Tải bản đầy đủ (.pdf) (148 trang)

Reading for the real world 2

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (7.51 MB, 148 trang )

Reading for
the Real World

2

SECOND EDITION


Reading for the Real World 2 Second Edition
Moraig Macgillivray · Tonia Peters

© 2009 Compass Publishing
All rights reserved. No part of this book
may be reproduced, stored in a retrieval system,
or transmitted in any form or by any means,
electronic, mechanical, photocopying, recording,
or otherwise, without prior permission
in writing from the publisher.
Acquisitions Editor: Jordan Candlewyck
Content Editor: Adam Worcester
Copy Editor: Joanna Weinhardt
Cover/Interior Design: Design Plus
email:

The authors of this book would like to acknowledge the following writers for
contributing materials to this series: Michael Souza, Michael Pederson,
Paul Edmunds, Paula Bramante, Kandice MacDonald, Barbara Graeber,
Tonia Peters and Moraig Macgillivray.
ISBN: 978-1-59966-421-7
14 13 12 11 10 9 8 7 6
13 12 11 10


Photo Credits
pp.5, 7, 11, 12, 13, 17, 18, 19, 22, 23, 24, 28, 29, 30, 31, 34, 35, 36, 37, 47, 48, 52, 53,
54, 59, 71, 73, 78, 79, 90, 95, 107, 108, 121, 127 © Shutterstock, Inc.
pp.10, 41, 65, 67, 77, 83, 94, 101, 103, 106, 109, 113, 115, 131, 137, 138, 139, 142, 144,
145, 148 © iStock International Inc.
pp.6, 16, 25, 40, 42, 43, 46, 49, 55, 58, 60, 61, 64, 66, 70, 72, 76, 82, 84, 85, 88, 89, 91,
96, 97, 100, 102, 112, 114, 118, 119, 120, 124, 125, 130, 132, 133, 136, 143
© Jupiterimages Corporation
Every effort has been made to trace all sources of illustrations/photos/information in this
book, but if any have been inadvertently overlooked, the publisher will be pleased to
make the necessary arrangements at the first opportunity.


Contents
Unit 1

Strange & Unusual
Reading 1 :
Reading 2 :

UFOs / 5
An Insight into the Future / 11

Unit 2

Computers & Technology
Reading 1 :
Reading 2 :

Fighting Spam / 17

Using the Body for Identification / 23

Unit 3

Health & Medicine
Reading 1 :
Reading 2 :

Xenotransplantation / 29
A Surge in Cosmetic Surgery / 35

Unit 4

Social Issues
Reading 1 :
Reading 2 :

Soft Drugs in Amsterdam / 41
Morphine / 47

Unit 5

Environmental Issues
Reading 1 :
Reading 2 :

Campaigning for the Earth / 53
Glacier Retreat / 59

Unit 6


Law & Crime
Reading 1 :
Reading 2 :

The Reliability of Eyewitnesses / 65
The Assumption of Innocence / 71


Unit 7

Language & Literature
Reading 1 :
Reading 2 :

Cupid and Psyche / 77
The Truth About Memoirs / 83

Unit 8

Space & Exploration
Reading 1 :
Reading 2 :

The Origin of the Universe / 89
Space Tourism / 95

Unit 9

Sports & Fitness

Reading 1 :
Reading 2 :

Extreme Sports / 101
Personal Trainers: The Fitness Wave of the Future / 107

Unit 10

People & Opinions
Reading 1 :
Reading 2 :

A Superlative Book / 113
Mandela’s Fight Against Apartheid / 119

Unit 11

Cross-Cultural Viewpoints
Reading 1 :
Reading 2 :

Differing Conceptions of Time / 125
Investigating Stereotypes of Men and Women / 131

Unit 12

Business & Economics
Reading 1 :
Reading 2 :


An Office Away from the Office / 137
A Need for Censorship in Advertising? / 143


U N I T

1

S t r a n g e & U nusua l 1

UFOs
Pre-Reading Questions
Think about the following questions.
1.Do you know of any famous UFO sightings in your country? What
happened?
2.What do you think are some natural explanations for UFOs?
3.Is it possible there is intelligent life elsewhere in our universe
besides Earth? Why do you think so?

Vocabulary Preview
Match each word with the correct definition.
1. extraordinary

a. to examine carefully

2. mysterious

b. a person who sees something happen

3. investigate


c. inexplicable; suspicious

4. lunatic

d. to keep secret

5. witness

e. unusual

6. suppress

f. a mentally unstable person


6

UFOs

U

Track 1

FO stands for Unidentified Flying Object. Although many people
associate this term with aliens or spaceships, it can pertain to any
unknown object seen in the atmosphere.

It is commonly believed that UFO sightings began in modern times, but


5

sightings of extraordinary lights and mysterious objects in the sky have been
documented for thousands of years. One of the earliest sightings was in the fifteenth
century BCE, in Egypt, where “foul smelling circles of fire and discs in the sky”
were observed. Centuries later, in 1516 CE in Nuremberg, Germany, more than
200 UFOs of differing shapes, including cylinders, spheres, and spinning discs, were

10

observed. These examples typify the thousands of sightings that have been recorded
over the ages in many different cultures on various continents.
The most interesting part of UFO history has been the latter half of the 20th
century. During World War II, fighter pilots reported many luminescent and
cylindrical UFOs. Sightings of these objects were described by both pilots and

15

high-ranking intelligence officials. Interestingly enough, both the Allies and the
Germans recounted this. At first, they both thought that these UFOs were really
just new weapons made by their enemies. However, when they realized that the
other side was seeing them, too, they concluded that these sightings were UFOs.
Both the British and Germans created committees to investigate. Ultimately, it

20

was determined that these UFOs, nicknamed “Foo Fighters,” were not manmade;
no alternative explanations were offered.
In the late 1940s, following WWII, the “flying saucer”
era began. In 1947, a man named Kenneth Arnold

recounted seeing “nine silvery circular objects” in the

25

sky. He told his story to many people, including the
press. He eventually wrote a book, titled The Coming
3

atmosphere --- air surrounding the Earth
luminescent --- glowing with light
14
cylindrical --- in the shape of a cylinder
15
ally --- a country that sides with another in a war

(Allies - the countries that opposed the Axis powers (Germany, Italy and Japan)
13

in World War II)
19

committee --- a group formed to make decisions


32
42
45
46
55


authority --- a person in command
controversy --- a dispute
non-humanoid --- alien; not human
disband --- to break up
phenomenon --- an abnormal event

of the Saucers. In it, he described the UFOs as flying
saucers because they were shaped like large dishes.
After the book’s release, more and more people reported
30

UFO sightings. Previously, anyone who reported a UFO
was considered a liar or a lunatic. However, because
authorities were receiving countless reports, they decided to set up a committee,
called Project Blue Book, to investigate these sightings.
In the 1940s, the most famous UFO case in US history, the Roswell Crash,

35

occurred. In early July of 1947, an object crashed onto a sheep ranch near
Roswell, New Mexico. All the pieces of the fallen object were collected by members
of the US Air Force, stationed at Roswell Army Air Field. Later in the day, the
commander of the base informed the press that the remains of a “flying disc”
had been recovered. This news spread worldwide in a matter of hours. Strangely,

40

a few hours after the press release, the commanding general of the Eighth Air
Force issued a counter press release asserting that the remains were from a common
weather balloon. This retraction caused a lot of controversy. There were reputable

eye witnesses—including the sheep rancher and an Air Force major—who saw
many items of unknown origin made of strange material. They even claimed to

45

have caught sight of bodies of non-humanoid beings.
Despite this incident and continued UFO sightings, the government disbanded
the Project Blue Book committee in 1969, due to lack of concrete evidence. To
this day, many people think the government is suppressing the truth of what
they collected from the Roswell Crash and of other unexplained sightings and

50

incidences. Over the years, UFO sightings have continued to be reported by
people all over the world, including former US president Jimmy Carter, NASA
engineers, and Japanese businessmen. In fact, it is estimated that every three
minutes, there is a UFO sighting somewhere on the planet. Though most certainly
there are a number of explanations for these UFO sightings, natural or otherwise,

55

more research into this phenomenon is definitely needed.
Reading Time _______ minutes _______ seconds

629 words

7


8


R eading Comprehension
AMark each statement as either true (T) or false (F) according to the
reading.


1. ____ The term UFO applies only to spaceships and aliens.



2. ____UFOs did not appear until the latter half of the 20th century.



3. ____ Another term for UFO is “flying saucer.”



4. ____Project Blue Book investigates all UFO sightings.

B Choose the best answer according to the reading.


1. What did fighter pilots report seeing in World War II?








2.Why was the Roswell crash controversial?







a. Foul smelling circles of fire and discs in the sky
b. Hovering, glowing shields
c. Luminescent and cylindrical UFOs
d. Silvery, circular objects

a. Because a flying disc crashed into a sheep ranch
b. Because the Air Force issued two conflicting statements
c. Because several eyewitnesses changed their stories
d. Because people mistook a weather balloon for a UFO

3. Which of the following is NOT true?






a. UFO sightings have declined in recent years.
b. A former US president claims to have seen a UFO.
c. Many UFO sightings can be explained by natural causes.
d. The government has disbanded Project Blue Book.


CFor the next two questions, look for the answers in the book and write
them on the lines provided.


1.What happened in 1516 CE in Nuremberg, Germany?

______________________________________________________
 ______________________________________________________

2. Why did Kenneth Arnold call UFOs “flying saucers”?
______________________________________________________


______________________________________________________


S ummary
Fill in the blanks with words from the list. Use each word only once.


extraordinary

mysterious

investigate

lunatics

witnesses suppressing


For centuries, 1 ___________ all over the world have reported seeing
2 ___________ objects flying in the sky. Many of these UFOs have
3 ___________ lights and strange shapes. At first, others thought people who saw
UFOs were 4 ___________, but the US government received so many UFO reports
that it set up a special committee to 5 ___________ them. Since then, many people
have accused the government of 6 ___________ information about UFOs.

V ocabulary Extension
Here are six words or phrases that are related to the topic but are not in
the reading. Fill in each blank with the best word or phrase from the list.
Use each word or phrase only once.


abducted paranormal

extraterrestrial

outer space martians conspiracy

1. Aliens are sometimes referred to as people from ___________.
2.Science fiction movies and books portray a wide variety of ___________ life
forms.
3. S
 ome people claim to have been ___________ by alien visitors and taken
aboard a UFO.
4. _
 __________ were some of the earliest science-fiction aliens imagined by
artists and writers.
5.UFOs and ghosts are examples of ___________ activities.

6.Many UFO enthusiasts accuse the government of a(n) ___________ to cover up
UFO information.

9


10

S upplemental Reading
The Truth About UFOs

Track 2

A

5

10

15

20

25

s of 2002, 72 percent of Americans believe the US
government is not telling the public everything it
knows about UFOs. In addition, 68 percent think
the government has knowledge of extraterrestrial life (life
from other planets) and is hiding it from the public. It’s not surprising there has

been more and more pressure on the government to declassify its UFO records.
A variety of different groups have been involved in these efforts.
One of the most recent groups to become involved is CFI--the Coalition for
Freedom of Information. John Podesta, former Chief of Staff to President
Clinton, is one of the many important people in this group. The group’s aim is not
to prove the existence of extraterrestrial life, but to make it easier for scientists
in general to study unexplained aerial phenomena. Podesta and his group have
asked the Pentagon to declassify its UFO records and provide scientists with
data that will help in the study of UFOs.
CFI has requested the release of information on several UFO cases, starting
with the Kecksburg, Pennsylvania, incident. In 1965, a large acorn-shaped
object, about the size of a small car, crashed in a wooded area of Pennsylvania.
Witnesses contacted police and firefighters, but even they were not allowed to
come close to the scene. The United States Army was already on site and in the
process of removing the object. Even though several witnesses could clearly
describe the object when it was in the air, the government claimed the object was a
meteorite. Suspicions of the government’s claim have been raised ever since.
Many groups have been formed to convince the US Government to open
cases such as the Kecksburg event, yet it remains tight-lipped. It has not allowed
these classified records to be made public.

Discussion
Discuss the following questions.
1.Why should citizens have access to classified government records when it
comes to possible UFO incidents?
2.Should the government have the right to protect its citizens by withholding certain
information that could be unnecessary or dangerous for the general public to
know? Why or why not?



U N I T

1

S t r a n g e & U nusua l 2

An Insight into
the Future
Pre-Reading Questions
Think about the following questions.
1.If someone knew the exact date that you would die, would you want them
to tell you? Why or why not?
2.Do you believe the future can be predicted? If so, how?
3.How would knowing what’s going to happen in the future make you feel
more secure today?

Vocabulary Preview
Match each word with the correct definition.
1. ancient

a. unclear

2. prediction

b. extremely old

3. promote

c. monetary


4. glimpse

d. to advance in rank

5. financial

e. a brief look

6. uncertain

f. a forecast


12

An Insight into the Future

D

Track 3

ivination, also called fortune-telling, is the attempt
to discover future events through unconventional
methods. One popular method of divination, found in

both Eastern and Western culture, is palm reading. Through

5

palm reading, a person hopes to find out his or her fate, or

future circumstances. By looking at the lines on the palm of the
hand, a palm reader claims to be able to foretell a person’s life
span, financial success, or marital bliss, among other things.
Although there is no proven connection between the lines on the palm of a hand

10

and a person’s future, palm reading remains popular, along with other divination
practices. Some of these other practices include predicting the future through
astrology (analyzing the stars and planets), tasseography (reading tea leaves) or
numerology (analyzing numbers).
Fortune-telling has a long history. Its earliest examples go back to 4000

15

BCE. The divination practiced at that time, and for thousands of years after, was
often engaged by kings and other rulers. Both the ancient Roman and Chinese
emperors routinely consulted astrologers and other fortune-tellers on important
matters. Chinese court astrologers constantly looked for signs that foretold the
future, since their predictions could influence the royal court in many ways and

20

give them job security. Divination was used to diagnose illnesses, predict what
would happen in battle, interpret dreams, and promote soldiers.
One of the main reasons why divination was so important to people in the
ancient world is that probably at that time humans had very little control over the
world. Even those in the highest positions were still subject to natural disasters.

1

1
5
5
7
17
20
24

divination --- the art of discovering hidden or future knowledge
fortune-telling --- the practice of predicting the future
palm reading --- divination using the palm of one’s hand
fate --- a final outcome; destiny
foretell --- to predict
astrologer --- a person who practices divination through planets and stars
diagnose --- to solve; to discover
natural disaster --- a catastrophe caused by forces of nature


25
36

25

plague --- a disastrous evil or affliction
mastery --- exceptional competence

The causes of such events as plagues or storms were not clearly understood.
Divination provided a sort of control over life. If a person could get a glimpse of
the future, that person could escape at least a little of the uncertainty that would
have worried him or her constantly. A farmer could plan for his future crops,

and an emperor could plan for a war with some amount of certainty that a

30

particular outcome was likely. Since divination could not be disproved and any
failure in the prediction could be blamed on the person making the prediction,
believing in divination was not difficult for the people in the ancient world.
Although unfounded, it is easy to understand that the practice of divination
gave people in the ancient world a sense of control over their environment.

35

However, it is a bit less evident why divination practices should still be so
popular today. Humans have achieved a great amount of mastery over, if not
understanding of, the environment. They are no longer at the total mercy of the
natural world. There does not seem to be any need for the practice of divination
to give the world a sense of order. Even so, human life is still fragile. People still

40

get sick, hurt themselves, and die. They still suffer from financial and emotional
problems, and worry about what the future will bring them.
One thing that has not changed since ancient times is that the future
remains uncertain. Compared to previous ages, humans have a great amount of
control over the present period. With all the new technology and advances in

45

science, humans can predict natural disasters, giving some certainty to the
future. Nonetheless, the simple fact that we do not know precisely what will

happen in the next week, month, or year lends uncertainty to our lives. Since the
great majority of modern people desire certainty and
security, they may try to find ways to achieve these

50

feelings even when there is no way to reasonably
obtain them. Divination then, in all its forms,
fulfills a basic human need; the need to feel secure.
Reading Time _______ minutes _______ seconds

621 words

13


14

R eading Comprehension
AMark each statement as either true (T) or false (F) according to the
reading.


1. ____There is a proven connection between the lines on the palm of a hand
and a person’s future.



2. ____Fortune-telling has been used by kings and emperors.




3. ____In ancient times, divination was likely driven by environmental
uncertainty.



4. ____Divination is unpopular today.

B Choose the best answer according to the reading.


1. All of the following are mentioned as methods of divination EXCEPT







2. What was divination used for in ancient China?







a. Tasseography
b. Crystal balls

c. Palm reading
d. Numerology

a. To promote emperors and kings
b. To cast spells on enemies
c. To prevent natural disasters
d. To predict the outcome of battles

3. Why does the author say divination is important?






a. It creates high-paying jobs for many people.
b. It helps us change the course of history.
c. It provides a sense of certainty and security.
d. It is a great form of family entertainment.

CFor the next two questions, look for the answers in the book and write
them on the lines provided.


1.What is the purpose of palm reading?

______________________________________________________
 ______________________________________________________

2. Why was it easy for people in the ancient world to believe in divination?

______________________________________________________


______________________________________________________


S ummary
Fill in the blanks with phrases from the list. Use each phrase only once.



fend off
to control

get a glimpse
quell uncertainty

financial gain
made predictions

Since ancient times, fortune-tellers have 1 ___________ using a variety of
divination methods. Rulers hoped to 2 ___________ of the future, so they could
plan for battles, diagnose illnesses, 3 ___________ plagues, and promote soldiers.
Common ancient peoples wanted 4 ___________, marital bliss, and the ability
5 ___________ some part of their future. Despite technological advances, modern
people want many of these same things. Above all, they want to 6 ___________.

V ocabulary Extension
Here are six words or phrases that are related to the topic but are not in
the reading. Fill in each blank with the best word or phrase from the list.

Use each word or phrase only once.


tarot cards crystal ball

superstition

prophecy

prophet

Nostradamus

1. In the Bible, a person who foretold the future was called a ___________.
2. A ___________ is a Biblical word for a future prediction.
3. Many people think fortune-telling is just a ___________.
4. Today, many fortune-tellers make predictions using a pack of ___________.
5. Other fortune-tellers like to glimpse the future using a magical ___________.
6.___________ is a Frenchman famous for making several predictions in the 16th
century about future events.

15


16

S upplemental Reading
Technology -- The Modern Divination?

G


Track 4

enerations past have used divination as a means of gaining answers to
the unknown. This is especially true when it was used to predict the
future. Modern technology is so advanced that it can now trace patterns

of history and predict certain outcomes. Scientific data that has been collected is
5

used to make these predictions.
We can look at a few areas where technology has advanced. Many different
types of divination have been used in the past to predict future health. Today’s
technology can track a patient’s medical history, and it can predict and diagnose
patterns of health and diseases. Technology can even make predictions based on

10

children’s genes. For instance, a Colorado company is selling a kit that helps parents
forecast their child’s athletic ability, by testing for a gene associated with strong
athletic performance.
The use of weather forecasting tools is another way modern technology is
replacing the practice of divination. Computers have the ability to predict the

15

types and amounts of precipitation, storms, temperatures, and pressure systems.
IBM is developing a service that can predict weather conditions down to a onekilometer resolution. In time, company researchers hope to be able to predict
the weather on individual streets within a city.
Technology continues to advance and increase as computer programs


20

become more complex. Scientists are using technology
in more specific ways to gain more knowledge about
the way nature works. As for divination, what was
once considered to be supernatural is now seen more
as a form of entertainment.

Discussion
Discuss the following questions.
1.With access to modern technology, is the practice of divination really
necessary today?
2.If you had the ability to alter your children’s genes, would you do so? Why or
why not?


U N I T

2

C o m p u t e r s & Te c hnology 1

Fighting Spam
Pre-Reading Questions
Think about the following questions.
1. Do you have an email account? What do you use it for?
2.Have you ever received unwanted or unsolicited emails? How do you
handle them?
3.What are some ways you can think of to prevent getting unsolicited

emails?

Vocabulary Preview
Match each word or phrase with the correct definition.
1. identical

a. a receiver

2. offensive

b. unpleasant

3. scam

c. annoyance

4. recipient

d. the same

5. irritation

e. to swindle

6. cheat out

f. a fraudulent or deceptive act


18


Fighting Spam

A

Track 5

nyone who has ever had an email account has received spam. Spam is
unsolicited email that is sent as part of a larger group of messages,
all having substantively identical content. Spam has existed for a long

time, but in recent years, the increasing amount of spam has become a much bigger

5

problem than before. Although there are ways to decrease spam, currently the
only way to eliminate spam is by not having an email address.
There are several types of spam: junk mail, non-commercial, offensive and
pornographic, and scams, just to name a few. The most common type is junk
email—mass email from legitimate businesses advertising their products.

10

Although the emails may be legitimate, they are still unsolicited. Non-commercial
spam consists of messages without commercial motive, such as chain letters,
urban legends, and jokes. The emails require the recipient to forward the message
to friends in order to receive good fortune. Offensive and pornographic spam
direct the recipient to an adult website, while spam scams are fraudulent

15


messages designed to swindle people out of personal information for the
purposes of identity theft or criminal activities.
The most obvious negative effect of spam is irritation. It is very annoying to
get unsolicited email. However, if the only effect of spam were irritation, it would
not be such a problem. There are other effects of spamming. Since anyone’s email

20

can be used by spammers, it is very possible that a child may receive either
pornographic images or links to such sites on the Internet. Seniors
may be cheated out of their life savings by schemes
spread by spam. In addition, spam may also
increase the cost of Internet service. Many ISPs
(Internet Service Providers) have to increase their

25

bandwidth and server capacity to handle all
2
6
9
14
15
26
26

unsolicited --- not requested
eliminate --- to get rid of
legitimate --- real

fraudulent --- fake
swindle --- to deceive
bandwidth --- available space
capacity --- ability to hold information


41
47
49

disposable --- able to be thrown away
authenticate --- to verify
circumvent --- to get around; to fool

the spam. This costs more money and may result in higher fees for customers.
There are various ways for people to fight spam. One way is to complain
directly to the ISP used by the spammer. Most ISPs will cancel the spammer’s
30

account if they receive complaints. However, this option is becoming less and
less practical because spammers quickly change ISPs and email addresses. By
the time an ISP gets complaints about spam, the spammer has already moved on
to another one. Another way is to file a complaint with the appropriate
government agency enforcing spam laws. In the United States, the FTC (Federal

35

Trade Commission) investigates all fraudulent spam email. The most obvious
way to fight spam is to make sure that personal email addresses do not become
publicly available. Email addresses should never be placed on public websites

and should only be given out to trusted people and organizations.
Spammers usually get email addresses from newsgroup postings or web-based

40

discussion boards, so if a person wants to use either of these services, it is a good
idea to open up a free disposable email account. If the account is bombarded
by spam, it can be closed and another one opened. Another way is to “munge”
one’s email address. “Munging” is altering the email address so that it can be
read by people but cannot be collected automatically by spammers. For example,

45

can be written as catjamathomedotnet or c@tj@m at home_
net. Although a person reading the email address can guess the right address, a
computer program will not be able to authenticate the email address. Since
spammers often use software that “guesses” common email addresses, coming
up with a unique email address is another way of circumventing spammers.

50

Finally, software that filters spam can also be used. Some ISPs use filtering
methods as well. However, with filtering, there is always the possibility that valid
email may be removed by mistake. Whatever method is used, the fact remains
that until there are stronger laws against spamming and more effective ways to
punish spammers, spam will continue to annoy, irritate, and

55

disturb.

Reading Time _______ minutes _______ seconds

651 words

19


20

R eading Comprehension
AMark each statement as either true (T) or false (F) according to the
reading.


1. ____ Not having an email address is the only way to eliminate spam.



2. ____ Junk email is the most common type of spam.



3. ____ The best way to fight spam is to complain to the spammer’s ISP.



4. ____“Munging” an email address can help reduce spam.

B Choose the best answer according to the reading.



1. Which of the following is NOT mentioned as a type of spam?







2. What is the most obvious way to fight spam?







a. Ponzi schemes
b. Scams
c. Non-commercial
d. Offensive and pornographic

a. Complain to the FTC
b. Keep your email address private
c. Munge your email address
d. Buy a special spam filter

3. Why is spam dangerous for children?







a. They could be cheated out of life savings.
b. It could bring them bad luck.
c. They could receive pornographic images.
d. It could steal their identity.

CFor the next two questions, look for the answers in the book and write
them on the lines provided.


1.What is non-commercial spam?

______________________________________________________
 ______________________________________________________

2. Why is a disposable email account a good idea?
______________________________________________________


______________________________________________________


S ummary
Fill in the blanks in the table with the sentences below according to the
category they belong to. Use each sentence only once.
Types of Spam



Junk Mail

Non-commercial

Scam

A.Dear recipient: Forward this email to ten friends, and something good will
happen to you today.
B.Is your job irritating you? Relax! Marissa’s Massage Parlor is now open! Come in
for a discounted massage.
C. Congratulations! You’ve just won $100,000 in the British lottery!
D. Please send us your bank account and credit card numbers.
E. Try Wong’s famous Won Ton today.
F.You must send this identical message to three friends, or the chain will be broken,
and you will be cheated out of your chance to have good luck.

V ocabulary Extension
Here are six words or phrases that are related to the topic but are not in
the reading. Fill in each blank with the best word or phrase from the list.
Use each word or phrase only once.


virus

subject line

phishing

block


bulk mail

opt out

1.People who want to avoid spam can ___________ of receiving certain types of
email.
2. Spam email might contain a(n) ___________ that could disable your computer.
3.___________ is a type of spam scam that directs recipients to a fake homepage
of a real organization, such as a bank.
4. Most spam is sent to thousands of users at once as electronic ___________.
5. It’s often easy to identify spam email by looking at the tag in the ___________.
6.Many email programs come with a provision that allows the user to
___________ spam emails.
21


22

S upplemental Reading
The Problem with Spammers

Track 6

T
5

10

15


20

25

he reason for spamming is to make money, but ironically,
most people seem to hate spam and usually delete it
without reading it. Thus, it is hard to see how spamming
could prove profitable. There is a difference, however, between
the companies who advertise with spam and the people who do
the actual spamming; the company is less likely to make money
than the spammer.
For example, a business that wants to advertise its products
or services with spam might be inexperienced, so it will typically contract with a
“professional” spammer to do the work for them. Spammers usually charge a lot
of money for their services, perhaps $375 to spam 500,000 addresses. Because
spammers do not need much money to work—only a dialup Internet account, a
program to send spam, and a list of email addresses—they will almost always
make a profit, whether the company that hired them does or not.
The people who write spam-sending software may not be spammers
themselves, but their software makes it very easy to send spam. The software is
simple and easy to write, and it sells for exorbitant fees. One well-known
spam-sending program costs almost $300, which is much more than the time
and effort spent designing such a program would usually merit.
Spammers can also make money individually by defrauding the people who
receive their spam. A common ruse is to promise some product or service for a
very low price, but then refuse to deliver it after the customer has paid for it.
Clearly, such types of spammers are not good citizens, and honest companies
should not become involved with them. If they do, they can lose not only money
but also loyal customers. In cases like these, only the spammers profit.


Discussion
Discuss the following questions.
1.In your view, is spamming an effective way for businesses to advertise?
Why or why not?
2.What role, if any, do you think the government should take to protect
people against illegal spammers?


U N I T

2

C o m p u t e r s & Te c hnology 2

Using the Body
for Identification
Pre-Reading Questions
Think about the following questions.
1. Do you know of anyone who has been a victim of identity theft?
2. How safe do you feel when you shop online or travel on an airplane?
3.What are some pros and cons of using parts of the body as identification?

Vocabulary Preview
Match each word with the correct definition.
1. advocacy

a. to examine with a critical eye

2. scanner


b. a slight, difficult-to-notice feature

3. scrutinize

c. danger; risk

4. mimic

d. a device used to examine minute details

5. subtlety

e. to imitate

6. jeopardy

f. the act of supporting a cause


24
Track 7

Using the Body for Identification

T

echnological advances have undoubtedly changed the
way we engage in commerce and travel, as well as the
way we live our lives. The Internet allows us to shop


from locations all over the globe without ever showing our faces

5

or even talking to another person. We can buy and sell stocks
online and move enormous amounts of money from one bank
account to another at the touch of a button. Worldwide travel is
commonplace with people crossing borders on a regular basis.
In short, the world is more accessible than it has ever been, but at a cost.

10

How secure are our online transactions? With so many people crossing borders
every day, how do we know we’re not letting dangerous people into our country?
Improving security is a top issue for many governments and consumer advocacy
groups around the world. Biometric identification technology is being
developed to recognize individuals, both to protect their own interests and to

15

identify criminals.
Biometric identification is not a new phenomenon. Fingerprints are the
classic biometric identifier. Police dust a crime scene for fingerprints and then
compare their findings to a database of fingerprints of known criminals or to
fingerprints of a known suspect. But fingerprints can also be used for security.

20

A fingerprint scanner can be used to grant personnel access to certain areas.

Physiological biometrics, such as fingerprints, utilize people’s physical
characteristics to identify or recognize them. Other examples include face, palm,
and iris identification. Scanning these physical features ensures that the person
being scanned is who he or she claims to be. Unlike a personal identification

25

number, which is used to access bank accounts, biometric identifiers cannot be
stolen and then used by a thief.
Behavioral biometrics can also be used to identify people. Certain behaviors
13

biometric --- pertaining to a measurement of physical characteristics
identification --- the act of determining who someone is
16
fingerprints --- unique markings on the tips of the fingers
21
physiological --- having to do with physical or chemical properties of
a living thing
23
iris --- the colorful portion of the eye surrounding the pupil
13


29

signature --- a mark representing a person’s name, as written
by that person
38
verification --- the act of making sure something is true

44
forge --- to imitate dishonestly; to try to pass off something fake
as something real
47
ethical --- moral
50
privacy --- the state of being private

are unique to individuals, such as their voices or the way they type. The classic
behavioral biometric is the signature. Signatures are used as a guarantee, but
30

with obvious problems. Signatures can be copied, for one thing. Also, people
don’t usually scrutinize a signature until a problem is apparent. A person’s voice
might be more difficult to mimic. In fact, voice recognition systems do more
than just recognize the voice; they recognize the way a person talks. There are
subtleties in the way a person speaks that would be very difficult to imitate.

35

Typing patterns, likewise, would be very difficult to observe to the point of
mimicking them.
Biometric identification has two potential uses—identification and identity
verification. Identification occurs when biometric information is used to
discover the identity of the person it belongs to. Again,

40

fingerprints at a crime scene would be an example.
Identity verification is the process of making sure a

person is who he or she claims to be. Today, we use
passports to verify our identity when crossing borders.
However, passports can be stolen or forged, while an effective biometric

45

identification system would be difficult to fool. It would be much more difficult
to forge a fingerprint or an iris than it would be to forge a passport.
There are also ethical considerations in developing biometric identification
technology. It has the potential to protect consumers when engaging in trade as well
as to identify would-be criminals before they can do any harm. However, some

50

worry that individuals’ privacy would be in jeopardy if personal information
were to get into the wrong hands. Another danger is that personal information
could be abused by authorities. When governments have access to people’s
personal information, they can use it to control the population. It goes without
saying that people’s freedom and right to privacy will have to be protected as

55

technology advances.
Reading Time _______ minutes _______ seconds

607 words

25



Tài liệu bạn tìm kiếm đã sẵn sàng tải về

Tải bản đầy đủ ngay
×