希望英语(第二版)综合教程第八单元

上传人:bei****lei 文档编号:252589460 上传时间:2024-11-18 格式:PPT 页数:15 大小:1.90MB
返回 下载 相关 举报
希望英语(第二版)综合教程第八单元_第1页
第1页 / 共15页
希望英语(第二版)综合教程第八单元_第2页
第2页 / 共15页
希望英语(第二版)综合教程第八单元_第3页
第3页 / 共15页
点击查看更多>>
资源描述
,希望英语(第二版),综合教程,1,Unit 8 Crime,andpunishment,Reading A-Paragraph 1.2.3,希望英语(第二版),综合教程,2,Reading A,Task 2 Text,Computer Crime,Definitions of computer crime have change over the years as the users and,misusers,of computers have expanded into new areas.When computers were first introduced into,businesses,computer,crime was defined simply as a form if white-collar crime committed inside a computer system.Since,then,some,new terms have been added to the computer criminal vocabulary.Trojan Horse is a hidden code put into a computer program.,Logic bombs are implanted so that the criminal doesnt have to physically present himself or,herself.Another,form of a hidden code is,salamis,It,came from the big salami loaves sold in delis years ago.Often people would take small portions out of the loaves and then secretly return the rest to the shelves in the hopes that no one would notice them missing.,Reading A,Task 2 Text,People commit computer crimes because of societys declining ethical standards more than any economic,need.According,to,experts,gander,is the only,bias.The,profile of todays non-professional thieves crosses all,races,ago,groups and economic,strata.,Computer,criminals tend to be relatively honest and in a position of,trust:few,would do anything to harm another,human,and,most do not consider their crime to be truly dishonest.Most are,males:women,have tended to be,accomplices,though,of late they are becoming more,aggressive.Computer,criminals tend to be usually between the ages of 14-30.They are usually,bright,eager,highly,motivated,adventurous,and,willing to accept technical challenges.,Reading A,Task 2 Text,It is tempting to compare computer criminals to other,criminals,ascribing,characteristics somehow different from“,normal”individuals,but,that is not the case.,It is believed that the computer criminal often marches to the same drum as the potential victim but follows an unanticipated path.There is no actual profile of a computer criminal because they range from young teenagers to,elders,from,black to white from short to tall.,Reading A,计算机犯罪,计算机的犯罪改变多年来为用户和用计算机的人已深入到新的领域。当计算机第一次引入计算机系统的企业,计算机犯罪成为了新的术语。特洛伊木马是放入计算机程序的隐藏代码。它客观上犯罪是隐藏了自己。,Text,Reading A,计算机犯罪分子往往是比较老实和信任的:很少人认为他不会去伤害一个人,大多数人认为他们不是是真正犯罪。犯罪分子大部分都是男性,:,妇女往往是同谋,虽然他们更具侵略性。计算机犯罪分子往往通常是年龄在,14-30,岁,.,他们通常是聪明的、有追求的、有动机的、爱冒险的,和愿意接受的技术挑战的。,Text,Reading A,人们认为计算机犯罪通常按相同招数作为潜在的受害者,但之前一个未预料到的路径。没有实际的概要文件的计算机犯罪,因为它们的范围从小到大,由黑到白,从短到高。,A-Trans-3,Text,Reading A,Task 2,New Words and Expressions,n.,同谋,共犯,帮凶,accomplice,e.g.,The police are still looking for the thiefs accomplice.,tackle,Text,警方仍在寻找这个小偷的同伙。,n.,偏见,成见;偏心,bias,e.g.,Some people have a bias against foreigners.,tackle,Text,Reading A,Task 2,New Words and Expressions,adj.,斜的;斜纹的,有些人对外国人有偏见。,adj.,道德的,伦理的,ethical,e.g.,I wont do it;its not ethical.,tackle,Text,Reading A,Task 2,New Words and Expressions,我不会这么做,;,这不符合职业道德。,a.,诱人的;吸引人的,tempting,e.g.,A nap is a tempting idea.,tackle,Text,Reading A,Task 2,New Words and Expressions,睡一会午觉这主意很不错。,1.,现在分词短语作状语时,句子主语与分词动作成主谓关系。,2.,分词短语可放在名词后面作宾语补足语。,3.,分词短语作状语时,如果与句子主语不一致,则应在分词前加上其逻辑主语,构成独立诸葛结构。,4.,过去分词短语作壮语时,分词动作与句子主语构成动宾关系。,现在分词和过去分词的特殊用法,tackle,Text,Reading A,Task 2,课文中涉及到的语法,tackle,Text,Reading A,Task 2,语法练习,If,(,heat,),,water will boil,。,The police caught him,(,steal)the,bike.,heated,stealing,课外常识,-,计算机犯罪,计算机网络犯罪主要指运用计算机技术借助于网络实施的具有严重社会危害性的行为。网络的普及程度越高,网络犯罪的危害也就越大,而且网络犯罪的危害性远非一般的传统犯罪所能比拟。网络犯罪是一种特殊环境下的新型犯罪行为,只有正确认识和掌握网络犯罪的本质及内涵,才能有针对性地制定有效策略惩治网络犯罪行为。,形 式:,1,、网络入侵,散布破坏性,病毒,、,逻辑炸弹,或者放置后门程序犯罪,2,、网络入侵,偷窥、复制、更改或者删除计算机信息犯罪,3,、网络 诈骗、教唆犯罪,4,、网络侮辱、诽谤与恐吓犯罪,5,、网络色情传播犯罪,Thank You!,希 望 英 语(第二版)综合教程,1,
展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 办公文档 > 教学培训


copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!