Ghost Detectives


UNIT 2 Computers & Technology



Download 486.15 Kb.
Page2/11
Date01.02.2018
Size486.15 Kb.
#37276
1   2   3   4   5   6   7   8   9   10   11

UNIT 2 Computers & Technology





Reading 1

The Evolution of Music Media

VOCABULARY PREVIEW

  1. f

  1. e

  1. c

  1. a

  1. b

  1. d








Guiding Questions


Q1:

Why were the most common type of vinyl records called “LPs”?

→ “LP” stands for “long play.” They were the first records that could continuously play twenty minutes or more of music.]



Q2:

Which two music media are most popular today, and which is gaining popularity?

→ CDs and MP3s are most popular today, and streaming services are gaining popularity.




READING COMPREHENSION
A. True or False

  1. F

  1. T

  1. T

  1. T

  1. F











B. Multiple Choice

  1. c

  1. a

  1. a

  1. c


C. Fill in the Blanks

  1. record players / turntables

  1. CDs

  1. expensive



SUMMARY

  1. more convenient

  1. for decades

  1. Made music portable

  1. by 2007

  1. still dominant

  1. Streaming services











VOCABULARY PRACTICE

  1. compact

  1. dominant

  1. revolutionary

  1. superior

  1. swap

  1. medium









SUPPLEMENTAL READING

Quick Check

  1. piracy

  1. record companies

  1. harder


Extension: Talk or Write About It

Sample answer: My favorite way to get and listen to music is downloading MP3 files and playing them on my phone. It’s great because you can buy and download a song anytime, anywhere.


Reading 2

Hackers and Crackers


VOCABULARY PREVIEW

  1. b

  1. d

  1. f

  1. c

  1. a

  1. e









Guiding Questions


Q1:

What was the original meaning of "hack"?

→ The word “hack” was already in use at MIT to describe student pranks—very creative tricks or jokes.



Q2:

What do hackers do when they find weaknesses in a system?

→ They always notify the administrator of the system so that the weakness can be fixed.



Q3:

Underline two programs that hackers developed or helped develop.

→ For example, the popular Mozilla Firefox browser was developed by hackers. Hackers have also contributed to the Linux operating system, as well as many other open source programs.





READING COMPREHENSION
A. True or False

  1. F

  1. F

  1. T

  1. T

  1. T











B. Multiple Choice

  1. c

  1. c

  1. a

  1. d


C. Short Writing

Sample answers:

1. A cracker breaks into computer systems to steal information or for other malicious reasons.

2. Hackers are hired by companies to find problems with their computer security.
SUMMARY

1, 3, 4
VOCABULARY PRACTICE



  1. manual

  1. probe

  1. connotation

  1. ethical

  1. noble

  1. exploit








SUPPLEMENTAL READING

Quick Check

  1. electrical device

  1. personal data

  1. change other programs


Extension: Talk or Write About It

Sample answer: I don’t think it’s safe to share a lot of photos and other personal information online. There are a lot of very skillful crackers, and they probably can break into any system. Recently, the data of thousands of US government employees was stolen this way. I think people should be very careful about what they put on the Internet.




Directory: userfiles -> downloads
userfiles -> Title: Associate Professor
userfiles -> Chief Patron Shri Avinash Dikshit Commissioner Patron
userfiles -> Iccf congress, seixal, portugal 5th to 12th October 2002
userfiles -> Unit 1: Exploration and Colonization
userfiles -> Ap united States History Course Description
userfiles -> Note: Please look through resources very carefully. This is a controversial issue so some sources may have bias. Check carefully for the expertise or background of the writer or contributor
userfiles -> Ap united states history mr. Storrs – Room 306 2009-2010 text
downloads -> -
downloads -> Reading for the Real World Answer Key Reading for the Real World Intro Unit 1 Reading 1: Researching Ghosts Pre-reading Questions
downloads -> Lesson 1 Dialogue & Practice Warm-Up (Answers may vary.) Vocabulary Preview

Download 486.15 Kb.

Share with your friends:
1   2   3   4   5   6   7   8   9   10   11




The database is protected by copyright ©ininet.org 2024
send message

    Main page