3, Dotisiniuy onto wet
ion
vey
‘fo cat rogan carl te vs
2 Welles epee ese
eae
er areas let
pn
4 Successful scanning depends not only on
recognising quickly the Information you want
but also on tearing to ignore information
‘hich i nt relevant to your task. Encourage
the $s o focus only on those parts which wit
help them check their answers to Task 3. The
first sentence ofa paragraph often sa good
clue tots contents as a whole. ft suggests
‘the paragraph may contain the answer to one
ofthe questions, tis worth reading on with
5. Do this individually then compare in pais.
‘This task requires close reading, The answers
have tobe inferred as they are not clearly
stated,
Keys
1 They reproduce inside a host which they
damage or destroy.
ttean copy tse nt ay program les
They can stay dormant inthe memory unt
iggered.
4 Displaying a message onthe monitor screen or
eleting les onthe hard sk.
(COM or EXE progams
1c 2 3d. a8
‘Trojan has a payload but no reproduction
2
3
Cause and effect (2)
This unit toks at further ways of expressing a
kay relationship in technology ~ cause and
LUNIT8 ostaSscrty 87
effect wit the cause an effect chain inthe
‘student's book onthe board. Ask the cass to
identity the inks between the sentences.
Demonstrate how they canbe linked with
‘cause +to Vor make +V.
Many transitive verbs havea causative
‘meaning suchas activate, rise, lower. For
example,
The trigger routine uns, which activates the
poyload routine.
Note that we can also say
The trigger routine runs, activating the poyload
routine.
Finally, show how awhen clause often
indicates cause and effet
When the trigger routine runs, the payload
routine activates.
But note that not all when clauses indicate @
‘cause and effect relationship. Some ae simple
time relationships, for example, When I switch
‘on my computer, I check fr emals. Other ways
of showing cause and effec relationships are
‘covered in Units 9 (ing clauses) 10
sentences) and 19 (therefore).
6 Best done as individual writen work.
Compare answers in pais, Asa follow-up, ask
Ss to research the operation of any other
vicuses they know about. They can then
resent tele indngs tothe est of the
class,
Key6 (examples onh)
1"Wen a amssed employee's name is deleted
{fom the company’s payroll alogi bombs.
activated which causes the pay records to
be destroyed
2 When certain date occurs a tgger routine is
acthated which makes keys beep when
pressed end corrupts opps.
3 When the operator tart up the computer for
thecne hundred and twenty-ninth ime a
‘egger routine activated which cause the
screen today Bloody! Jae 41885188 UNIT 8 bata Secerty
4 When the infected programs un, the boot
sectors eorupted which causes the csk
Content tobe overwritten and data to be lost.
5 When a porticulr dat occrs the paysd is
triggered which makes characters ona text
‘mode screen side down tothe bottom,
6 When an infacted documents opened inthe
woreprecessr the virus macro executed
‘which ataches the wir coe to the default
template When the user saves anther
‘document the vus code ataches tthe saved
document. en the saved documents
‘pened inthe wordprocesso the virus
cdestoys data displays a message or lays
7. Doas individual work. You can also use tis
task asa test by setting the task without the
Ustofen-/-en verbs. ll ave been used in
cari units with the exception of enlarge and
widen.
Key
1” AMIOL message encodes sound a -bit bytes
of digital information.
2 The teachers using 3 new program to
encourage cléren to write sis
2 The new version of Simchy has been
‘enhanced in many ways
4 Agateway enables dissimilar networks to
5 You can encode data to make R secure,
6 Ensure he machine fs csconnected before
youremove te case,
7 Designers can offer good ides for brightening
yourwebste.
{8 econic readers allow you to enlarge the
print sne
9. Programmers write saftaare which enables
‘the computer to cary out particular ass.
10 You can widen te pete on your monitor
8 Do this in small groups. As afolowp at
‘Ss about any other computer crimes they know
of or any examples ofthese crimes they may
have heard about. Tere are newspaper eos
‘of computer crimes on an almost weeky baie
Key
EG
9 Ashefore, get the A to prepare together
land the Bs todo the same. Then re-par AB, A
8 forthe information exchange.
CoS
10 Do this as homework. $s can write about
thelr wn computer crime as an additional.
Dbl key cryptography
2
a
4 decrypt
Sb
6
information about the company operating the
{eever and the servers pubic key
Keys
Vow bi ci ad
2a bw ew dl el ty
3 a Fase b Tue Case d fale ¢ fake
TFabe True fh Tue
4 edba