|
COPYRIGHT: |
Millions of e-mail accounts have been hacked after hackers broke into a company that stores personal data. People who have given their e-mail address to Hilton and Marriott Rewards, Disney and many credit card companies may now get more spam. All of the companies used a database marketing service called Epsilon to handle the privacy of e-mail accounts. Management teams are now in urgent discussions to protect the privacy of their clients and keep their e-mail accounts secure.
Advertisements
Online security is becoming a worry for many of us. We think big companies will have secure systems to stop hackers accessing our private details. This incident shows that even the biggest companies cannot guarantee to keep our private information safe. Perhaps these big companies should stop trying to send us endless marketing e-mails. Our inboxes seem to be full of mails we do not want trying to sell us things we do not need. It can be very difficult to unsubscribe from them.
Advertisements
Match the following phrases from the article.
Paragraph 1
1. |
Millions of e-mail accounts have |
a. |
of their clients |
2 |
a company that stores |
b. |
been hacked |
3. |
a database marketing |
c. |
accounts secure |
4. |
now in urgent |
d. |
personal data |
5. |
protect the privacy |
e. |
service |
6. |
keep their e-mail |
f. |
discussions |
Paragraph 2
1. |
Online security is becoming |
a. |
marketing e-mails |
2 |
secure |
b. |
safe |
3. |
keep our private information |
c. |
be full of mails |
4. |
send us endless |
d. |
a worry |
5. |
Our inboxes seem to |
e. |
to unsubscribe |
6. |
very difficult |
f. |
systems |
Millions of e-mail accounts ____________________ after hackers broke into a company that ____________________. People who have given their e-mail address to Hilton and Marriott Rewards, Disney and many credit card companies may now get more spam. All of the companies ____________________ marketing service called Epsilon to ____________________ of e-mail accounts. Management teams ____________________ discussions to protect ____________________ their clients and keep their e-mail accounts secure.
Online security is ____________________ for many of us. We think big companies will have secure systems to stop hackers accessing our private details. This ____________________ even the biggest companies cannot guarantee ____________________ information safe. Perhaps these big companies should stop trying ____________________ marketing e-mails. Our inboxes ____________________ mails we do not want trying to sell us things we do not need. It can be very ____________________ from them.
Millions of e-mail accounts have been hacked (1) ____ hackers broke into a company that stores personal (2) ____. People who have given their e-mail address to Hilton and Marriott Rewards, Disney and many credit card companies may (3) ____ get more spam. All of the companies used a database marketing (4) ____ called Epsilon to (5) ____ the privacy of e-mail accounts. Management teams are now in urgent discussions to protect the privacy of their clients and keep their e-mail accounts (6) ____.
Online security is becoming a (7) ____ for many of us. We think big companies will have secure systems to stop hackers accessing our private (8) ____. This incident shows that even the biggest companies cannot guarantee to (9) ____ our private information safe. Perhaps these big companies should stop trying to send us (10) ____ marketing e-mails. Our inboxes (11) ____ to be full of mails we do not want trying to sell us things we do not need. It can be very difficult to unsubscribe from (12) ____.
Put the correct words from this table into the article.
1. |
(a) |
after |
(b) |
post |
(c) |
later |
2. |
(a) |
delta |
(b) |
beta |
(c) |
data |
3. |
(a) |
now |
(b) |
will |
(c) |
real |
4. |
(a) |
services |
(b) |
service |
(c) |
serviced |
5. |
(a) |
handy |
(b) |
hands |
(c) |
handle |
6. |
(a) |
security |
(b) |
secure |
(c) |
securing |
7. |
(a) |
worries |
(b) |
worry |
(c) |
worrying |
8. |
(a) |
petals |
(b) |
retails |
(c) |
details |
9. |
(a) |
keep |
(b) |
give |
(c) |
do |
10. |
(a) |
ending |
(b) |
endless |
(c) |
ends |
11. |
(a) |
seem |
(b) |
are |
(c) |
will |
12 |
(a) |
they |
(b) |
us |
(c) |
them |
Spell the jumbled words (from the text) correctly.
Paragraph 1 |
|
1. |
iolsinlm of e-mail accounts |
2. |
ersopnla data |
3. |
e-mail ddrases |
4. |
used a adtaasbe |
5. |
in nuertg discussions |
6. |
keep their e-mail snuaccot secure |
Paragraph 2 |
|
7. |
ilonne security |
8. |
our private dseaitl |
9. |
gernteuaa to keep our private information |
10. |
send us elesnds marketing e-mails |
11. |
Our nesoixb seem to be full |
12. |
difficult to ubsicnubrse |
Number these lines in the correct order.
( ) |
have secure systems to stop hackers accessing our private details. This incident shows that even |
( ) |
marketing service called Epsilon to handle the privacy of e-mail accounts. Management |
( 1 ) |
Millions of e-mail accounts have been hacked after hackers broke into a company that stores personal |
( ) |
teams are now in urgent discussions to protect the privacy |
( ) |
these big companies should stop trying to send us endless marketing e-mails. Our |
( ) |
card companies may now get more spam. All of the companies used a database |
( ) |
inboxes seem to be full of mails we do not want trying to sell us things |
( ) |
the biggest companies cannot guarantee to keep our private information safe. Perhaps |
( ) |
we do not need. It can be very difficult to unsubscribe from them. |
( ) |
of their clients and keep their e-mail accounts secure. |
( ) |
Online security is becoming a worry for many of us. We think big companies will |
( ) |
data. People who have given their e-mail address to Hilton and Marriott Rewards, Disney and many credit |
With a partner, put the words back into the correct order.
1. |
have e accounts hacked of mail been Millions -. |
2. |
companies the of All database a used. |
3. |
privacy accounts of e Handle - the mail. |
4. |
teams Management discussions urgent in now are. |
5. |
their the of clients Protect privacy. |
6. |
is becoming a worry for many of us . Online security |
7. |
Stop accessing private hackers our details. |
8. |
keep Guarantee information our to safe private. |
9. |
Our full inboxes of seem mails to be. |
10. |
to them can difficult from It very unsubscribe be. |
STUDENT A’s QUESTIONS (Do not show these to student B) |
|
1. |
________________________________________________________ |
2. |
________________________________________________________ |
3. |
________________________________________________________ |
4. |
________________________________________________________ |
5. |
________________________________________________________ |
6. |
________________________________________________________ |
------------------------------------------------------------------------------
STUDENT B’s QUESTIONS (Do not show these to student A) |
|
1. |
________________________________________________________ |
2. |
________________________________________________________ |
3. |
________________________________________________________ |
4. |
________________________________________________________ |
5. |
________________________________________________________ |
6. |
________________________________________________________ |
Write about hacking for 10 minutes. Show your partner your paper. Correct each other’s work.
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
1. VOCABULARY EXTENSION: Choose several of the words from the text. Use a dictionary or Google’s search field (or another search engine) to build up more associations / collocations of each word.
2. HACKING: Search the Internet and find more information about hacking. Talk about what you discover with your partner(s) in the next lesson.
3. MAGAZINE ARTICLE: Write a magazine article about hacking. Include an imaginary interview with a hacker. Read what you wrote to your classmates in the next lesson. Give each other feedback on your articles.
4. WHAT HAPPENED NEXT? Write a newspaper article about the next stage in this news story. Read what you wrote to your classmates in the next lesson. Give each other feedback on your articles.
5. LETTER: Write a letter to a hacker. Ask him/her three questions about hacking. Give him/her three of your opinions on it. Read what you wrote to your classmates in the next lesson. Your partner will answer the questions you asked.
Copyright © 2020 by Sean Banville | Privacy Policy | | Donate | Links