2010届高三英语law and order课件_第1页
2010届高三英语law and order课件_第2页
2010届高三英语law and order课件_第3页
2010届高三英语law and order课件_第4页
2010届高三英语law and order课件_第5页
已阅读5页,还剩35页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

Revision理论n. adj.冒犯 n. v. adj.仇恨,憎恨 v. n.分类V. n.科技n. adj.鉴别v. n.接受v. n.精确n. adj.合作v. n.,theory,theoretical,offence,offend,offensive,hate,hatred,classify,classification,technology,technological,identify,identification,receive,receiver,accuracy,accurate,cooperate,cooperation,Law and order,Panda joss-stick virus,Reading,The fight against cyber-crime,As the Internet _ ,it provides people with many new _ . However,at the same time, it has caused a number of problems, and _ is one of the most serious, which _ great effort and _ countries working together.,expanded,opportunities,cybercrime,requires,involves,careful reading,Read carefully and choose the right answers.,1. Which of the following is true according to the passage? A. As the Internet develops, more kinds of crimes happen B. Cybercriminals are easily caught. C. Cybercrime has nothing to do with the real life. D. Cybercrimes are mostly committed by common surfers.2. What is the present situation regarding cybercrime? A. Cybercrime is so new that the legal systems in many countries remain to be improved. B. All the countries have passed laws against cybercrime C. It is easier to catch cybercriminals in Europe because visas are not required. D. All the governments are working together and cooperatively against cybercrime.,true,3. Which of the following should not be included in cybercrime? A. Hacking B. E-mail fraud C. Creating websites with offensive content D. Theft 4. Which of the following is not one of the necessary ways to fight against the cybercrime? A. Cooperation B. Legal system C. Visa management D. Improving online software,not be included,not,5. Which of the following is most important compared to other ways to fight against the cybercrime? A. Sound legal system B. International cooperation C. Tight Internet rules D. Visa management,most,Part I (1)Part II (2)Part III (3-4)Part IV (5-6)Part IV (7-8),The _ of the topic,cybercrimeThe _and _ of cyber-crime. The present_ of the problem . The _for cybercrimeThe _to this problem.,solution,definition,categories,situation,reasons,introduction,Structure of the passage,Part II The definition and different types of cybercrime,Details,It is a relatively new term that refers to any computer-related criminal offence.,the definition of cybercrime,types of cybercrime,1 crimes related to _,2 crimes that are not_,3websites with _ or websites_,4 Those offences relating to _ and _,security,specifically computer-related,offensive content,encouraging hatred and violence,breaking intellectual property,copyright laws,Who are affected by cybercrime ?,Some _ are targets for the cyber-criminals .Some _ are the targets for the cyber criminals.,individuals,large companies and government departments,Paragraph3paragraph4,Part III The situation of the problem,severe,Cybercrime has become _ today, and all Internet users are _ by it. Most people have received _,and many have been the _of e-mail _.E-mail fraud is becoming more and more _ as some criminals send e-mails _money or cheques. Large companies are _ _ for cybercriminals, who are often IT _. According to a survey _ in 2002 showed that almost all companies had their security system _ _. This includes _ money that is _in cybercriminals bank accounts to _ the companies that pay.,severe,affected,computer viruses,targets,fraud,common,promising,ripe targets,experts,conducted,broken into,blackmail,deposited,protect,Considering how bad the situation with cyber-crime against companies has got, many people wonder why so little is known about this .,The main reason is that Most companies report They fear thatlose, who may.,Part IV The reason for cybercrime,Most companies report They fear thatlose, who may.,They fear thatlose, who may.,Why are cybercriminals almost impossible to catch?,Laws against cybercrime., and there are many. Most countries citizens of other countries who commit cyber-crimes. Also, these criminals and, so it is.,no laws,holes ,no arrangements,Part V The solution to the problem: ?,international cooperation.,What do governments need to do to fight criminals with computer skills?,combinemake new lawsform a special agencywork together,Summary ofTask-based reading,Reading Strategy,What is a definition?How does a definition appear in the main body of a text?,In order to help readers understand some difficult vocabularies and expressions ,the author will give _ of them in simple words.,expalnations,How does a definition appear in the main body of a text?,It appear after the first use of the word in a phrase .It will appear in brackets after the wordit appears after a comma.,Some examples of definition:,Cybercrime is a relatively new term that refers to any computer-related criminal offence.,such as hacking (illegally accessing other peoples computers and files through an Internet connection),an example of which is fraud, a crime where money is stolen by cheating others.,It notes crimes that are not specifically computer-related,meaning that they can be commited with or wihtout a computer.,Revision of some definitions of ideas:,What is Aids?What is sustainable development?What is idioms?,Aids (acquired immune deficiency syndrome) is caused by a virus called HIV ( human immunodeficiency virus),Sustainable development is long-term planning which focuses on the environment and preserving natural resources.,An idiom is a group of words or an expression whose meaning often cannot be understood by looking at the meanings of the separate words in it.,Understanding and paraphrases the following sentences:,1.As the Internet has expanded in recent years, the opportunities for crime have as well. With the _ of the Internet in recent years, the opportunities for crime have expanded as well.,expansion,词型的转换,As the Internet has expanded in recent years, so _ the opportunities.,have,句型转换,2.Committing crime online is no longer a theoretical possibility.,Committing crime online is _ possibility.,practical,反义词,3.We are facing criminals who realize that by doing so, they can make money with little risk of being caught.,We _ _ _ criminals _ that by doing so, they can make money with little risk of being caught.,are faced with,realizing,句型转换语法转换,4.The problem has become so severe that all Internet users are affected by it either direct or indirectly.(L19),The _ of the problem has _ or _ on Internet users.,severity,direct,indirect,词形的转换,5.They fear that by doing so, they will lose customers.(L37),They woundnt report cases of cybercrime _ _ _ losing customers.,for fear of,_ _ _ that they will lose customers.,for fear that,句型转换,6.A survey conducted in 2002 by the Computer Security Institute , a private organization in the USA , showed that 90 per cent of the 503 biggest companies and government departments questioned had had their security systems broken into in the previous year.,7.Considering how bad the situation with cybercrime against companies has got, many people wonder why so little is known about this.,consider sth./doing sth.:take into considerationconsidering that.,Considering he has just only start, he knows quite a lot about itThese young people did quite well ,considering the circumstances.,Analyze and recite some important sentences,1 Committing crime online is no longer a theoretical possibility , and we are facing criminals who realize that by doing so , they can make money with little risk of being caught .2 Fighting this kind of crime , which is called cybercrime , requires great effort and involves countries working together .,进行网络犯罪已经不再是理论上有可能, 我们正面临着这些犯罪分子;这些犯罪分子以为这样做可以挣钱而几乎没有被捕的风险.,打击这样的犯罪,即网络犯罪,要求极大的努力和各国协力工作.,3 Firstly , the council lists crimes related to security , such as hacking ( illegally accessing other peoples computers and files through an Internet connection ) and spreading computer virus .,4 Secondly , it notes crimes that are not specifically computer-related , meaning that they can be committed with or without a computer .,5 Lastly , it identifies those offences relating to breaking intellectual property and copyright laws .6 Although there are an increasing number of such cases against individuals , fraud against large companies is a bigger problem .,7 E-mail fraud is becoming more and more common as some criminals send e-mails promising money or cheques .,8 A survey conducted in 2002 by the Computer Security Institute , a private organization in the USA , showed that 90 per cent of the 503 biggest companies and government departments questioned had had their security systems broken into in the previous year .,9 This includes blackmail money that is deposited in cyber-criminals bank accounts in order to protect the companies that pay .,10 Considering how bad the situation with cybercrime against companies has got , many people wonder why so little is known about this . It is also important to make new laws and create international standards for these laws similar to those concerning international airspace .A

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论