Activity 5
Underline the correct item.
1 Karen washes/is washing her hair every day.
2 Mark worked/is working very hard these days.
3 I talked /am talking to Carol on the phone a few days ago.
4 John stays/is staying with his cousin at present.
5 We sometimes eat/are eating bacon and eggs for breakfast.
6 Jane breaks/broke her arm last Monday.
7 Do you call /Did you call Mike yesterday?
8 I get up/got up at 9 o clock on Sundays.
9 They go/went to the Bahamas last summer.
10 She is buying/ bought a computer three days ago.
Activity 6
Choose the correct answer.
1 Mr Smith is a lawyer. He ...A., a lot of hours.
A works B is working C worked
2 Sid ................ me with my homework last night.
A helps B is helping C helped
3 The robber.............over the wall and ran away.
A is jumping B jumps C jumped
4 "What is Dad doing?” “He ........ the bathroom.”
A is painting B painted C paints
5 When Father came, we ...............to the theatre.
A go B went C are going
The 14th practical activity
The theme: Speeding of Information map. About my family
Objectives:
To develop pupils reading skills;
To give information about Speeding of Information
Adding new vocabulary
Vocabulary: disadvantage, advantage, invention, sphere, speeding, discover, invent, notion, attack, consequences, licence, agreement, pressure, intellectual, encouraging, persuading.
Visuals:: handouts, cards, mini tests, videoprojector.
Summary of the lesson.
Speeding of Information map
a. As there are advantages and disadvantages of every invention, sphere, and revolution, speeding of information also has two sides. When something happens or is discovered or invented in one corner of our planet, the whole world learns about it immediately. But there is a notion of information attack. It can be understood in two ways; the first interpretation is “attack to information” and the second is “attack somebody or something with the help of information”. Both of them are more dangerous showing catastrophic consequences than any type of attack with weapons or tanks.
b. Attack to information is penetrating into ones PC and monitoring, snooping, spying, stealing information and so on. The worst site is that is easy to hack (steal) your information virtually and even you do not know when, how and who hacked and usually you cannot mind the event or object to.
But Spying is sometimes legal, because you click on “I accept” in the licence agreements written in small prints even not reading.
c. Information threat in business purposes also exists; it can be understood as attack to intellectual property. What is an intellectual property? Simply, we can say that it is someone else’s intellectual working results such as musical, literary, and artistic works; discoveries and inventions; and words, phrases, symbols (trademarks), and designs. But owners usually suffer from not being able to prove that idea was originally created by them. File swapping with your friend is also against law.
d. Attack with the help of information is making someone or group of people accept someone’s ideas, set of beliefs or ideological views; especially it is made with pressure in different ways. Those ways may be encouraging, persuading or even financially supporting.
Do'stlaringiz bilan baham: |