M10U4导学案-董金标.docx

上传人:罗晋 文档编号:11670944 上传时间:2021-08-29 格式:DOCX 页数:23 大小:47.25KB
返回 下载 相关 举报
M10U4导学案-董金标.docx_第1页
第1页 / 共23页
M10U4导学案-董金标.docx_第2页
第2页 / 共23页
M10U4导学案-董金标.docx_第3页
第3页 / 共23页
M10U4导学案-董金标.docx_第4页
第4页 / 共23页
M10U4导学案-董金标.docx_第5页
第5页 / 共23页
点击查看更多>>
资源描述

《M10U4导学案-董金标.docx》由会员分享,可在线阅读,更多相关《M10U4导学案-董金标.docx(23页珍藏版)》请在三一文库上搜索。

1、Unit4 Law and OrderPeriod 1 Welcome to the UnitLearning aims (学习 目标):1. To know something about crimes, especially cybercrime2. Discuss cybercrime and interview a parentImportant and difficult points (重点难点):1. How to describe the pictures on P.492. How to discuss the questions below with partners3.

2、Make a proposal for protecting intellectual property会预习导航【静下心来想一想】1. Do you know what order refers to?2. Speaking of crime, what can you think of?M合作探究【有疑有问议一议】Group work. Look at the four pictures on P .49 and discuss them. Picture1:(1)What is the man trying to do with the hook?(2)How long ago did

3、this happen? How do you know?(3)Do you think this often happen nowadays?Picture2:(1) Have you ever heard about cybercrime? What do you know about it?Picture3;(1)Do you know anything about what the police do for society?(2)What is your opinion about their work? Do you think our society would be safe

4、without them?(3)Do you want to be a policeman or policewoman? Why or why not?Picture4:Some people copy artists music or lyrics without telling or paying them. They do this for either personal or commercial use. This is called piracy. What is your opinion about it?(2)Have you ever seen pirate books,

5、CDs or DVDs for sales?(3)Do you think it is OK to pirate them?巩固拓展【知识深化提一提】Since we have got a good understanding of the crimes, now lets have a futher discussion of thecrimes.1. Why do you think people break the law? What do you think of people who break the law?2. As a student, what do you think y

6、ou can do to make our society safer?3. Have you ever happened to see or experience any crimes? What did you do then?Q课堂训练【学有所得练一练】1. Police have described the man as a violent and dangerous c.2. The hotel is not responsible for any loss or damage to guest s personal p.3. Even though c is perhaps the

7、 fastest-growing industry of the new economy, mostbusinesses are not taking adequate precautions项范,预防 ).4. These stars are barely v to the naked eye.5. As he was under 20 years old, he could not be employed without the p of hisparents.LANGUAGE FOCUS1. In the past, criminals committed obvious crimes

8、like robbing someone, injuring someone or destroying property. (P49)在过去,犯罪分子犯的是象抢劫某人之类的明显的罪行,结果伤害了某一个人或破坏了 财产。rob: verb 抢劫rob sb. of sth.抢劫某人的某物He robbed the bank of a lot of money.注意比较:steal sth. from sb./steal sb. sth.偷某人的某物He stole a lot of money from me.He stole my wallet several days ago.2. Mor

9、e and more crimes are less visible and involve the Internet. (P49) 越来越多的犯罪不怎么看得见,并且和因特网有关。involve: verb 使卷入,包括The second accident involved two cars and a lorry.I prefer teaching methods that actively involve students in learning.Shes been involved with animal rights for many years.It would be diffic

10、ult not to involve the childs father in the arrangements.be involved in trouble: 卷入纠纷3. The police help keep order and protect us from crime. (P49)警察帮助维持秩序,保护我们免遭犯罪分子的袭击。order: noun 秩序The collapse of Communism at the end of the 1980s encouraged hopes of a new world order. keep order: 维持秩序 law and or

11、der :治安There is a complete breakdown in law and order.noun 有条理,整齐,正常状况 The children lined up in order of age/height.I cant find the file I need because theyre all out of order(= they are no longer arranged in the correct way).in ( good) order: 井然有序in order of: 以顺序out of order: 出毛病,没有条理4. Copying fil

12、ms and music without permission is a crime, too. (P49) 拷贝电影和音乐也是一种犯罪。permission: noun 允许If someone is given permission to do something, they are allowed to do it:You will need permission from the council to extend your garage.Official permission has been granted for more building near the river.The

13、authorities have refused permission for the demonstration to take place.without permission: 未经许可You can get into the lab without permission.ask (for) one s permission某人的许可permit: verb 允许+ ing form of verb The prison authorities permit visiting only once a month.+ object + to infinitive The security

14、system will not permit you to enter without the correct password.permit sb. to do sth.: 允许某人做某事=allow sb. to do sth.permit doing sth. 允许做某事= allow doing sth.课堂同步Read the following introduction to the history of Cyberspace and answer the questions below.A Brief History of CyberspaceAlthough it may se

15、em like a new idea, the net has actually been around for over 40 years. It all began in the US during the Cold War, as a university experiment in military communications. By linking lots of computers together in a network, rather than serially (in a straight line), the Pentagon(五角大楼 )thought that in

16、 the event of a nuclear attack on the US it was unlikely that the entire network would be damaged, and therefore they would still be able to send and receive intelligence.At first each computer was physically linked by cable to the next computer, but this approach has obvious limitations, which led

17、to the development of networks utilizing the telephone system. Predictably, people found that nuclear strike or not, they could talk to each other using this computer network, and some university students started using this network to do their homework together.It seems a natural human characteristi

18、c to want to communicate, and once people realized that they could talk to other people via this computer network they began to demand access, although initially the users were only from the university and government sectors. But more and more people could see the potential of computer networks, and

19、 various community groups developed networks separate from the official networks for the use of their local communities.The sum of all these various local, regional and national networks is the Internet as we experience it today, an ever expanding network of people, computers and information coming

20、together in ways the Pentagon never dreamed of 40 years ago. So what began as an exercise in military paranoia has become a method of global communication.Cyberspace is a term coined by William Gibson in his fantasy novel Neuromancer to describe the world of computers, and the society that gathers a

21、round them. Gibsons fantasy of a world of connected computers has moved into a present reality in the form of the Internet. In cyberspace people exist in the ether-you meet them electronically, in a disembodied, faceless form.1 .How did the Internet come into being?2 .What was the Internet like at f

22、irst?3 .Why did the word“cyberspace” come into use?Period 2 Reading The fight against cybercrime(l)Learning aims (学习 目标):1. To improve the ability of reading.2. To go through the whole text and gain some knowledge of cybercrime and realize the importance of fighting against it.3. To learn more knowl

23、edge about cybercrime.Important and difficult points(重点难点):1. How to get the general idea of the passage and each paragraph2. How to improve the ability of reading.会预习导航【静下心来想一想】Nowadays in our daily life, we often hear that someone s QQ number has been stolen.1. Have you ever found that you can t l

24、og on your QQ suddenly?2. Do you know what has happened to it?3. What can it be used to do by someone who has stolen it?三合作探究【有疑有问议一议】Since we have got a good understanding of the cybercrime, now let s have a further discussion of the passage.Main idea of the passageMain idea of part1()Main idea of

25、part2()Main idea of part3()Main idea of part4()1. Which of the following is right?A. Cybercriminals are more interested in getting money from large companies.B. Fraud against individuals is more serious.C. Receiving e- mails promising money or cheques shows that you re lucky.D. With international co

26、operation, we can avoid any loss.2. Which one of the measures will NOT be taken to prevent online crimes?A. Educating people who use computers.B. Seeking international cooperation.C. Passing laws.D. Preventing people from using the Internet.课堂训练【学有所得练一练】Fill in the blanks with proper words according

27、 to the reading material.W: These days I often hear of cybercrime, but I don know what cybercrime is. Could you please tell me something about it?M: OK. Cybercrime is a relatively newterm that refers to any computer-related criminal offence. It has been (1)c into four categories. They are as follows

28、: crimes related to security; crimes that are not specifically computer-related, such as fraud; websites with offensive (2)c; offences relating to breaking (3)i property and copyright laws.W: Do you know why cybercrime is becoming so serious?M: Because the (4)o for crime have expanded with the Inter

29、net (5)e. Besides, criminals realize that they can make money with little risk of being caught.W: To what degree does cybercrime do harm to people?M: Most people have (6)r computer viruses, and many have been the targets of e-mail fraud. In addition, fraud against large companies is a bigger problem

30、. As a result, many companies have lost millions of dollars. Even the s systems of government departments have been broken into.W: I don t know why the situation with cybercrime against companies has got so bad.M: That s because they don t report it for fear of losing (8)c.W: Then how can we deal wi

31、th such a serious problem?M: The only solution to this problem is international (9)c . So far some steps have been taken and in 2001 an (10)a on it has been signed by many countries.W: Thank you for telling me so much about cybercrime. I ll do my bit to fight against it.DISCUSSION1 .What do you thin

32、k of Internet shopping ?2 .What can we do to solve the problem of cybercrime?3 .What is more important the convenience of using the Internet to buy things or financial safety? Why?Unit4 Law and orderPeriod 3 Reading The fight against cybercrime(2)Learning aims (学习 目标):1. To have a further understand

33、ing of the passage2. To learn some language points in the first part of the passageImportant and difficult points(重点难点):1. Words and expressions in the first part of the passage2. How to analyze the grammatical structures of some important sentances令预习导航【有关用法查一查】Read the text and try to find the fol

34、lowing phrases &sentences and underline them from the book. Make a list of what you know about the language points.1. expand (Line 1)2. committing crime. (Line 2)3. a relatively new term (Lines 7)4. criminal offence (Lines 7-8)本巩固拓展【知识深化提一提】1. Ladies and gentlemen, as the internet has expanded in re

35、cent years , the opportunities for crime have as well. expandvt. 1.展开,张开(帆,翅等)The eagle expanded its wings.2 .使膨胀;使扩张3 .扩大;扩充;发展He is thinking of expanding his business.4 .详述They have expanded my view on the question.vi. 1.展开,张开2 .扩张;发展;增长In ten years the citys population expanded by 12%.3 .膨胀水结冰时体积

36、膨胀。4 .详细说明(+on/upon)5 .变得和蔼可亲;感到心旷神怡;变开朗My father expanded a little when he had had a drink, and started to talk more freely.n. expansion u1)扩大; 发展,展开 expansion of territoryindustrial expansion2)膨胀(of) 气体的膨胀 adj . expansive2. Committing crime online is no longer a theoretical possibility, andcommit

37、(committed, committed, committing)vt. 1.犯(罪),做(错事等)I committed an error in handling the business.2.把交托给;把提交给;把.付诸commit sb./sth. to The child was committed to the nurses mit murder/suicide 杀人/自杀 commit a blunder 犯大错commit oneself vi. 1) +on (就一)2)+to do /to doing 3)+to sth.She didnt want to commit h

38、erself on that matterThe government committed itself to reduce /to reducing taxes.He committed himself to the antiwar movementn. commitment 3/4. Cybercrime is a relative new term that refers to any computer-related criminal offence. term c1) 期,期限 They were sentenced to long terms in prison.2)学期 学期结束

39、时有考试吗?3) 任期 The Presidents term of office is four years.4)(契约,谈判等的)条件 涤款P We accepted the new terms.5)关系,友谊;地位P(+with)我们与邻居和睦相处。6)要求额,费用,价格P7)专门名词,术语;(一般的)词名称我不熟悉化学术语。8)措辞,说话的方式P9)限期;(租赁等的)终止期;结账期come to terms =make terms in terms ofin the long/short termnot. on any terms =on no terms offence n.(也写作

40、 offense)1 .罪过;犯法(行为);过错C(+against)For what offense was he arrested?2 .冒犯;触怒U She meant no offense by the remark.3 .引起反感的事物C(+to) That dirty old house is an offense to the eye.4 .进攻,攻击U a weapon of offense.offendvt.1.冒犯;触怒;伤害的感情We were offended by his vulgar language.2.使不舒服The smell offends me.vi. 1

41、.违反;犯过错;犯罪(+against)She prayed that she would never offend.2.引起不舒服(或愤怒)Bad manners may offend.Q课堂训练【学有所得练一练】Fill in the blanks with the phrases in the box below. Change the form where necessary. refer toin recent yearsclassify- intobreak intokeep upno doubtin additionwork togetheras well asbe involv

42、ed in1.If you meet with some new words that affect your unde rstanding, you d better a dictionary.2 .There is that the 2008 Olympic Games will be successful.3 .When they came back from work, the family found their house and money stolen.4.In face of difficulty or danger, you should your courage.5. H

43、e is now running his own research company - that s to his job at the university.1.1 never imagined that I might be such a trying matter. Now I really don knowhow to get rid of it.7 .Poverty-relief can be realized if all the nations now to develop their own economy.8 .China has been creating a harmon

44、ious society.9 .Librarians always books in libraries different categories in order for readersto find them.10 . The organization encourages members to meet on a regular basis,providing themwith financial support.Complete the passage with proper words or phrases from the article on page 50 and 51 of

45、the Student s BookC. hange the form where necessary.Cybercrime is a relatively new term that refers to any computer-related criminal (1). Online crimes has been (2)into four categories by the Council of Europe.We feel that such (3) classifications are necessary as they help identify and combatcyberc

46、rime, which is a serious problem nowadays. It is so (4)that all Internet users areaffected by it either directly or indirectly. Most people have received computer (5)andmany have been the targets of e-mail (6), which is becoming more and more common assome criminals send e-mails promising money or (

47、7). Receivers of these e-mails areasked to offer their bank details so that their money is stolen. The number of such cases against (8) but fraud against large companies is a bigger problem. Large companies are ripe(9) for cybercriminals, who are often IT (10). After a survey, we have enoughevidence to show that cybercrime is costing businesses worldwide hundreds of billions of dollars (11), which includes (12) money that is deposited in cybercriminals bankaccounts to protect the companies that pay. However, most companies hav

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 科普知识


经营许可证编号:宁ICP备18001539号-1