好文档 - 专业文书写作范文服务资料分享网站

计算机专业英语教案--38[3页]

天下 分享 时间: 加入收藏 我要投稿 点赞

教材名称:《计算机专业英语》 主 编: 来永春 出版时间:

电子教案

第 38 次课 学时 2 Project Seven Online Shopping Mall’s Security 授课题目(章,节) Part A Theoretical Learning Skill Two Computer System Security Measures 授课类型(请打√) 理论课□√ 研讨课□ 习题课□ 复习课□ 其他□ 教学目的: 1 In this part, our target is to improve the speed of reading professional articles and the comprehension ability of the reader. 2.We have marked specialized vocabulary key words in some paragraphs so that the reader can quickly grasp the main idea of the sentences and paragraphs. 教学方法、手段: 1. By the computer, projector and blackboard-writing 2. By the student-centered learning, using Classroom Teaching Method, Communicative Teaching Method, Task-based Teaching Method and Audio-visual Teaching Method 教学重点、难点: 1.Master the key words and phrases in the text. 2.Analyze the structure of the complex sentences in the text. 3.Translate the text into Chinese with the help of the reference materials. 3.Describe Computer System Security Measures 补充内容和教学内容及过程设计 时间分配 教学设计 Step 1. Learning key words and phrases 20 分钟 encryption n.加密 interception n.截取 fabrication n.伪造 integrity n.完整 firewall n.防火墙 buffer n.缓冲,缓冲区 restricting access 限制访问 data layering 数据分层 modification n.更改,修改 backing up data 备份数据 inappropriate adj. 不适当的 disclosure n. 泄露 encryption n. 加密 restricting access 限制访问 data layering 数据分层 backing up data 备份数据 integrity n. 完整 overrate v. 过高评价 unintelligible adj. 难以理解的 interception n. 截取 modification n. 更改,修改 fabrication n. 伪造 mollify v. 安慰 impose on 占……便宜;利用 devise v. 设计 identification n. 身份证明 oftentimes adv. 屡次,时常地 deny v. 否认,拒绝 irreplaceable adj. 不可替代的 audit v. 审计 Step 2. Introduction of training target

1 In this part, our target is to improve the speed of reading professional 5分钟 articles and the comprehension ability of the reader. 2.We have marked specialized vocabulary key words in some paragraphs so that the reader can quickly grasp the main idea of the sentences and paragraphs.

Step 3. Leading in a short introduction to computer System Security Measures 5分钟 One aspect of computer security is the protection of information against inappropriate manipulation, destruction or disclosure. Another security problem concerns the protection of the computer system and data on the computer. It is essential that security measures protect all operating systems. Step 4. Analyzing the structure of the complex sentences 15分钟 1. There is an urgent need for computer security. Computer owners must take measures to prevent theft and inappropriate use of their equipment. 2. Computer security is concerned with protecting information, hardware, and software. Security measures consist of encryption, restricting access, data layering, and backing up data. Step 5. Memorizing and mastering the following key sentences in the text. 45分钟 1. Encryption provides secrecy for data. Since data of encryption that cannot be read generally and also cannot be changed, encryption can be used to achieve integrity.

2. Encryption is an important tool in computer security, but one should not overrate its importance.

3. Thus, it is important to know the situations in which encryption is useful and how to use it effectively.

4. The most powerful tool in providing computer security is coding. 5. It is unintelligible for the outside observer to transform data, the value of an interception and the possibility of a modification or a fabrication are almost mollified.

6. Security experts are constantly devising new ways to protect computer systems from access by unauthorized persons.

7. Most major corporations today use special hardware and software called firewalls which act as a security buffer between the corporation’s private network and all external networks. 8. All electronic communications coming into and leaving the corporation must be evaluated by the firewall. 9. Security is maintained by denying access to unauthorized communications. 10. Organizations need to determine and classify important Information. 11. And establish different layers of security. Only certain employees should have access to this classified information. 12. Equipment can always be replaced. A company’s data, however, may be irreplaceable. 13. Most companies should take some effective measures of trying to keep software and data from being tampered with in the first place. 14. The safest procedure, however, is to make data backups frequently and to store them in remote locations. 15. Computer security will continue to be a problem we need to focus on because the number of computers and users continues to grow. 思考题、作业题、讨论题: 1.Review the key words and phrases in the text. 2.Translate the text into Chinese with the help of the reference materials. 3.Complete the exercises involved. 课后总结分析:

计算机专业英语教案--38[3页]

教材名称:《计算机专业英语》主编:来永春出版时间:电子教案第38次课学时2ProjectSevenOnlineShoppingMall’sSecurity授课题目(章,节)PartATheoreticalLearningSkillTwoComputer
推荐度:
点击下载文档文档为doc格式
6u7l68fa7l02ra61x73m28mwx1483k01cw3
领取福利

微信扫码领取福利

微信扫码分享