Инфоурок Английский язык КонспектыКонспект открытого занятия по дисциплине "Иностранный язык в профессиональной деятельности" на тему "Реклама своей фирмы"

Конспект открытого занятия по дисциплине "Иностранный язык в профессиональной деятельности" на тему "Реклама своей фирмы"

Скачать материал

имени вострухина@0,5x

115172, Москва, ул. Б.Каменщики, д. 7; тел., факс: (495) 134-1234; e-mailspo-54@edu.mos.ru

 

 

 

Конспект

отрытого занятия по дисциплине

«Иностранный язык в профессиональной деятельности»

на тему «Реклама своей фирмы ( организации)»

для специальности ТОП50 10.02.04.

группа 2-ОИБТС-11-1

Преподаватели иностранного языка  Гаврилова Т.А., Медведева Е.Ю.

 

 

 

 

 

 

 

 

 

Москва

2019

Структура занятия

Группа 2-ОИБТС-11-1  специальность 10.02.04. «Обеспечение информационной безопасности телекоммуникационных систем»

Тема «Реклама своей фирмы (организации)»

Цели

•        развивающая: развитие коммуникативных, информационных и профессиональных компетенций.

•        воспитательная: развитие умения работать в команде.

•        практическая: повторение и закрепление лексики по темам «В поисках работы»,  «Информационная безопасность», «Реклама».

Оснащение занятия: презентация.

Ход урока

 

Этапы урока

 

Методическая последовательность действий учителя и учащихся

 

 

Режимы работы

(формы работы)

 

 

Время

1.     The beginning of the lesson.

 

1.      Greeting. Preliminaries of a lesson.

 

2.      Telling the theme and the aims of a lesson (communicative orientation).

 

T

 

 

 

T

5 min

1.     Presentations of the teams

 

 

2. Explanation of the scheme

 

 

 

 

 

3. Making  dialogues.

 

 

 

 

4. Performing  a presentation.

 

 

5. Finding  a mistake.

 

 

 

 

 

 

 

 

 

 

Every team presents yourselves

 

 

Every team gets a paper with the table and must explain it in details. They have 3 minutes for preparations.

 

Every team gets a task for making dialogues and have 3 minutes to think them over and prepare to answer.

 

Every team performs a presentation.

 

 

Every team get a task with a different types of informational threats.

 

.

 

Teams

 

 

 

Teams

 

 

  

 

 

 

Teams

 

 

 

 

Teams

 

 

 

Teams

10 min

 

 

 

15 min

 

 

 

 

 

 

15 min

 

 

 

 

 

15 min

 

 

 

15 min

 

 

 

 

.

 

1.     Sizing up.

 

 

1.     Your marks…

 

T

 

 

15 min

 

 

 

Приложение 1

Распределение студентов на команды

Группа 2-ОИБТС-11-1

специальность 10.02.04. «Обеспечение информационной безопасности телекоммуникационных систем»

Команда 1

1. Алерт Ева Сергеевна

2.Бабаев Омар Асрет-Алиевич

3. Вильяреал Верещака Денис Габриель

4. Колесников Сергей Алекссеевич

5. Некляев Кирилл Сергеевич

6. Самойлов Анатолий Андреевич

7.Умалатова Рашия Якубовна

Команда 2

1. Андреев Игорь Сергеевич

2. Баширов Илья Игоревич

3. Дроздов Илья Борисович

4. Мошков Евгений Станиславович

5.Смирнов Илья Николаевич

6. Федюнин Никита Сергеевич

7. Чеглаков Данил Дмитриевич

Команда 3

1.Андриященко Данил Владимирович

2. Берец Илья Владимирович

3. Иванов Вениамин Алексеевич

4. Лучников Илья Игоревич

5. Павлов  Григорий Дмитриевич

6. Подрезов Денис Сергеевич

7. Трунов Владислав Александрович

8. Халилов Рустем Нариманович

 

 

 

 

 

Приложение 2

 

Key Telecommunications Industry Segments

The telecommunications sector consists of three basic sub-sectors: telecom equipment (the largest), telecom services (next largest) and wireless communication.

The major segments within these sub-sectors include the following:

1.     Wireless communications

2.     Communications equipment

3.     Processing systems and products

4.     Long-distance carriers

5.     Domestic telecom services

6.     Foreign telecom services

7.     Diversified communication services

 

Wireless communication

Wireless communication is the transfer of information or power between two or more points that are not connected by an electrical conductor. The most common wireless technologies use radio waves. With radio waves distances can be short, such as a few meters for Bluetooth or as far as millions of kilometers for deep-space radio communications. It encompasses various types of fixed, mobile, and portable applications, including two-way radioscellular telephonespersonal digital assistants (PDAs), and wireless networking. Other examples of applications of radio wireless technology include GPS units, garage door openers, wireless computer mousekeyboards and headsetsheadphonesradio receiverssatellite televisionbroadcast television and cordless telephones. Somewhat less common methods of achieving wireless communications include the use of other electromagnetic wireless technologies, such as light, magnetic, or electric fields or the use of sound.

The term wireless has been used twice in communications history, with slightly different meaning. It was initially used from about 1890 for the first radio transmitting and receiving technology, as in wireless telegraphy, until the new word radio replaced it around 1920. The term was revived in the 1980s and 1990s mainly to distinguish digital devices that communicate without wires, such as the examples listed in the previous paragraph, from those that require wires or cables. This became its primary usage in the 2000s, due to the advent of technologies such as mobile broadbandWi-Fi and Bluetooth.

Wireless operations permit services, such as mobile and interplanetary communications, that are impossible or impractical to implement with the use of wires. The term is commonly used in the telecommunications industry to refer to telecommunications systems (e.g. radio transmitters and receivers, remote controls, etc.) which use some form of energy (e.g. radio waves, acoustic energy,) to transfer information without the use of wires.[1][2][3] Information is transferred in this manner over both short and long distances.

Telecommunications equipment

Telecommunications equipment (also telecoms equipment or communications equipment) is a hardware which is used for the purposes of telecommunications. Since the 1990s the boundary between telecoms equipment and IT hardware has become blurred as a result of the growth of the internet and its increasing role in the transfer of telecoms data.[1][2]

Types

Telecommunications equipment can be broadly broken down into the following categories:

1.     Public switching equipment- The public switched telephone network (PSTN) is the aggregate of the world's circuit-switched telephone networks that are operated by national, regional, or local telephony operators, providing infrastructure and services for public telecommunication

2.     Analogue switches- The analogue (or PETR) switch, also called the bilateral switch, is an electronic component that behaves in a similar way to a relay, but has no moving parts

3.     Digital switches- In electrical engineering, a switch is an electrical component that can "make" or "break" an electrical circuit, interrupting the current or diverting it from one conductor to another

4.     Voice over IP switches- Voice over Internet Protocol (VoIP), also called IP telephony, is a method and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet

5.     Transmission equipment- A mesh network allows for interoperability among several fixed or mobile stations that are connected without a central hierarchy via a LAN or an IP connection, thus ensuring that all users get the best possible wireless connection.

6.     Transmission lines- In radio-frequency engineering, a transmission line is a specialized cable or other structure designed to conduct alternating current of radio frequency, that is, currents with a frequency high enough that their wave nature must be taken into account.

7.     Optical fiber- a flexible, transparent fiber made by drawing glass (silica) or plastic to a diameter slightly thicker than that of a human hair

8.     Local loops- In telephony, the local loop (also referred to as the local tail, subscriber line, or in the aggregate as the last mile) is the physical link or circuit that connects from the demarcation point of the customer premises to the edge of the common carrier or telecommunications service provider's network

9.     Base transceiver stations- A base transceiver station (BTS) is a piece of equipment that facilitates wireless communication between user equipment (UE) and a network

10. Free-space optical communication-  (FSO) is an optical communication technology that uses light propagating in free space to wirelessly transmit data for telecommunications or computer networking. "Free space" means air, outer space, vacuum, or something similar. This contrasts with using solids such as optical fiber cable.

11. Laser communication in space-  free-space optical communication in outer space

12. Multiplexers- In electronics, a multiplexer (or mux), also known as a data selector, is a device that selects between several analog or digital input signals and forwards it to a single output line

13. Communications satellites- A communications satellite is an artificial satellite that relays and amplifies radio telecommunications signals via a transponder; it creates a communication channel between a source transmitter and a receiver at different locations on Earth. Communications satellites are used for television, telephone, radio, internet, and military applications

14. Customer premises equipment (CPE)- In telecommunications, a customer-premises equipment or customer-provided equipment (CPE) is any terminal and associated equipment located at a subscriber's premises and connected with a carrier's telecommunication circuit at the demarcation point ("demarc").

15. Customer office terminal- is located on the customer premises and (b) performs a function that may be integrated into the common carrier equipment.

16. Private switches- Private VLAN, also known as port isolation, is a technique in computer networking where a VLAN contains switch ports that are restricted such that they can only communicate with a given "uplink". The restricted ports are called "private ports"

17. Local area networks (LANs)- A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.[

18. Modems- A modem (portmanteau of modulator-demodulator) is a hardware device that converts data into a format suitable for a transmission medium so that it can be transmitted from computer to computer (historically over telephone wires)

19. Mobile phones- A mobile phone, cell phone, cellphone, or hand phone, sometimes shortened to simply mobile, cell or just phone, is a portable telephone that can make and receive calls over a radio frequency link while the user is moving within a telephone service area.

20. Landline telephones- A landline telephone (also known as land line, land-line, main line, home phone, landline, fixed-line, and wireline) is a phone that uses a metal wire or optical fiber telephone line for transmission as distinguished from a mobile cellular line, which uses radio waves for transmission

21. Answering machines- The answering machine, answerphone or message machine, also known as telephone answering machine (or TAM) in the UK and some Commonwealth countries, ansaphone or ansafone (from a trade name), or telephone answering device (TAD), is used for answering telephones and recording callers' messages

22. Teleprinters- A teleprinter (teletypewriter, Teletype or TTY) is an electromechanical device that can be used to send and receive typed messages through various communications channels, in both point-to-point and point-to-multipoint configurations

23. Fax machines- Fax (short for facsimile), sometimes called telecopying or telefax (the latter short for telefacsimile), is the telephonic transmission of scanned printed material (both text and images), normally to a telephone number connected to a printer or other output device

24. Pagers- A pager (also known as a beeper) is a wireless telecommunications device that receives and displays alphanumeric or voice messages

25. Routers- A router[a] is a networking device that forwards data packets between computer networks.

26. Wireless devices- Wi-Fi (/ˈwaɪfaɪ/)[1] is a family of radio technologies commonly used for wireless local area networking (WLAN) of devices

A data processing system

A data processing system is a combination of machines, people, and processes that for a set of inputs produces a defined set of outputs. The inputs and outputs are interpreted as data, facts, information etc. depending on the interpreter's relation to the system.

A term commonly used synonymously with data processing system is information system.[1] With regard particularly to electronic data processing, the corresponding concept is referred to as electronic data processing system.

A data processing system may involve some combination of:

Conversion converting data to another form or Language.

Validation – Ensuring that supplied data is "clean, correct and useful."

Sorting – "arranging items in some sequence and/or in different sets."

Summarization – reducing detail data to its main points.

Aggregation – combining multiple pieces of data.

Analysis – the "collection, organization, analysis, interpretation and presentation of data.".

Reporting – list detail or summary data or computed information.

The first machines used for data processing were punched card machines, now computers are used.

A long distance call

In telecommunications, a long distance call (U.S.) or trunk call (also known as a toll call (U.K.) is a telephone call made to a location outside a defined local calling area. Long distance calls are typically charged a higher billing rate than local calls. The term is not necessarily synonymous with placing calls to another telephone area code.

Long distance calls are classified into two categories: national or domestic calls which connect two points within the same country, and international calls which connect two points in different countries. Within the United States there is a further division into long distance calls within a single state (intrastate) and interstate calls, which are subject to different regulations (counter-intuitively, calls within states are usually more expensive than interstate calls). Not all interstate calls are long distance calls. Since 1984 there has also been a distinction between intra-local access and transport area (LATA) calls and those between different LATAs, whose boundaries are not necessarily state boundaries.

Before direct distance dialing (DDD), all long distance calls were established by special switchboard operators (long distance operators) even in exchanges where calls within the local exchange were dialed directly. Completion of long distance calls was time-consuming and costly as each call was handled by multiple operators in multiple cities. Record keeping was also more complex, as the duration of every toll call had to be manually recorded for billing purposes.

In many less-developed countries, such as Spain, Mexico, Brazil, and Egypt, calls were placed at a central office the caller went to, filled out a paper slip, sometimes paid in advance for the call, and then waited for it to be connected.[1] In Spain these were known as locutorios, literally "a place to talk". In towns too small to support a phone office, placing long distance calls was a sideline for some businesses with telephones, such as pharmacies.

In some countries, such as Canada and the United States, long-distance rates were historically kept artificially high to subsidize unprofitable flat-rate local residential services.[citation needed] Intense competition between long distance telephone companies narrowed these gaps significantly in most developed nations in the late 20th century.

The cost of international calls varies dramatically among countries. The receiving country has total discretion in specifying what the caller should be charged (by the originating company, who in a separate transaction transfers these funds to the destination country) for the cost of connecting the incoming international call with the destination customer anywhere in the receiving country. This has only a loose, and in some cases no, relation to the actual cost. Some less-developed countries, or their telephone company(s), use these fees as a revenue source.

Telecommunications services

Telecom services now include fixed-network services (data retail, Internet retail, voice retail and wholesale) and mobile services.
Fixed-data services — Includes all dedicated/private line, packet and circuit-switched access services (for example, frame relay, asynchronous transfer mode, IP, Integrated Services Digital Network, DSL, multichannel multipoint distribution service [MMDS] and satellite) retail revenue. No differentiation is made between the type of traffic or application carried by these services. All types of transmissions — nonvoice data, image, video, fax, interactive services and even voice — can be carried by these services regardless of whether the source format is analog or digital. All revenue reflects service provider annualized retail revenue — paid for by the business and residential end user of the service; no wholesale or carrier-to-carrier revenue is included.

Fixed-voice services — This reflects retail voice service revenue for all services that are sold as such to end users and includes the provision of local and long-distance services related to voice (calling charges, line rental/subscription and connection fees are included in this category), enhanced voice services, data and fax transmission over the circuit-switched PSTN, and retail voice over IP revenue — paid for by the business and residential end user of the service; no wholesale or carrier-to-carrier revenue is included.
Mobile telecom services — Income from mobile telephone calls and mobile data usage (Short Message Service [SMS] and mobile data access) from all mobile operators in that regional market. Consumer charges are removed. Income from mobile telephone calling charges, mobile data access, SMS charges, line rental/subscription and connection fees are included in this category.

Diversified Telecommunication Services

The Diversified Telecommunication Services Industry in the Communication Services Sector includes Alternative Carriers, providers of communications, and high-density data transmission services primarily through a high bandwidth/fiber-optic cable network. It includes Integrated Communication Services, operators of primarily fixed-line telecommunications networks, and companies providing both wireless and fixed-line communications services not classified elsewhere.

 

 

 

 

 

 

 

 

 

 

Приложение 3

Диалоги

1.      Сообщите другу, что занимаетесь поиском работы. Спросите его, как подготовиться к собеседованию. Он очень опытный человек и, конечно, обратит ваше внимание на самые важные моменты поведения: следует прийти на собеседование за 10-15 минут до его начала, привести себя в поря­ док, одежда должна быть строгой, не нужен яркий макияж, не забудьте взять хорошую записную книжку и ручку, личную визитку. Во время собеседования следует внимательно слушать вопросы и кратко и отчетливо отвечать на них. Не следует упоминать о своем негативном опыте работы, если он есть. Живо интересуйтесь своими обязанностями, возможностью повышения квалификации. Вопрос о заработной плате должен быть самым последним. И не забудьте поблагодарить за время, которое вам уделили. Представьте ситуацию в виде диалога.

2.         Вы вчера прошли собеседование на объявленную вакансию. Сначала вам задавали много вопросов, потом вы поинтересовались характером и формой организации работы. В конце концов вы поняли, что это престижная и высокооплачиваемая работа, а это означает то самое, о чем вы так давно мечтали. Вы, в свою очередь, удовлетворяете всем требованиям работодателей. Вы приняты, счастливы, хотите начать работать как можно скорее. Обсудите с подругой, как проходило собеседование с работодателем.

3.         К вам в фирму поступают несколько новых работников. После собеседования с каждым скажите, кто из них и на какую должность больше подходит, опишите их служебные обязанности. Составьте последовательно диалоги с каждым из претендентов на вакансию.

4.         Вы предъявляете к кандидату достаточно большой перечень требований. Приведите примеры ситуаций, в которых применимы прилагательные, описывающие работника. Найдутся ли возражения у поступающего на работу? Составьте диалог, используя слова, данные в скобках (active, attentive, constructive, cooperative, creative, diplomatic, disciplined, energetic, extraverted, independent, methodical, realistic, sincere, systematic, tactful).

5.         Убедите свою подругу, что резюме является очень важным документом при устройстве на работу. Научите ее составлять резюме согласно следующим рубрикам:

-           objective;        -           qualifications; -           education;

-           language;         -           work history;  -           personal.

 

6.         Вы работаете уже несколько лет. Добросовестно выполняете все свои обязанности. В важных вопросах про­ являете активность. Вы считаете, что вас давно уже пора продвинуть по службе и повысить оклад. Но ваш начальник как будто бы не замечает ваших стараний. Поговорите с подругой о том, как деликатно напомнить о себе и обратить внимание руководства на ваш высококачественный труд. Представьте ситуацию в диалоге.

 

 

1. Let your friend know that you are looking for work. Ask him how to prepare for the interview. He is a very experienced person and, of course, will draw your attention to the most important aspects of behavior: you should come for an interview 10-15 minutes before it starts, bring yourself to the dock, clothes should be strict, do not need bright makeup, do not forget to take a good notebook and pen, personal business card. During the interview you should carefully listen to the questions and briefly and clearly answer them. You should not mention your negative work experience, if any. Take a keen interest in your duties, the possibility of advanced training. The question of wages should be the very last. And do not forget to thank for the time that you have been given. Imagine the situation as a dialogue.

2. Yesterday you were interviewed for a vacancy. At first you were asked a lot of questions, then you asked about the nature and form of organization of work. In the end, you realized that this is a prestigious and highly paid job, and this means the very thing that you have long dreamed about. You, in turn, satisfy all the requirements of employers. You are accepted, happy, want to start working as soon as possible. Discuss with your friend how the interview was with the employer.

3. Several new employees are entering your firm. After each interview, tell each of them and which position is more suitable, describe their job responsibilities. Create dialogs with each of the job applicants in sequence.

4. You present to the candidate a fairly large list of requirements. Give examples of situations in which adjectives describing the employee are applicable. Will there be objections to a job applicant? Create a dialogue using the words given in parentheses (active, attentive, constructive, cooperative, creative, diplomatic, disciplined, energetic, extraverted, independent, methodical, realistic, sincere, systematic, tactful).

5. Convince your girlfriend that a resume is a very important document when applying for a job. Teach her how to write a resume according to the following headings:

- objective; - qualifications; - education;

- language; - work history; - personal.

 

6. You have been working for several years. Fulfill all your duties conscientiously. You are active in important matters. Do you think that it’s time for you to get promoted and increase your salary. But your boss does not seem to notice your efforts. Talk with a friend about how to delicately remind yourself and draw the attention of management to your high-quality work. Imagine the situation in the dialogue.

 

 

 

 

 

Приложение 4

Критерии оценки презентации

При оценке презентации «Моя Будущая профессия» учитываются следующие критерии:

- информационная составляющая (1-содержательность, 2-степень структурированности материала, 3-доступность изложения),

- дизайн (1-оригинальность оформления, 2-стилевое единство, 3-соответствие оформления содержанию),

- грамотность (1-следование правилам и нормам изучаемого иностранного языка, 2-уровень использования возможностей компьютерных программ)

- представление презентации (1-уровень владения языком, 2-умение заинтересовать аудиторию, 3-свобода изложения).

 

Примерное построение презентации

«Моя будущая профессия» по отдельным слайдам

Раздел 1 Слайд 1 (the name of the theme, the name of the author, the name of the college)

Раздел 2  Content:

Слайд 2      1) Information about the author (1)

Слайд 3      2) My future profession (1-4)

Слайд 4       3)  Related fields (1-4)

Слайд 5       4) Training (1-4)

Слайд 6       5) Duties (1-4)

Раздел 3      Thank you for your attention (1)

Раздел

Содержание

Количество слайдов

1

the name of the theme, the name of the author, the name of the college

 

1

2

1.     Information about the author

1-4

2.     My future profession

1-4

3.     Related fields

1-4

4.     Training

1-4

5.     Duties

1-4

3

Thank you for your attention

1

 

 

Итого: 7-22

 

 

 

Приложение 5

Computer threats

1.     Vulnerabilities (уязвимость системы)

2.     Spyware (шпионское ПО)

3.     Spam

4.     Malware (вредоносное программное обеспечение)

5.     Fishing

Computer Threats

Learn What’s Out There and How to Protect Yourself

If you do not take measures to keep your computer safe, your computer -- and you -- could become the target of a cybercrime.

Cybercrimes are those instances when criminals, known as hackers or attackers, access your computer for malicious reasons. You can fall victim any time you are on an unprotected computer, receive a deceptive email claiming there is an “urgent matter” regarding your Monster account or just surfing the Web. They might be seeking sensitive, personal identification information stored on your computer, like credit card numbers or private account logins they use for financial gain or to access your online services for criminal purposes. Or they could want your computer’s resources, including your Internet connection, to increase their bandwidth for infecting other computers. This also allows them to hide their true location as they launch attacks. The more computers a criminal hides behind, the harder it becomes for law enforcement to figure out where the criminal is. If the criminal can’t be found, he can’t be stopped and prosecuted.

There are many different threats to your computer’s safety, as well as many different ways a hacker could try to steal your data or infect your computer. Once on a computer, the threat will tend to show little to no symptoms so it can survive for a prolonged period undetected. Your online security and cybercrime prevention can be straightforward. In general, online criminals are trying to make their money as quickly and easily as possible. The more difficult you make their job, the more likely they are to leave you alone and move on to an easier target.

We’ve compiled a list of the different types of threats that are out there along with some recommended steps you can take to reduce your susceptibility to these threats, using information from Symantec, a global leader in infrastructure software that helps consumers to protect their infrastructure, information and interactions.

 

 

Computer Threat #1: Vulnerabilities

How they attack: Vulnerabilities are flaws in computer software that create weaknesses in your computer or network’s overall security. Vulnerabilities can also be created by improper computer or security configurations. Threats exploit the weaknesses of vulnerabilities, resulting in potential damage to the computer or its data.              How do you know? Companies announce vulnerabilities as they are discovered and quickly work to fix them with software and security "patches."

What to Do

  • Keep software and security patches up to date.
  • Configure security settings for your operating system, Internet browser and security software. 
  • Companies should develop personal security policies for online behavior, and individuals should be sure to adopt their own policies to promote online safety.
  • Install a proactive security solution like Norton Internet Security to block threats targeting vulnerabilities.

Computer Threat #2: Spyware

How it attacks: Spyware can be downloaded from Web sites, email messages, instant messages and direct file-sharing connections. Additionally, a user may unknowingly receive spyware by accepting an End User License Agreement from a software program.          How do you know? Spyware frequently attempts to remain unnoticed, either by actively hiding or simply not making its presence on a system known to the user.

What to Do

  • Use a reputable Internet security program to proactively protect from spyware and other security risks.
  • Configure the firewall in the reputable Internet security program to block unsolicited requests for outbound communication.
  • Do not accept or open suspicious error dialogs from within the browser.
  • Spyware may come as part of a "free deal" offer -- do not accept free deals.
  • Always carefully read the End User License agreement at Install time and cancel if other “programs” are being installed as part of the desired program.
  • Keep software and security patches up to date.

 

 

 

Computer Threat #3: Spam

How it attacks: Email spam is the electronic version of junk mail. It involves sending unwanted messages, often unsolicited advertising, to a large number of recipients. Spam is a serious security concern, as it can be used to deliver email that could contain Trojan horses, viruses, worms, spyware and targeted attacks aimed at obtaining sensitive, personal identification information.

How do you know? Messages that do not include your email address in the TO or CC fields are common forms of spam. Some spam can contain offensive language or links to Web sites with inappropriate content. Also, some spam may include hidden text that only becomes visible if you highlight the content -- a common trick spammers use to get their email to pass through spam filters without detection.

What to Do                   Install Spam filtering/blocking software.

  • If you suspect an email is spam, do not respond -- just delete it.
  • Consider disabling your email’s preview pane and reading emails in plain text.
  • Reject all Instant Messages from people who are not on your Buddy list.
  • Do not click on URL links within IM unless they are from a known source and expected.
  • Keep software and security patches up to date.

Computer Threat #4: Malware

How it attacks: Malware is a category of malicious code that includes viruses, worms and Trojan horses. Destructive malware will use popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from Web sites and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy.                 How do you know? Malware works to remain unnoticed, either by actively hiding or by simply not making its presence on a system known to the user. You might notice your system is processing at a slower rate than what you are used to.

What to Do

  • Only open email or IM attachments that come from trusted sources and are expected.
  • Have email attachments scanned by a reputable Internet security program prior to opening.
  • Delete all unwanted messages without opening.
  • Do not click on Web links sent by someone you do not know.
  • If a person on your Buddy list is sending strange messages, files or Web site links, terminate your IM session.
  • Scan all files with a reputable Internet security program before transferring them to your system.
  • Only transfer files from well-known sources.
  • Use a reputable Internet security program to block all unsolicited outbound communication.
  • Keep security patches up to date.

Computer Threat #5: Phishing

How it attacks: Phishing is essentially an online con game, and phishers are nothing more than tech-savvy con artists and identity thieves. They use spam, malicious Web sites, email messages and instant messages to trick people into divulging sensitive information, such as bank and credit card information or access to personal accounts. For more detail on what phishing is as well as to review examples of phishing email, please visit the Email Scam section of Monster’s Security Center.

How do you know? Here are four ways to identify phishing scams:

  • Phishers, pretending to be legitimate companies, may use email to request personal information and instruct recipients to respond through malicious Web sites. They may also claim that an urgent action is needed to lure recipients into downloading malicious programs onto their computers.
  • Phishers tend to use emotional language like scare tactics or urgent requests to entice recipients to respond.
  • Phish sites can look remarkably like legitimate sites, because the criminals tend to use the copyrighted images from genuine sites.
  • Requests for confidential information via email or Instant Message tend to not be legitimate.

After you open and run an infected program or attachment, you might not notice the impacts to your computer right away. Here are a few indicators that might indicate your computer has been infected:

  • Your computer runs more slowly than normal.
  • Your computer stops responding or locks up often.
  • Your computer crashes and restarts every few minutes. 
  • Your computer restarts on its own and then fails to run normally.
  • You see unusual error messages.
  • You see distorted menus and dialog boxes.

What to Do          If you believe you received a phishing email, were lured to click on the link or download a program and are concerned you may have some type of malicious program installed on your computer, here are some things you may want to check:             Is your virus scan running?

  • Are your virus definitions up to date (less than a week old)?
  • Did you perform full disk/memory virus scan.
  • Are you running anti-spyware programs such as Adaware and/or SpybotSD?
  • Once you run your scans and have positive results or remove programs, ensure your online accounts are secure -- modify your account passwords.
  • Make sure that you have enabled your Phishing Filter, a feature of Windows Internet Explorer 7.
  • Contact your anti-spyware/virus vendor to find out other steps you can take.

Приложение 6

 

Make your own advertising of any new device, using the words from the list.

1.     You

2.     Click

3.     Free

4.     Try

5.     Ends

6.     Learn

7.     Find

8.     Grow

9.     Love

10. Time

11. Don’t

12. Fast

13. Unique

14. Start

15. be

 

Просмотрено: 0%
Просмотрено: 0%
Скачать материал
Скачать материал "Конспект открытого занятия по дисциплине "Иностранный язык в профессиональной деятельности" на тему "Реклама своей фирмы""

Методические разработки к Вашему уроку:

Получите новую специальность за 2 месяца

Управляющий рестораном

Получите профессию

Секретарь-администратор

за 6 месяцев

Пройти курс

Рабочие листы
к вашим урокам

Скачать

Скачать материал

Найдите материал к любому уроку, указав свой предмет (категорию), класс, учебник и тему:

6 663 116 материалов в базе

Материал подходит для УМК

Скачать материал

Другие материалы

Вам будут интересны эти курсы:

Оставьте свой комментарий

Авторизуйтесь, чтобы задавать вопросы.

  • Скачать материал
    • 22.11.2019 551
    • DOCX 146.6 кбайт
    • Оцените материал:
  • Настоящий материал опубликован пользователем Гаврилова Татьяна Александровна. Инфоурок является информационным посредником и предоставляет пользователям возможность размещать на сайте методические материалы. Всю ответственность за опубликованные материалы, содержащиеся в них сведения, а также за соблюдение авторских прав несут пользователи, загрузившие материал на сайт

    Если Вы считаете, что материал нарушает авторские права либо по каким-то другим причинам должен быть удален с сайта, Вы можете оставить жалобу на материал.

    Удалить материал
  • Автор материала

    • На сайте: 9 лет и 6 месяцев
    • Подписчики: 3
    • Всего просмотров: 100475
    • Всего материалов: 11

Ваша скидка на курсы

40%
Скидка для нового слушателя. Войдите на сайт, чтобы применить скидку к любому курсу
Курсы со скидкой

Курс профессиональной переподготовки

Фитнес-тренер

Фитнес-тренер

500/1000 ч.

Подать заявку О курсе

Курс повышения квалификации

Английский для специальных целей (ESP)

36 ч. — 144 ч.

от 1700 руб. от 850 руб.
Подать заявку О курсе
  • Сейчас обучается 117 человек из 50 регионов
  • Этот курс уже прошли 460 человек

Курс повышения квалификации

Актуальные вопросы преподавания английского языка в условиях реализации ФГОС

72 ч.

2200 руб. 1100 руб.
Подать заявку О курсе
  • Сейчас обучается 352 человека из 75 регионов
  • Этот курс уже прошли 1 232 человека

Курс повышения квалификации

Повышение мотивации и эффективности обучения иностранному языку с помощью интерактивных тренажеров (на примере английского языка)

36 ч. — 144 ч.

от 1700 руб. от 850 руб.
Подать заявку О курсе
  • Сейчас обучается 280 человек из 53 регионов
  • Этот курс уже прошли 1 071 человек

Мини-курс

Продвижение экспертной деятельности: от личного сайта до личного помощника

6 ч.

780 руб. 390 руб.
Подать заявку О курсе

Мини-курс

Басня как педагогическая технология

5 ч.

780 руб. 390 руб.
Подать заявку О курсе

Мини-курс

Стимулирование интереса к обучению у детей дошкольного возраста

6 ч.

780 руб. 390 руб.
Подать заявку О курсе
  • Этот курс уже прошли 11 человек