0% found this document useful (0 votes)
32 views

Unit 4

Uploaded by

Lyhour HENG
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views

Unit 4

Uploaded by

Lyhour HENG
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Vocabulary pronuciation

Listen to each word. Record each word. Then listen and practice your pronunciation. You do
not submit this to your teacher.

1.confront

2.conserve

3.consolidate

4.crucial

5.devastating

6.erosion

7.extinct

8.genetic

9.inevitable

10.Plan B

11.urgency

12.vulnerability

Vocabulary practice
www.irLanguage.com
Complete each sentence with the word from the word bank that has
a similar meaning to the word or phrase in parentheses.

Confronting devastating extinct inevitable urgency consolidate


genetic conserve erosion Plan B crucial vulnerability
1. The (weakness) ___________ of plants and animals in the modern
world is the main reason why they need to be protected.
2. The businessmen developing the wildlife refuge into a tourist spot are
(facing) __________ a lot of opposition from the environmentalists.
3. The dinosaurs became (wiped out) ____________ a long time ago.
4. Some scientists feel that climate change is (bound to happen)
________________ , and the world is going to become warmer.
5. The (washing away) __________ of the mountainside by the rain
destroyed the bears' habitat.
6. Scientists want to protect the (inherited) ___________ characteristics
found in wild plants.
7. When the world is faced with a global issue, it is (essential)
_____________ that different countries work together to solve the
problem.
8. The (disastrous) ______________ storm destroyed all of the farmer's
crops.
9. The scientists need to have a (different idea) _____________ in case
the first solution does not work.
10.The government wants to (combine) ____________ all of the country's
parks into a national park system.
11.We need to (look after and keep) _____________ our natural resources
for future generations of people.
12.The continuing destruction of the world's rain forests adds a lot of
(pressure) ____________ to finding and preserving rare plant species.

Reading Comprehension: Safeguarding the World's


Network
www.irLanguage.com
Read the magazine interview. Then choose the correct word or
words to complete each sentence.
Safeguarding the World's Network
At the turn of the 21st century, the world held its collective breath, wondering if
computer systems around the world would crash because of an error in the way the internal
clocks were set up. Programmers and systems analysts for governments, organizations, and
businesses worked feverishly to create repairs that would prevent such a collapse.
Fortunately, the worst didn't happen in Y2K (year 2000), but it could yet. The danger
wouldn't come from a programming error, but from something far more sinister—a cyber
attack. Here is an interview with Terry Banfield, an expert in computer security, talking
about the threat and how we need to confront
Interviewer: What exactly is the threat we face, and how serious is it?
Banfield: A recent background paper by the United Nations on fighting cybercrime, or
Internet criminals, calls cyberspace "the fifth common space—after land, sea, air, and outer
space." All of us live, at least partially, in this common space. So all of us share vulnerability
to criminals who might use the Internet to steal our identities, to commit fraud or other
crimes, and perhaps most devastating, to destroy the infrastructure our lives depend on.
Interviewer: What do you mean by "infrastructure"?
Banfield: I'm talking about all those things that make our modern world run—systems of
defense, transportation, energy, you name it—we use computers to make those systems
run. And they are always at risk.
Interviewer: That sounds terrifying. What is being done?
Banfield: Quite a lot actually. Governments, corporations, nonprofit organizations, and
even individuals are fighting this war on a daily basis. One example of international
collaboration on this issue is the Council of Europe's 2001 agreement called the "Convention
on Cybercrime." The agreement sets up guidelines for sharing data between governments in
cross-border cases of bank fraud, identity theft, and other online types of organized crime.
Interviewer: How exactly can our various systems be destroyed by cybercriminals?
Banfield: Well, there are three different ways criminals can take over your computer:
Trojans, viruses, and worms. A Trojan is like the Trojan horse*—it acts like something
innocent and then once it's in your computer, it takes over. A virus slips behind your
defenses when you do something like click on an unknown attachment. A virus is harmful
because it might destroy all your documents, for example. A worm infects your computer
too, but unlike a virus, it doesn't destroy your stuff; it uses your computer to spread to other
computers. Its destructive power lies in the way it links perhaps millions of computers,
making them vulnerable to a disabling command, perhaps at some future time.
Interviewer: Can the typical user tell that his or her computer has been infected? And don't
all those security software applications stop such invasions?
Banfield: Good questions. First, you may not be able to tell that you have a virus or worm,
what we also callmalware. In the not-too-distant past, viruses used to make your computer
run more slowly. You'd get weird pop-up ads, and your computer would freeze or crash.
These infections were a big annoyance for the individual user, but they weren't effective on
a grand scale. They'd self-destruct because the computer would crash, or the user would get
the problem fixed. And security software is now pretty good at noticing, preventing, and
eliminating these more obvious problems.

www.irLanguage.com
In general, though, malware is getting sneakier. One particular worm called Conficker
spread to many computers that used various forms of Windows on the Microsoft operating
system. Computer experts around the world began to notice this worm and watch it spread.
Interviewer: How do you find malware if it's so sneaky and doesn't really do anything?
Banfield: Basically, we leave an isolated computer—one not connected to our network—
unprotected, and we watch it. We see what happens. We see how the worm spreads to
other unprotected computers that we watch. This tells us how the worm works, and then,
this loose organization of experts from governments, businesses, and nonprofit
organizations figures out ways to stop it. Another way to learn more about worms and their
creators is to search out online forums, the places where serious computer geeks chat and
even brag about what they can do.
Interviewer: So just what is the scale of the problem?
Banfield: Symantec, a company that develops security software, says that in 2007 they
identified just over 600,000 viruses and worms, but that was up to 1.6 million in 2008. As
you might expect, credit card information was the most likely information to be stolen as a
result of these viruses, and bank account information was second. So you can see that most
viruses and worms are being developed so that criminals can steal your money. However,
police in the United Kingdom and Finland just worked together to successfully find and
prosecute a wanted group of criminals. This group had infected hundreds of thousands of
computers in Great Britain and elsewhere to steal financial information. So we are making
progress on these issues.
Interviewer: What more do you think needs to be done?
Banfield: Personally, I think we need even more cooperation around the issues of Internet
security, not just to safeguard our personal information and finances, but to protect the
systems we rely on. But that's for governments to figure out. I'm not sure everyone has a
Plan B if these systems do fail.

*Trojan horse—according to legend, this was a hollow wooden horse that the Greeks used
to gain entrance to Troy and later open the gates to the Greek army. Since then, it has come
to mean a group or device placed behind enemy lines or a computer program that looks
legitimate but has a destructive effect.
1. People around the world worried that computers would crash in 2000.
This situation was known as ____.
o Twenty zero
o Y2K
o internal clocks
2. Terry Banfield's profession is ____.
o a computer hacker
o a computer security expert
o a journalist and interviewer
3. Cybercrime refers to crime committed ____.
o in public spaces
o on the Internet
www.irLanguage.com
o by fraud
4. An example of infrastructure is ____.
o transportation systems
o identity theft
o the United Nations
5. According to Banfield, something that uses your computer to spread to
other computers but doesn't actually damage your computer is called a
____.
o Torjan horse
o Virus
o worm
6. In the past, we would fix malware problems because ____.
o they didn't cause any problems
o we'd notice our computers were running slower
o they didn't spread to other computers
7. Computer security experts learn about new malware by ____.
o reading about them in computer magazines
o seeing how malware spreads through their networks
o watching unprotected, isolated computers
8. According to Banfield, sometimes hackers talk about their work ____.
o in emails to their friends
o at public conferences
o in online chatrooms
9. In discussing the number of viruses identified in 2007 and 2008, Banfield
said that ____ information was the most likely item to be stolen as a
result of the viruses.
o bank account
o passport
o credit card
10.Two governments that worked together to investigate cybercrime were
____.
o Finland and Great Britain
o the United Kingdom and France
o Great Britain and the United States

www.irLanguage.com
Reading Skill: Making inferences
Choose the most logical inference for the following statements from
the magazine interview.
Safeguarding the World's Network
At the turn of the 21st century, the world held its collective breath, wondering if
computer systems around the world would crash because of an error in the way the internal
clocks were set up. Programmers and systems analysts for governments, organizations, and
businesses worked feverishly to create repairs that would prevent such a collapse.
Fortunately, the worst didn't happen in Y2K (year 2000), but it could yet. The danger
wouldn't come from a programming error, but from something far more sinister—a cyber
attack. Here is an interview with Terry Banfield, an expert in computer security, talking
about the threat and how we need to confront
Interviewer: What exactly is the threat we face, and how serious is it?
Banfield: A recent background paper by the United Nations on fighting cybercrime, or
Internet criminals, calls cyberspace "the fifth common space—after land, sea, air, and outer
space." All of us live, at least partially, in this common space. So all of us share vulnerability
to criminals who might use the Internet to steal our identities, to commit fraud or other
crimes, and perhaps most devastating, to destroy the infrastructure our lives depend on.
Interviewer: What do you mean by "infrastructure"?
Banfield: I'm talking about all those things that make our modern world run—systems of
defense, transportation, energy, you name it—we use computers to make those systems
run. And they are always at risk.
Interviewer: That sounds terrifying. What is being done?
Banfield: Quite a lot actually. Governments, corporations, nonprofit organizations, and
even individuals are fighting this war on a daily basis. One example of international
collaboration on this issue is the Council of Europe's 2001 agreement called the "Convention
on Cybercrime." The agreement sets up guidelines for sharing data between governments in
cross-border cases of bank fraud, identity theft, and other online types of organized crime.
Interviewer: How exactly can our various systems be destroyed by cybercriminals?
Banfield: Well, there are three different ways criminals can take over your computer:
Trojans, viruses, and worms. A Trojan is like the Trojan horse*—it acts like something
innocent and then once it's in your computer, it takes over. A virus slips behind your
defenses when you do something like click on an unknown attachment. A virus is harmful
because it might destroy all your documents, for example. A worm infects your computer
too, but unlike a virus, it doesn't destroy your stuff; it uses your computer to spread to other
computers. Its destructive power lies in the way it links perhaps millions of computers,
making them vulnerable to a disabling command, perhaps at some future time.
Interviewer: Can the typical user tell that his or her computer has been infected? And don't
all those security software applications stop such invasions?
Banfield: Good questions. First, you may not be able to tell that you have a virus or worm,
what we also callmalware. In the not-too-distant past, viruses used to make your computer

www.irLanguage.com
run more slowly. You'd get weird pop-up ads, and your computer would freeze or crash.
These infections were a big annoyance for the individual user, but they weren't effective on
a grand scale. They'd self-destruct because the computer would crash, or the user would get
the problem fixed. And security software is now pretty good at noticing, preventing, and
eliminating these more obvious problems.
In general, though, malware is getting sneakier. One particular worm called Conficker
spread to many computers that used various forms of Windows on the Microsoft operating
system. Computer experts around the world began to notice this worm and watch it spread.
Interviewer: How do you find malware if it's so sneaky and doesn't really do anything?
Banfield: Basically, we leave an isolated computer—one not connected to our network—
unprotected, and we watch it. We see what happens. We see how the worm spreads to
other unprotected computers that we watch. This tells us how the worm works, and then,
this loose organization of experts from governments, businesses, and nonprofit
organizations figures out ways to stop it. Another way to learn more about worms and their
creators is to search out online forums, the places where serious computer geeks chat and
even brag about what they can do.
Interviewer: So just what is the scale of the problem?
Banfield: Symantec, a company that develops security software, says that in 2007 they
identified just over 600,000 viruses and worms, but that was up to 1.6 million in 2008. As
you might expect, credit card information was the most likely information to be stolen as a
result of these viruses, and bank account information was second. So you can see that most
viruses and worms are being developed so that criminals can steal your money. However,
police in the United Kingdom and Finland just worked together to successfully find and
prosecute a wanted group of criminals. This group had infected hundreds of thousands of
computers in Great Britain and elsewhere to steal financial information. So we are making
progress on these issues.
Interviewer: What more do you think needs to be done?
Banfield: Personally, I think we need even more cooperation around the issues of Internet
security, not just to safeguard our personal information and finances, but to protect the
systems we rely on. But that's for governments to figure out. I'm not sure everyone has a
Plan B if these systems do fail.

*Trojan horse—according to legend, this was a hollow wooden horse that the Greeks used
to gain entrance to Troy and later open the gates to the Greek army. Since then, it has come
to mean a group or device placed behind enemy lines or a computer program that looks
legitimate but has a destructive effect.

1. Programmers and systems analysts for governments, organizations, and


businesses worked feverishly to create repairs that would prevent such a
collapse.
o There could have been a lot of serious problems if the world didn't
prepare for Y2K.
o Trying to fix the computer problems for Y2K made many people
sick.
www.irLanguage.com
2. A recent background paper by the United Nations on fighting
cybercrime, or Internet criminals, calls cyberspace "the fifth common
space—after land, sea, air, and outer space."
o This is an issue that affects people all over the world.
o The United Nations shouldn't become involved in preventing
cybercrimes.
3. I'm talking about all those things that make our modern world run—
systems of defense, transportation, energy, you name it—we use
computers to make those systems run. And they are always at risk.
o If we don't protect computers from cybercrime, there could be
serious consequences.
o We should stop using computers to run the world's systems.
4. One example of international collaboration on this issue is the Council of
Europe's 2001 agreement called the "Convention on Cybercrime."
o The problem of Internet criminals is too big for individual
countries to solve alone.
o This is only a European problem.
5. In the not too distant past, viruses used to make your computer run
slower. You'd get weird pop-up ads, and your computer would freeze or
crash.
o It used to be easy to tell if you had a virus.
o Viruses were more powerful in the past.
6. In general, though, malware is getting sneakier. One particular worm,
called Conficker, spread to many computers that used various forms of
Windows on the Microsoft operating system.
o People don't always know if they have a virus.
o People with the Microsoft operating system probably have the
Conficker virus on their computers.
7. Another way to learn more about worms and their creators is to search
out online forums, the places where serious computer geeks chat and
even brag about what they can do.
o It is easy to catch cybercriminals.
o Internet criminals can receive a lot of prestige and status in the
world of cybercrime if they create successful worms and viruses.

www.irLanguage.com
8. Symantec, a company that develops security software, says that in 2007
they identified just over 600,000 viruses and worms, but that was up to
1.6 million in 2008.
o The problem of cybercrime is increasing.
o Security software is weaker than it used to be.
9. However, police in the United Kingdom and Finland just worked
together to successfully find and prosecute a wanted group of criminals.
This group had infected hundreds of thousands of computers...
o The United Kingdom and Finland have more problems with
cybercrime than other countries.
o International cooperation can work when fighting cybercrime.
10.Personally, I think we need even more cooperation around the issues of
Internet security, not just to safeguard our personal information and
finances, but to protect the systems we rely on.
o The problem of cybercrime is sure to be solved in the near future.
o Computers are still vulnerable to attack by cybercriminals.

Vocabulary 2 Pronunciation
Listen to each word. Record each word. Then listen and practice your
pronunciation. You do not submit this to your teacher.

www.irLanguage.com
1. daunting

2. devote

3. dominate

4. inhabit

5. intensively

6. mediator

7. mission

8. mundane

9. navigate

10. orbit

11. quarantine

12. reassemble

Vocabulary 2 Practice
Read the following sentences. Decide if the words or phrases in bold
are being used correctly.

www.irLanguage.com
1. The task was daunting, so we were able to finish quickly.
o Correct
o Incorrect
2. We devoted a lot of time and energy to the project. That is probably
why it was successful.
o Correct
o Incorrect
3. The two sides couldn't agree, so they worked with a mediator.
o Correct
o Incorrect
4. Jack has been quarantined. He was exposed to a very dangerous virus.
o Correct
o Incorrect
5. There is a new international project to put a satellite in orbit that is
permanently fixed in space and does not move.
o Correct
o Incorrect
6. The International Space Station was a joint mission for a number of
different countries.
o Correct
o Incorrect
7. The manager dominated the conversation. She made sure that everyone
spoke an equal amount of time.
o Correct
o Incorrect
8. I took the machine apart but was able to reassemble it without too
much trouble.
o Correct
o Incorrect
9. When astronauts are in space, even mundane tasks like brushing teeth
can be a challenge.
o Correct
o Incorrect
10.For thousands of years, sailors have used the stars to inhabit their way.

www.irLanguage.com
o Correct
o Incorrect
11.Many scientists are interested in finding other planets that are
navigated by intelligent life forms.
o Correct
o Incorrect
12.They worked intensively to solve the problem. They stayed on it for
hours.
o Correct
o Incorrect

Vocabulary Skill: Prefixes


Read the paragraph. Add the correct prefix to each root word to
form a new word. Use a dictionary to check your work.

Geo multi cyro mal re inter dis im bio non

Creating a seed bank in the arctic is a very important example of global


cooperation. Many species of plants are fast ____ appearing. As a result, a
____ national effort is needed to save them. Although it might be expensive,
the cost of such an effort is _____ material compared to the lives it could save
if there is a global food crisis. The seed bank could be run as a____ profit
organization which would help to preserve the_____ diversity of the planet.
Furthermore, if the seed bank is in the arctic, there is no danger of the
refrigeration systems____ functioning. This will also help with the____
preservation of shoots and seedlings. While the global seed bank would
not____ place seed banks in individual countries, an_____ governmental effort
would create an important backup to the local seed banks. Finally, a successful

www.irLanguage.com
example of global cooperation like a seed bank would improve_____ politics
for years to come.

Writing Skill: Organizing supporting ideas


Read the following excerpts from three short paragraphs on global
cooperation. Drag each excerpt into the correct category to show
how the paragraph is organized.
Specificity Emphasis Time

Countries have agreed on cuts in the catch of bluefin tuna.


All species of tuna need international protection.
By the end of 2002, the euro was official in 12 different countries.
Duty-free sales of tobacco should be ended.
Most importantly, tobacco advertising must be banned.
Declining fish stocks in the oceans is a global issue.
Euro notes and coins began circulating on January 1st 2002.
The name "euro" was chosen for a new European currency in 1995.
Tobacco smuggling needs to be stopped.

Grammar Practice: Parallel structure and ellipsis


Look at each list. Choose the item that is not parallel to the others.
1.
o politicians from Canada
o American astronauts

www.irLanguage.com
o Russian cosmonauts
o European scientists
2.
o studying genetic characteristics
o want to create a global database
o storing seeds
o freezing banana shoots
3.
o carry out experiments
o go on space walks
o build new modules
o damage is identified and repaired
4.
o Angry
o have a lot of disappointment
o worried
o fearful
5.
o abandoned buildings
o poor design
o unreliable spacecraft
o launch site covered with rust
6.
o Germany donated $11 million
o $6.5 million was donated by the United States
o $20 million was donated by the United Kingdom
o $12 million was donated by Australia
7.
o strong working relationships
o long lasting friendships
o a space program that is successful
o improved international relations
8.
o cooperation on a global level

www.irLanguage.com
o ecofriendly tourism
o international understanding
o wildlife conservation
9.
o providing global leadership
o creating health standards
o to give technical support
o monitoring world health problems
10.
o protect the environment
o increase standards of living
o promoting peace
o fight poverty

Grammar Expansion: Parallel structure and ellipsis


Read the sentences below. Which structure is parallel—nouns/noun
phrases, verbs/verb phrases, or adjectives? Drag each sentence into
the correct category.

Nouns or noun phrases Verbs or verb phrases Adjectives

I'm not sure if he's lazy or just bored.


Scientists perform experiments, conduct research, and generate theories.

www.irLanguage.com
The cramped, noisy, and smelly conditions made me leave.
Diplomats must listen well, speak effectively, and react quickly.
Cybercrime includes fraud, identity theft, and piracy.
The agreement permits hunting or fishing with a license.
We enjoyed food that was spicy but not greasy.
Countries should cooperate more and fight less.
People should show more tolerance, understanding, and compassion.

www.irLanguage.com

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy