You are on page 1of 2
3, Dotisiniuy onto wet ion vey ‘fo cat rogan carl te vs 2 Welles epee ese eae er areas let pn 4 Successful scanning depends not only on recognising quickly the Information you want but also on tearing to ignore information ‘hich i nt relevant to your task. Encourage the $s o focus only on those parts which wit help them check their answers to Task 3. The first sentence ofa paragraph often sa good clue tots contents as a whole. ft suggests ‘the paragraph may contain the answer to one ofthe questions, tis worth reading on with 5. Do this individually then compare in pais. ‘This task requires close reading, The answers have tobe inferred as they are not clearly stated, Keys 1 They reproduce inside a host which they damage or destroy. ttean copy tse nt ay program les They can stay dormant inthe memory unt iggered. 4 Displaying a message onthe monitor screen or eleting les onthe hard sk. (COM or EXE progams 1c 2 3d. a8 ‘Trojan has a payload but no reproduction 2 3 Cause and effect (2) This unit toks at further ways of expressing a kay relationship in technology ~ cause and LUNIT8 ostaSscrty 87 effect wit the cause an effect chain inthe ‘student's book onthe board. Ask the cass to identity the inks between the sentences. Demonstrate how they canbe linked with ‘cause +to Vor make +V. Many transitive verbs havea causative ‘meaning suchas activate, rise, lower. For example, The trigger routine uns, which activates the poyload routine. Note that we can also say The trigger routine runs, activating the poyload routine. Finally, show how awhen clause often indicates cause and effet When the trigger routine runs, the payload routine activates. But note that not all when clauses indicate @ ‘cause and effect relationship. Some ae simple time relationships, for example, When I switch ‘on my computer, I check fr emals. Other ways of showing cause and effec relationships are ‘covered in Units 9 (ing clauses) 10 sentences) and 19 (therefore). 6 Best done as individual writen work. Compare answers in pais, Asa follow-up, ask Ss to research the operation of any other vicuses they know about. They can then resent tele indngs tothe est of the class, Key6 (examples onh) 1"Wen a amssed employee's name is deleted {fom the company’s payroll alogi bombs. activated which causes the pay records to be destroyed 2 When certain date occurs a tgger routine is acthated which makes keys beep when pressed end corrupts opps. 3 When the operator tart up the computer for thecne hundred and twenty-ninth ime a ‘egger routine activated which cause the screen today Bloody! Jae 41885 188 UNIT 8 bata Secerty 4 When the infected programs un, the boot sectors eorupted which causes the csk Content tobe overwritten and data to be lost. 5 When a porticulr dat occrs the paysd is triggered which makes characters ona text ‘mode screen side down tothe bottom, 6 When an infacted documents opened inthe woreprecessr the virus macro executed ‘which ataches the wir coe to the default template When the user saves anther ‘document the vus code ataches tthe saved document. en the saved documents ‘pened inthe wordprocesso the virus cdestoys data displays a message or lays 7. Doas individual work. You can also use tis task asa test by setting the task without the Ustofen-/-en verbs. ll ave been used in cari units with the exception of enlarge and widen. Key 1” AMIOL message encodes sound a -bit bytes of digital information. 2 The teachers using 3 new program to encourage cléren to write sis 2 The new version of Simchy has been ‘enhanced in many ways 4 Agateway enables dissimilar networks to 5 You can encode data to make R secure, 6 Ensure he machine fs csconnected before youremove te case, 7 Designers can offer good ides for brightening yourwebste. {8 econic readers allow you to enlarge the print sne 9. Programmers write saftaare which enables ‘the computer to cary out particular ass. 10 You can widen te pete on your monitor 8 Do this in small groups. As afolowp at ‘Ss about any other computer crimes they know of or any examples ofthese crimes they may have heard about. Tere are newspaper eos ‘of computer crimes on an almost weeky baie Key EG 9 Ashefore, get the A to prepare together land the Bs todo the same. Then re-par AB, A 8 forthe information exchange. CoS 10 Do this as homework. $s can write about thelr wn computer crime as an additional. Dbl key cryptography 2 a 4 decrypt Sb 6 information about the company operating the {eever and the servers pubic key Keys Vow bi ci ad 2a bw ew dl el ty 3 a Fase b Tue Case d fale ¢ fake TFabe True fh Tue 4 edba

You might also like