高三年级 英语 Word study & reading, M10U4 授课者: 王时亮 湖南邵阳县第七中学

Slides:



Advertisements
Similar presentations
Unit 4 Law and order Word power. Words related to law 1. a dishonest, violent, or immoral action that can be punished by law. Last night a woman was.
Advertisements

Criminal Activity.
Copyright 2010, The World Bank Group. All Rights Reserved. Police Statistics, Crime, Criminals and Resources Part 1 Crime, Justice & Security Statistics.
Any act that is labeled such by those in authority, prohibited by law
 Chapter 10 Faceoff (Young Offender or Adult)  Folder time  Folders being Checked Tomorrow.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Key to the Exercises  Pre-class Work II  the crime problem; serious; crimes; criminals; ine third of; 41 million; 36 to 40 million  soft; crimes and.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
The Nature of Crime Page 159.
THE LAW 8 Rights of a citizen accused of a crime: 1.Protection from ____________________(person can only be re-tried in case of a hung jury) 2.Right to.
Judicial Branch Powers ___________ laws –Do laws fit within U.S. Constitution guidelines Conduct __________ Protect the ________ of citizens brought before.
Data Protection Act. Lesson Objectives To understand the data protection act.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Possible WebQuest type links  
What have you known about cybercrime? What do you want to know about cybercrime?
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
TOGOLESE CONSUMERS ASSOCIATION (ATC ) Fifth Annual African Consumer Protection Dialogue Conference (Zambie september 2013) “ Moving Cross Border.
Chapter 16.2 Criminal Cases.
Criminal Law Business Law Mr. DelPriore. What is a crime? Punishable offense against society We identify, arrest, prosecute, punish To protect us! Crimes.
Areas of Law. Getting Started Definitions Using the internet find a definition for the following:  Civil Law  Codification  Common law  Concurrent.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
7 th Grade Civics Miss Smith *pgs  Crime- any act that breaks the law and for which there is a punishment  Criminal- a person who commits.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Reading 1 Fight against cybercrime 板块:教学设计 —— 课件 Unit 4.
Crimes By 丘丽香 519. Crimes  Britain Britain  China China   In both countries, crimes against property are the most frequently committed crimes.
Crime and Social Control. Crime Definition: An act that is labeled as such by those in authority, is prohibited by law, and is punishable by the government.
高三年级 英语 Word Power & Grammar, M10U4 授课者 : 王时亮 湖南邵阳县第七中学 高三年级 学年第一学期.
Chapter 2 – Criminal Law A body of laws that deal with crime and the punishment of criminal offenses.
Government Governments are created to provide safety, order, and to serve the people. They depend on citizens taking active, responsible roles.
Legal and ethical issues
Chapter 18: The Federal Court System Section 2
What is ‘Crime’?.
高三年级 英语 Project, M10 U4 授课者: 王时亮 湖南邵阳县第七中学 高三年级 学年第一学期
Bell Work: List 5 things that you did this morning.
Criminal Law ESSENTIAL QUESTIONS Why does conflict develop? How can governments ensure citizens are treated fairly?
Digital Citizenship Middle School
Handling Personal Data
Civil Law An overview of Tort Law – the largest branch of civil law
Unit 4 Word power.
Online Safety! By: Michelle Deng.
Theories of Sentencing
Do you prefer to live in a peaceful world?
Chapter 8 Criminal Law and Cyber Crimes
cybercrime Presented to you by : NAMES MATRIC NO
Chapter 11 crime and security in the networked economy
Crime in the United States
Branches of the Law 10PEF Legal Studies.
Theories and objectives of sentencing
Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School
COMPUTER CRIME.
Lesson 2- Protecting Yourself Online
Cyber Crime Today we will look at: Different types of cyber-crime
The work of the law courts
Cyber Security Experts
U.S. Department of Justice
Section 3.2.
OBLIGATIONS & RESPONSIBILITIES OF CITIZENS
Chapter four – International Criminal Law:General Introduction
Encouraging healthy relationships
Follow safety rules so that YOU: Avoid getting HURT.
The Litigation Process
Law and Order.
Crime in the United States
Types of Crimes/Classification of Crimes
Plagiarism It’s a crime!.
Examining the Federal Court System
Crime in the United States
Lesson 2- Protecting Yourself Online
Cybercrime By: Kimberly Foreiter
Presentation transcript:

高三年级 英语 Word study & reading, M10U4 授课者: 王时亮 湖南邵阳县第七中学 高三年级 英语 Word study & reading, M10U4 授课者: 王时亮 湖南邵阳县第七中学 高三年级2009-2010学年第一学期 2009-12

Word Reading (P78-79) 2009-12

Word Study He looked at me with hatred in his eyes. 他以憎恨的眼光望着我。 Never identify wealth with happiness. 千万不要把财富和幸福等同起来。 They celebrate their wedding anniversary annually. 他们每年庆祝一番结婚纪念日。 2009-12

[adj.] similar“相像的,相仿的,类似的[(+to)]” 如: I wrote a letter regarding/as regards my daughter's school examinations. 我写了一封关于我女儿学校考试的信。 We spied a stranger hanging around / wandering around the corner. 我们发现一位陌生人在拐角处闲荡。 [adj.] similar“相像的,相仿的,类似的[(+to)]” 如: 2009-12

His problem is similar to yours. 他的问题和你的相似。 All passengers aboard fell into the river. 船上所有乘客皆落入河中。 They were the last two to go aboard the ship. 他们是最后两位上船的。 2009-12

He apologized to her for not going to her party. 他因没有出席她举行的宴会而向她表示歉意。 Tom was caught posing as a lawyer. 汤姆冒充律师被当场抓住。 I applied to four universities and was accepted by all of them. 我申请了四所大学都被他们接受了。 2009-12

You would pass your exams if you applied yourself to your lessons. 努力学习就会通过考试。 The research has many practical applications 这项研究有许多实际的用途。 (3) Do the policemen here enforce traffic rules strictly?  这里的警察严格执行交通规则吗? 2009-12

Welcome to the unit: Law and order Page49 2009-12

Welcome to the unit Unit 4 Law and order 治安 Who plays the leading role in law and order? And why? The police play an important role in protecting our society from__________________. Without them, our society would be lawless. crime and disorder Welcome to the unit What things are usually involved in law and order? 2009-12

Unit 4 Law and order What things are usually involved in law and order? ●types of crimes ●people involved ●terms involved →theft, murder, robbery, burglary, violence, kidnapping, terrorism, cybercrime, piracy etc. →criminals, police, detectives, witnesses, judges, lawyers, victims, etc. →trial, in prison, arrest, evidence, etc. 2009-12

Why do you think people break the law? Discussion Why do you think people break the law? What do you think of people who break the law? As a student, what do you think you can do to make our society safer? 2009-12

Why do you think people break the law? Discussion Why do you think people break the law? What do you think of people who break the law? People break the law for various reasons. Some do so to express hatred, or in the hope of getting more money or power. Some people are professional criminals. They do not know any other way of making money. And many simply have no sense of law, so when they break the law, they even do not know this. People who break the law are sometimes worth our sympathy or care, but more often than not they can’t be forgiven and should be seriously punished. 2009-12

Discussion As a student, what do you think you can do to make our society safer? First, we ourselves should know about the law and keep the law. Second, we should educate other people to obey the law and try our best to fight against bad acts in our society and even stop crimes when necessary. What’s more, with the development of society, cybercrime has been on the rise. Criminal activities using computers may occur anywhere at any time. So we should have the fight against cybercrime. 2009-12

Reading: P50 A conference has been organized to discuss the problem of cybercrime. An IT expert from the Council of Europe is addressing a group of business people and politicians on the subject. Read the transcript of his speech. 2009-12

The fight against cybercrime Reading: The fight against cybercrime 网络犯罪 2009-12

Listen and answer: Part A Read the speech transcript quickly and answer the following questions 1.According to the council of Europe, how many types of cybercrime are there? There are four types of cyber crime. 2.How many companies and government departments were surveyed by the Computer Security Institute? 503 companies and government departments were surveyed. 3.What is the solution to cybercrime? The only solution is international cooperation. 2009-12

1.What is e-mail fraud欺诈?(not more than 20 words) Listen and answer: 1.What is e-mail fraud欺诈?(not more than 20 words) 3.Why is most cybercrime against companies not reported? ( not more than 6 words) 4.Why are cybercriminals almost impossibly caught? (Not more than 24 words) 2009-12

1.What is e-mail fraud? (not more than 20 words) Cybercriminals send emails promising money or cheques, and the receivers’ money is stolen by supplying their bank details. 2009-12

To avoid the loss of customers. / Not to lose their customers. 3.Why is most cybercrime against companies not reported? ( not more than 6 words) To avoid the loss of customers. / Not to lose their customers. 2009-12

4. Why are cybercriminals almost impossibly caught 4.Why are cybercriminals almost impossibly caught? (Not more than 24 words) Because of no laws passed against cybercrime in many countries, many holes in their legal systems and no arrangements for handling foreign cybercriminals. 2009-12

Reading: C1. Read the passage carefully, trying to find the answers to the following questions. (1). What is the definition of cybercrime? (2). Can you name two examples of cybercrime? It is a relatively new term that refers to any computer-related criminal offence. Hacking, spreading computer viruses, fraud, websites with offensive content or websites that encourage hatred and violence, and breaking intellectual property and copyright laws. 2009-12

Fraud is a crime where money is stolen by cheating others. (3). What is fraud? (4). According to the Council of Europe, who is affected by cybercrime? Fraud is a crime where money is stolen by cheating others. All Internet users are affected by cybercrime either directly or indirectly. 2009-12

(5). Why is most cybercrime against companies not reported? (6). Why are cybercriminals almost impossible to catch? Because most companies want to avoid the loss of customers, who may think that the company cannot protect their money. Laws against cybercrime have not been passed in many countries, and there are many holes in their legal systems. Most countries don’t have arrangements for dealing with citizens of other countries who commit cybercrimes. Also, these criminals can be anywhere and can move quickly, so it is often almost impossible to catch them. 2009-12

(7). What do governments need to do to fight criminals with computer skills? Governments need to combine their technological resources to keep up with the criminals who have the best technical skills. It is also important to upgrade laws and create international standards for these laws. This will allow states to follow criminals across borders. 2009-12

C2 : P52 1b 2d 3a 4c Part D: P52 1d 2g 3e 4f 5b 6a 7c 2009-12

Part E, P53 1. cybercrime 2. tight 3. coputers 4. security 5. viruses 6. hacked 7. content 8. violence 9. offence 10. private 2009-12

Homework : Language points 2009-12