Some suggestions for connecting ideas…
b. Write a “creative” story connecting your ideas
Work in random groups on the following activities:
a. Discuss and decide which two things people would miss the most. Explain your reasons:
b. Follow – up discussion: Ask and answer the questions:
c. Write a 100 words (or more) paragraph to summarize the main points of the previous tasks: Link
a. Read and listen here
b. Work in small groups (3-4 students). Discuss the following questions and take notes on your partners’ answers:
c. Read about the Top Programming languages of 2017
d Role – Playing Activity: Work in small groups and imagine to have a conversation with an expert (or experts) who is the author of a very successful book: “The 10 top programming languages of the future”. Play your role!
e. Write (Homework) an opinion paragraph (100-140 words) and explain your point of view referring to the best programming languages to learn today.
a. Watch the video and complete the online activities
b. Take notes of new words and update your word list
c. Complete the test
d. Read about key threats to data security and how keeping data secure (Don’t forget to update your word list!).
e. Write 5 questions in order to check your classmates’ understanding.
b. Pair work: read the text again, have a look at the list of cybercrimes and discuss these questions: Which crimes are the most dangerous? What measures can be taken by governments to stop cybercrime? Is our privacy in danger?
c. Write a detailed summary of your discussion and present it to the rest of the class.
a. Watch the video and take notes and/or write key words and sentences.
b. Share your opinion (and notes) with your partner. Watch the video again if you need (you are allowed to use your mobile). If you prefer you could also read the interactive transcript here.
c. Write a Video Review. Worksheet here
d. Answer the following questions: 1. Why should you ask yourself “Is this the information that I want to share? Would someone be able to abuse it?” – 2. How do criminals look like? – 3. Why did James Lyne pay one of these cybercriminals to attack his own website? – 4. How can we get infected?