11 COMPUTING AND ETHICS
11.3 Extending skills
stress in phrases • building an argument
A Study the phrases in box a. 1 Mark the stressed syllables in each phrase.
2 ≤Listen and check your answers.
3 Which phrases have adjective + noun? Which word has the stronger stress in these phrases?
B Look at the topics below. ●
companies and the law
● justifying illegal activities ● ethical hacking
1 What would you like to know about these topics?
2 Prepare a page in your notebook to make some notes.
3
≤Listen to the final part of the lecture (Part 3) and make notes. If there is information which you miss, leave a space.
4 Compare your notes with someone else. Fill in any blank spaces.
C Answer the questions on the Hadford University handout, using your notes.
D Study the stages of building an argument (a–f) in box b.
1 Put the stages in an appropriate order. 2 Match each stage with a phrase from box c.
E Look at box b again. 1
≤Listen to a section from the lecture. Make notes on what the lecturer says for each stage of the argument (a–f).
2 Check your answers to Exercises D and E1.
F Use your notes to write 75–100 words about the main points in the final part of the lecture.
G In groups, discuss the research task set by the lecturer. Talk about these questions:
1 What are the three points in relation to hacking that you will need to consider?
2 Which one will you choose? 3 What ideas do you already have? 4 What kind of information will you need to find? 5 Where can you go to find more information?
c It’s quite clear that … But the question is … Research has shown that … I’m afraid that just isn’t true. Some computer professionals claim … Evidence to support this …
Report back to the class on your discussion. In Lesson 11.4 you will take part in a seminar on this topic.
89
1 What does the lecturer see as the purpose of company regulations?
2 What should Logistep employees have been able to do?
3 How did the BBC appear to break the law in 2009?
4 Why did the BBC avoid prosecution?
5 How does the lecturer describe ethical hacking?
6 What is your research task?
a disciplinary action black hat
identity theft denial of service software exploit social engineering illegal activities bulletin board
b a giving a counter-argument b giving your opinion c stating the issue d supporting the reason with evidence e rejecting a counter-argument f giving a reason for your opinion
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68 |
Page 69 |
Page 70 |
Page 71 |
Page 72 |
Page 73 |
Page 74 |
Page 75 |
Page 76 |
Page 77 |
Page 78 |
Page 79 |
Page 80 |
Page 81 |
Page 82 |
Page 83 |
Page 84 |
Page 85 |
Page 86 |
Page 87 |
Page 88 |
Page 89 |
Page 90 |
Page 91 |
Page 92 |
Page 93 |
Page 94 |
Page 95 |
Page 96 |
Page 97 |
Page 98 |
Page 99 |
Page 100 |
Page 101 |
Page 102 |
Page 103 |
Page 104 |
Page 105 |
Page 106 |
Page 107 |
Page 108 |
Page 109 |
Page 110 |
Page 111 |
Page 112 |
Page 113 |
Page 114 |
Page 115 |
Page 116 |
Page 117 |
Page 118 |
Page 119 |
Page 120 |
Page 121 |
Page 122 |
Page 123 |
Page 124 |
Page 125 |
Page 126 |
Page 127 |
Page 128 |
Page 129 |
Page 130 |
Page 131 |
Page 132 |
Page 133 |
Page 134 |
Page 135 |
Page 136 |
Page 137 |
Page 138 |
Page 139 |
Page 140