true that anti-virus software may protect against viruses. 2) Employees may use office computers for personal amusement. 3) Education of the employees is the key. The first sentence of your passage: To protect against computer viruses, companies should do more than invest in anti-virus software on the desktops, servers and email gateways.

64 Passage B Sorry to Bug you

65 Think about it  How often do you email your friends?  How would you solve the problem if your computer is inflicted by viruses?  What would you do if you accidentally spread a virus?

66 Passage B Preview Check

67 1. What happened to the author when he clicked Work Offline? He found 65 infected messages ready to be sent.

68 2. What did the author do when he knew that his computer was attacked by a virus? He deleted the message and emptied the Recycle Bin. Then he went to the Web for help.

69 3. What is the worst part of the Homepage virus? It can mail itself to others in one’s Address Book.

70 4. What is the author’s advice to those who get an email message with an attachment? Never open it, unless they are told to expect it.

71 5. What are the effective ways to protect your computer from being attacked by viruses? Open.

72 Text Framework Part I: (1-2): I had unleashed a computer virus unconsciously on my home computer. Part II (3-6) : Despite my quick and great efforts, the virus automatically forwarded itself to all the addresses in my address book. Part III (70) : A lesson : Never open an attachment, even from a friend, unless you’ve been told to expect it. And always use virus protection.

73 Sorry to Bug You You’d think after all these years I’d know better than to spread a virus by email. You’d be wrong. 1. The email was from a woman I knew decades ago, back when we were spooning teenagers. We had corresponded electronically maybe three times since then, I swear. The subject line on this latest missive was “Homepage.” The message read, simply: “Hi! You’ve got to see this page! It’s really cool.” It was signed with a goofy emotion, a winking, sideways smiling face. “Ho, ho! You sly thing!” I thought, recalling the feverish summer of ’70... and clicked on the attached file. Pause. Uh-oh.correspondmissive

74 Sorry to Bug You 2. It was the dumbest thing I’d done since 1979, when I pitched a tent on a colony of army ants in Mexico. My screen started shimmering like a Yucatan sunset. I had unleashed a computer virus.a colony of Mexicoshimmer Yucatan

75 Sorry to Bug You 3. I felt like the doctor in The Andromeda Strain; the clock was outracing me. I went to my email program, clicked on File, then selected Work Offline. That, I assumed, would cordon me off from the Net and keep me from spreading the bug while I figured out how to get rid of it. Next I checked my Outbox. Argh! Sixty-five messages were queued up, waiting to be sent to my friends. Each was from me. Each bore the subject line “Homepage.” Each had a file attached, as doom- laden as a warhead.The Andromeda Straincordon laden

76 Sorry to Bug You 4. I deleted the messages and emptied the Recycle Bin. Then I went to the Web for guidance. Cursing myself for not using an anti-virus program on my home computer, I learned that the Homepage virus is the most common bug — technically, it’s a “worm” — out there. It afflicts only PC users of Microsoft Outlook and would not damage my computer. But it would immediately mail itself to everyone in my address book — that is, everyone to whom I’ve ever sent a Reply message. The worm also resets your browser’s home page to one of four porn sites. The This last bit had not happened to mine. Was I spared?Homepage virusafflict

77 Sorry to Bug You 5. Gingerly, I fired up Outlook and connected to the Net. Fifty messages poured into my Inbox. Most were from corporate servers — such as Time Inc.’s — informing me that my email was being returned unopened since it contained a virus. The last message was from my friend Marshall: “If you don’t mind my asking, which homepage?” Double argh! I had spread the accursed worm. I wrote a mea culpa warning, which I mailed to everyone in my address book: Don’t click on that attachment! Gingerlyaccursed

78 Sorry to Bug You 6. The worst part was that many of the people I had emailed were newbies — subscribers who had emailed me for help in connection with this column. Most of these folks were kind; only one asked me to remove her name from my address book. A guy from the Philippines, birthplace of the dread Love Bug virus, wrote, “It is quite ironic that I got a worm from you.” the Philippines

79 Sorry to Bug You 7. Let that irony be a lesson to you: Never open an attachment, even from a friend, unless you’ve been told to expect it. And always use virus protection. Finally, if you get an email from me whose subject is “Homepage,” run.

80 Summary The author, who writes an online computer column and ought to know better, had is personal computer attacked by a virus when he opened an attachment from a former girlfriend without using virus protection. The computer automatically forwarded the attachment to all the addresses in the author’s address book. He quickly stopped 65 infected messages from being sent, but soon received 50 replies from other people stating that the attachment to his message contained a virus. Then he wrote to everyone in his address book apologizing and warning them of the virus. Fortunately most of them forgave him. Only one subscriber to his column asked to be deleted from its mailing list. The lesson of this story is to use virus protection and ignore unexpected and attacked.

81 Josh Quittner (author) A graduate of Grinnell College and the Columbia School of Journalism, Josh Quittner is managing editor of ON magazine (formerly TIME Digital) a monthly guide to personal technology. He is responsible for the editorial direction of the magazine, development of stories and the expansion of its web site, onmagazine.com. Quittner was named one of top 20 most influential technology journalists two years in a row by ADWEEK's Technology Marketing magazine.

82 Mexico Mexico is the largest Spanish- speaking country and the second-largest Roman Catholic nation in the world. Mexico City, the capital, is one of the world's fastest-growing metropolitan areas with an estimated population of 18 million.

83 Yucatan, Mexico The Yucatan peninsula has been the home of the Maya for at least 4,000 years. Breathtaking sculpture and mural-covered pyramids stand witness to the magnificent civilization, which formerly existed here. Today, thatch-covered houses and hand- embroidered costumes of villagers are vivid reminders that the Maya are still very much alive.

84 Andromeda Strain Andromeda Strain is a movie which combines a classic science- fiction theme (disaster virus) with a contemporary distrust of political affairs. The concept is simple: "A top-secret government team investigating rare diseases, some so bizarre they seem to come from outer space." It was directed by Robert Wise and adapted from novel by Michael Crichton

85 The Homepage Virus VBSWG.X, also known as Homepage, is an e-mail worm found on May 9th, 2001. Homepage worm spreads using Outlook Application. It sends messages with the content as shown in the picture right: When the attached file is executed, the worm will send (mass mail) itself to each recipient in every address book. Then the worm tries to hide the mass mailing. It deletes all messages from Inbox and Deleted Items folders which contain a subject 'Homepage'.

86 The Philippines The Philippines is an independent island nation in the western Pacific Ocean some 800 km off the coast of mainland Southeast Asia. Over centuries foreign elements have been added to the native Malay culture, creating a culture that reflects both Eastern and Western influences.

87 Correspond v. 1. To be in agreement, harmony, or conformity. / 一致:一致、和谐或相配 Correspond to sth. 2.To communicate by letter, usually over a period of time. / 交流:通过信件交流、通常 在一段时期内

88 a colony of : a group of A written message; a letter missive n. colony n. Ecology A group of the same kind of animals, plants, or one-celled organisms living or growing together. / 【生态学】 群体:一群 生活或生长在一起的同种动物、植物或单 细胞有机体

89 Shimmer v. To shine with a subdued, flickering light.See Synonyms at flash. / 闪闪发光:以柔和、闪 烁的光线发光

90 cordon v. n. A line of people, military posts, or ships stationed around an area to enclose or guard it. / 封锁线:驻扎于一个地区周围包 围或保卫它的一列人、军事岗位或船只 v. To form a cordon around (an area) so as to prevent movement in or out: / 封锁:在某 一地区周围形成封锁线以阻止出入:  Troops cordoned off the riot zone.

91 Laden adj. ( pp. of “lade”) 1. Weighed down with a load; heavy: / 承受 重负的:  The warmish air, laden with the rains of those thousands of miles of western sea. / 暖暖的空气 充满着几千里外西方海洋的雨水。 2. Oppressed; burdened: / 受压迫的;沉重的:  laden with grief. / 满怀忧伤

92 afflict v. torture: To inflict grievous physical or mental suffering on. / 折磨:予以 … 剧烈 的肉体或心理打击

93 gingerly adv. With great care or delicacy; cautiously. / 小心谨慎的:非常小心谨慎地;小心翼翼 地 adj. Cautious; careful. / 谨慎的;小心的

94 accursed adj. 1. Abominable; hateful: / 可恶的;可厌的:  This accursed mud. / 可恶的泥浆 2. Being under a curse; doomed. / 受诅咒的; 注定完蛋的

95 Languag e Focus

96 Keys to exercise 12 1. colonies 2. technologically 3. cursed 4. corresponding 5 folks 6. dread 7. swear 8. Were spared 9. protection 10. dumb

97 Keys to exercise 13 1. was cordoned off 2 fired up 3. queued up 4. get rid of 5. poured into

98 Exercise 14: Translate the following sentences into English. 1. 如果你删掉 50 个字,我们就可以把整个故事 排一夜之上。 (delete) If you delete 50 words, we can put the whole story on one page.

99 Exercise 14 : Translate the following sentences into English. 2. 有那位著名拳击手亲笔签名 (signature) 的拳 击手套正在展出。 (bear) On display were boxing gloves which bore the famous boxer’s signature.

100 Exercise 14 : Translate the following sentences into English. 3. 我们想不通他怎么会干出那样的傻事。 (figure out, dumb) We can’t figure out why he did such a dumb thing.

101 Exercise 14 : Translate the following sentences into English. 4. 约翰逊一家对我很好,使我感到就像他们 家的一员。 (feel like) The Johnson's were very kind to me. They made me feel like one of the family.

102 Exercise 14 : Translate the following sentences into English. 5. 他们说,像就合同的细节和你谈谈。。 (in connection with) They say they want to talk to you in connection with the details of the contract.

103 General Writing Omission and Emphasis An important aid to economy in writing English is the elliptical clause. In many cases, it is possible to leave out a relative pronoun that normally would join a dependent clause to an independent clause. Sometimes a dependent clause contains neither subject nor verb. It is known as an elliptical clause. Examples: The movie I wanted to see was not playing. (which or that unexpressed) When in Barcelona, try to find a quiet hotel room. (When you are in Barcelona)

104 General Writing Omission and Emphasis Another kind of elliptical construction occurs most commonly after the words "than" and "as". Examples: The chairman spoke longer than he. (spoke is not repeated) Are you as old as she? (is is omitted)

105 Practical Writing: Internet Notice An internet notice is written to inform the public of the affairs concerning computer use and the Internet communication. The place for the notice to be put is called Internet Notice Board.

106 A model notice:

107 --- VIRUS ADVISORY --- — W32/MyLife.b@MM —W32/MyLife.b@MM McAfee.com has seen a large and growing number of computers infected with W32/MyLife.b@MM. This is a MEDIUM RISK virus. As always, we recommend that you keep your anti-virus software up-to-date for the best protection. McAfee.com will continue to update you on the latest details of the W32/MyLife.b@MM virus, click here. Sincerely, McAfee.com Note: McAfee is an anti-virus company in the U.S (http://dispatch.mcafee.com/dispatches/mylife/)

108 Task Directions: Choose one of the following topics and write an Internet notice. 1. Finding of a serious virus 2. Change of one's email address 3. Establishment of a website

109 Culture Salon Milestones in Computer History 1992-2001 1992 Microsoft releases Windows 3.1, the latest version of its Windows operating system. Windows 3.1 offers improvements such as True Type fonts, multimedia capability, and object linking and embedding (OLE). In two months, 3,000,000 copies of Windows 3.1 are sold. 1993Marc Andreessen creates a graphical Web browser called Mosaic. This success leads to the organization of Netscape Communications Corporation. 1994Jim Clark and Marc Andreessen found Netscape and launch Netscape Navigator 1.0, a browser for the World Wide Web. 1995Microsoft releases Windows 95 which consists of more than 10,000,000 lines of computer instructions developed by 300 person-years of effort. 1996An innovative technology called webtv combines television and the Internet by providing viewers with tools to navigate the Web. 1997Microsoft releases Internet Explorer 4.0 and seizes a key place in the Internet arena. This new Web browser is greeted with tremendous customer demand. 1998Apple Computer introduces the iMac, the latest version of its popular Macintosh computer. The iMac abandons such conventional features as a floppy disk drive but wins customers with its futuristic design, see-through case, and easy setup. 1999Microsoft introduces Office 2000, offering new tool for users to create content and save it directly to a Web site.

110 Company LOGO Thank You!


Download ppt "Company LOGO Experiencing English 2. Company LOGO Unit 8 Computers And Security."

Similar presentations


Ads by Google