Стр.104-105 Модуль 6 ГДЗ Starlight Баранова 7 класс
6e Crime & Technology Vocabulary 1 In a minute list some positive and negative aspects of using the Internet. Compare your list with your partnertasks.
Решение #1
Решение #2
Решение #
Решение #
Решение #
Решение #
Решение #
Решение #
Решение #
Решение #
Решение #1
Решение #2
Приведем выдержку из задания из учебника Баранова, Дули, Копылова 7 класс, Просвещение:
6e Crime & Technology
Vocabulary
1 In a minute list some positive and negative aspects of using the Internet. Compare your list with your partnertasks.
PROS: have immediate access to information
CONS: exposes users to security risks
2 Read in the list the dictionary entry. How are these words related to it? Check in your dictionaries.
cybercrime (n) illegal activity committed on the Internet
Listening
3 Listen to four people who have been victims of cybercrime. Match the people to the crime.
A phishing
В identity theft
C computer virus
D illegal downloading
E email spam
Текст аудирования:
Speaker 1
I was checking my emails when it happened. The screen switched off for a second and then came back on. The next thing I knew all my emails were deleting one by one by themselves. I tried to log out, but the computer wouldntaskt let me. I still haventaskt got my emails back. Itaskll have to take my computer to an expert.
Speaker 2
I love the band, I really do, but I just don’t see how I can make a living through it. We put together a CD and sold it on our own website, but it didntaskt sell well. Then someone told me it was available on a music website they use. I checked and, sure enough, it was there, available for people to just put onto their MP3 players without paying. It seems like theretasks nothing we can do about it.
Speaker 3
A couple of years ago, I opened one that I thought was from my bank. They were asking for me to update my account details, so I did and sent the email back to them. Anyway, a few days later I got a call from my bank to ask me about a large amount of money that had been spent on my credit card. After I said I hadntaskt spent the money, we eventually realised that it was the details I filled in. Of course, I immediately cancelled my card. My inbox is still full of emails from people Itaskve never heard of, but now I dontaskt even open them.
Speaker 4
I couldntaskt believe it - a letter from the bank demanding payment for a debt I knew nothing about. They said Itaskd taken out a loan with them six months earlier - but I hadntaskt. They also said Itaskd taken out a credit card - of course I hadntaskt done that either! I contacted the police straight away. I dontaskt know whotasks using my details, but one thing is for sure - it isntaskt me!
Study skills
KWLH
Before reading a text, make a KWLH (know-want to know-learn-how) chart. This will help you use your prior knowledge, understand the text better and increase your knowledge.
Reading
4 Copy the chart below into your notebooks.
Read the title of the text and complete the first two rows of the chart.
What I already Know
What I Want to know
What I Learnt
How I can learn more
Cybercrime
1
How would you feel if your computer was hijacked and used to send nasty emails to your friends, or if a virus destroyed all your data? Well, this happens more often than you might think. In fact, in the UK alone hundreds of thousands of private computers are hacked every year. The people behind these attacks are called taskcrackerstask or taskhackerstask. Hackers are highly intelligent programmers who can easily break into computer systems. They use their expert knowledge and skills to gain access and can then steal data or infect computers with a virus or a worm. If you want to surf safely and protect your computer you need to protect yourself against these cybercrimes.
2
When creating an email account you should choose a good username for your email address. Dontaskt use your own name and dontaskt include anything in your username that could indicate your age or home address. Avoid usernames like cool13yrs or nicegirl. Instead use a word from the dictionary that appeals to you or a secret code that only means something to you. Choose a smart and difficult to guess password consisting of a combination of letters and numbers. Your date of birth or the name of your pet would be very bad choices. Finally, dontaskt share your password with anyone and change it regularly.
3
Most people actually have their email account hacked due to their own fault. Allowing your computer to remember your password is one mistake that could cost a lot. Dontaskt put yourself at risk. You should always set your account so that you have to type in your password each time and always log out properly so that if someone uses or steals your computer they cantaskt access your email.
4
Some email providers give you the option of being listed in an online directory so they can contact you with offers. Dontaskt list your email unless you want to receive lots of spam mail. Dontaskt open any emails from people you dontaskt know but delete them instead. Likewise, dontaskt open any attachments unless they were run through an anti-virus program and never reply to spam or any offensive or harassing messages. Finally, keep your software updated and run anti-virus scans regularly. Ittasks one of the best ways to protect your computer and stay safe.
Check these words
hijack, virus, expert, infect, worm, account, username, password, provider, directory, spam
5 Read the text and match the headings (A-E) to the paragraphs (1-4). There is one extra heading.
A How they hack
В Filter your mail
C Criminal minds
D Start right
E Common mistake
6 Match the words in bold in the text with their meanings.
Writing & Speaking
7 a) Complete the other two rows of the KWLH chart. Compare with your partner.
b) Summarise the text in 80 words.
8 ICT In small groups, find out more information about cybercrime. Make notes, then report your information back to the class.