ImageVerifierCode 换一换
格式:PPT , 页数:28 ,大小:3.08MB ,
资源ID:374362      下载积分:1 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.ketangku.com/wenku/file-374362-down.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(高二英语精品课件:UNIT4 LAW AND ORDER-WELCOME AND READING(牛津译林版选修10).ppt)为本站会员(a****)主动上传,免费在线备课命题出卷组卷网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知免费在线备课命题出卷组卷网(发送邮件至kefu@ketangku.com或直接QQ联系客服),我们立即给予删除!

高二英语精品课件:UNIT4 LAW AND ORDER-WELCOME AND READING(牛津译林版选修10).ppt

1、1.Do you know what order refers to?It refers to the condition in which people obey laws and rules.2.What can you think of when speaking of crime?Types of crimes such as theft,murder,robbery,and also many people connected with it such as police,detectives,witnesses,judges,lawyers,victims,criminals,et

2、c.Talk about the pictures(page49)What is the man trying to do with the hook?He is trying to steal the bag while the other person is sleeping.Talk about the pictures(page49)When did this happen?How do you know?Judging from their appearance,it might have happened hundreds of years ago.Do you think thi

3、s often happen nowadays?This particular type of theft is less likely than in ancient times,although people still steal nowadays.Have you ever heard about cybercrime?What do you know about it?Cybercrime has developed very recently.It involves the Internet,and it is hard to detect or track.It is not e

4、asy to catch the criminals involved in cybercrime because they could be in any country and can move quickly from place to place.It uses computer technology,and most criminals involved in it are experts in IT.International cooperation is needed to fight against it.Do you know anything about what the

5、police do for society?The police help to keep order and guard our society.They catch thieves,direct traffic and protect people.What is your opinion about their work?Do you think our society would be safe without them?They play an important role in protecting our society from crime and disorder.Witho

6、ut them,our society would be lawless.Some people copy artists music or lyrics without telling or paying them.They do this for either personal or commercial use.This is called piracy(盗版).What is your opinion about it?Have you ever seen pirate(盗版)books,CDs or DVDs for sales?Do you think it is OK to pi

7、rate them?No,it is illegal to copy them without permission.Other peoples works are their intellectual property,which should be protected by law.Otherwise,creators would be harmed,and they would stop creating new works.DiscussionAs a student,what do you think you can do to make our society safer?Firs

8、t,we ourselves should know about the law and keep the law.Second,we should educate other people to obey the law and try our best to fight against bad acts in our society and even stop crimes when necessary.ReadingFast reading Go through the passage as quickly as possible and try to find answers to t

9、he three questions in part A on Page 50.1.According to the Council of Europe,how many types of cybercrime are there?There are four types of cybercrime.2.How many companies and government departments were surveyed by the Computer Security Institute?503 companies and government departments were survey

10、ed.3.What is the solution to cybercrime?The only solution is international cooperation.Part I(1-2)Part II(3-5)Part III(6)Part IV(7-8)The definition and different types of cybercrimeThe extent of the problemThe legal situation regarding cybercrimeThe solution to the problemGeneral ideaGeneral ideaDet

11、ailed readingRead the passage a second time and complete Part C1.1.What is the definition of cybercrime?Cybercrime is a relatively new term that refers to any computer-related criminal offence.Hacking,spreading computer viruses,fraud,websites with offensive content or websites that encourage hatred

12、and violence,and breaking intellectual property and copyright laws.2.Can you name two examples of cybercrime?3.What is fraud?Fraud is a crime where money is stolen by cheating others.4.According to the Council of Europe,who is affected by cybercrime?All Internet users are affected by cybercrime eith

13、er directly or indirectly.5.Why is most cybercrime against companies not reported?Because most companies want to avoid the loss of customers,who may think that the company cannot protect their money.6.Why are cybercriminals almost impossible to catch?Laws against cybercrime have not been passed in m

14、any countries,and there are many holes in their legal systems.Most countries do not have arrangements for dealing with citizens of other countries who commit cybercrimes.Also,these criminals can be anywhere and can move quickly,so it is often almost impossible to catch them.7.What do governments nee

15、d to do to fight criminals with computer skills?Governments need to combine their technological resources to keep up with the criminals who have the best technical skills.It is also important to upgrade laws and create international standards for these laws.This will allow states to follow criminals

16、 across borders.n 研究理解句子,并注意划线部分的具体意义n 1Cybercrime is a relatively new term that refers to any computer-related criminal offence.(P50 Lines 2-3)n 网络犯罪是一个相对较新的词语,指任何与电脑相关的犯罪。n 2.Firstly,the council lists crimes related to security,such as hacking.(P50,Lines7-9)n 首先,欧洲议会列出了涉及与安全相关的犯罪,如黑客行为。n 3.Secondl

17、y,it notes crimes that are not specifically computer-related,meaning that they can be committed with or without a computer,an example of which is fraud(Page 50 lines 11-13)n 第二,它指出了与电脑并非特别相关的犯罪,即此类犯罪可通过电脑来实现,但也可不通过电脑来实现,如欺诈就是此类犯罪的一种。n 4.Lastly,it identifies those offences relating tobreaking intelle

18、ctual property and copyright laws.(P50,lines15-16)n 最后,它定义了同侵犯知识产权和违反版权法相关的犯罪。n 5.A survey conducted in 2002,showed that 90 per cent of the 503 biggest companies and government departments questioned had had their security systems broken into in the previous year.(P50,Lines26-30)n 美国的一家私人机构,电脑安全协会,2

19、002年进行的一项调查表明,在被调查的503家最大的公司和政府部门中,有90%的单位安全系统在前一年遭到入侵,80%的单位损失了数百万的美金。n 6.Considering how bad the situation with cybercrimeagainst companies has got,many people wonder why so little is known about this.(page 51 Lines 34-35)n 考虑到针对公司的网络犯罪的情况有多么恶劣,许多人质疑为什么我们对于这些犯罪知之甚少。n 7.All of this is further compl

20、icated by the legal situation regarding cybercrime.(page 51 line 39)n 有关网络犯罪的法律状况使形势更加复杂。n 8.It is so important to make new laws and create international standards for these laws similar to those concerning international airspace.(page51 lines49-51)n 制定新的法律并为其建立类似于有关国际空域的国际标准也很重要。n 9.The only soluti

21、on to this problem is international cooperation.(P51,Line 47)n 这个问题的唯一的解决办法就是国际合作.n 10.The technical skills of these criminals are among the best in the world,which means that governments must combine their technological resources to keep up.(P.51,Lines47-49)n 这些罪犯的技术水平在世界属于先进水平,这意味着政府必须集合他们的技术资源来跟进。Goodbye!

Copyright@ 2020-2024 m.ketangku.com网站版权所有

黑ICP备2024021605号-1