ESL Holiday Lessons.com
English Lesson Plan on Computer Security Day

Home  |  Donate  |  000s more free lessons |  1,000 Ideas Ideas e-Book
 


 
Advertisements

 
 
DOWNLOADS: Word Doc | PDF | MP3 Listening | Online Exercise

THE READING / TAPESCRIPT


 

We all need to take Computer Security Day seriously. Imagine how much important stuff is on your computer. Imagine if it all suddenly disappeared. What would happen if your passwords ended up in the wrong hands? The Association for Computer Security Day started this event in 1988. It hoped to raise awareness of the importance of security issues. It also wanted to encourage people to think more about their computers and information. Officially, CSD is on November the 30th. However, if this is a weekend, many companies and organizations hold their events on the next working day. More than 50 countries actively participate in this day, distributing posters and holding workshops.

Information is key to survival and success in today’s connected world. A top information protection agency stressed: “Information is among a business’s greatest assets…It is crucial to make information security a high priority and to make employees aware of the important role they play in strengthening the organization’s security.” The Association for Computer Security Day website suggests over 50 ways for companies to keep their info more secure. These include practical things, like installing smoke alarms in computer rooms, to common sense measures, such as staff regularly changing their passwords and backing up their data. One interesting idea is to: “Declare an amnesty day for computer security violators who wish to reform.”

Sources: http://www.wikipedia.org/ and assorted sites.

Advertisements

 

PHRASE MATCH

Match the following phrases from the article.

Paragraph 1

1.

stuff is on your

a.

awareness

2

it all suddenly

b.

wrong hands

3.

ended up in the

c.

issues

4.

raise

d.

computer

5.

security

e.

working day

6.

the next

f.

disappeared

 

Paragraph 2

1.

key to

a.

sense measures

2

information protection

b.

more secure

3.

a high

c.

survival

4.

keep their info

d.

their data

5.

common

e.

agency

6.

backing up

f.

priority


LISTENING GAP FILL

We _________________ Computer Security Day seriously. Imagine how much important stuff is on your computer. _________________ suddenly disappeared. What would happen if your passwords ended up in _________________? The Association for Computer Security Day started this event in 1988. It _________________ awareness of the importance of security issues. It also wanted to encourage people to _________________ their computers and information. Officially, CSD is on November the 30th. However, if this is a weekend, many companies and organizations _________________ on the next working day. More than 50 countries actively participate in this day, distributing posters and holding workshops.

Information is _________________ and success in today’s connected world. A top information protection agency stressed: “Information is among a business’s greatest assets…It is _________________ information security _________________ and to make employees aware of the important role they play in strengthening the organization’s security.” The Association for Computer Security Day website suggests over 50 ways for companies _________________ more secure. These include practical things, like installing smoke alarms in computer rooms, to common sense measures, such as staff regularly changing their passwords and _________________ data. One interesting idea is to: “Declare an amnesty day for computer security violators who _________________.”


WHILE READING / LISTENING GAP FILL

Put the words into the gaps in the text.

We all need to take Computer Security Day ____________. Imagine how much important stuff is on your computer. Imagine if it all suddenly disappeared. What would ____________ if your passwords ended up in the ____________ hands? The Association for Computer Security Day started this event in 1988. It hoped to ____________ awareness of the importance of security issues. It also wanted to ____________ people to think more about their computers and information. Officially, CSD is on November the 30th. However, if this is a weekend, many companies and organizations ____________ their events on the next working day. More than 50 countries ____________ participate in this day, distributing posters and ____________ workshops.

 

 

 

raise
happen
actively
hold
wrong
seriously
holding
encourage

Information is key to ____________ and success in today’s connected world. A top information protection agency ____________: “Information is among a business’s greatest assets…It is ____________ to make information security a high ____________ and to make employees ____________ of the important role they play in strengthening the organization’s security.” The Association for Computer Security Day website ____________ over 50 ways for companies to keep their info more secure. These include practical things, like installing smoke alarms in computer rooms, to ____________ sense measures, such as staff regularly changing their passwords and backing up their data. One interesting idea is to: “Declare an amnesty day for computer security violators who wish to ____________.”

 

 

suggests
 
priority
stressed
reform
survival
aware
common
crucial


CHOOSE THE CORRECT WORD

Delete the wrong word in each of the pairs of italics.

We all need to take Computer Security Day serious / seriously. Imagine how much important stuff/ staff is on your computer. Imagine if it all suddenly disappeared. What would happen if your passwords ended up / down in the wrong hands? The Association for Computer Security Day started this event in 1988. It hoped to rise / raise awareness of the important / importance of security issues. It also wanted to encourage people at / to think more about their computers and information. Officially, CSD is on November the 30th. However, if this is a weekend, many companies and organizations hold their events on the after / next working day. More than 50 countries actively participate in this day, distributing / distribute posters and holding workshops.

Information is key to survive / survival and success in today’s connected world. A top information protection agency stressful / stressed: “Information is between / among a business’s greatest assets…It is crucial to make information security a high priority and to make employees aware of the important roll / role they play in strengthening the organization’s security.” The Association for Computer Security Day website suggests over 50 ways for / by companies to keep their info more security / secure. These include practical things, like installing smoke alarms in computer rooms, to common sense / senses measures, such as staff regularly changing their passwords and backing down / up their data. One interesting idea is to: “Declare an amnesty day for computer security violators who wish to reform.”


MULTIPLE CHOICE

We all need to take Computer Security Day (1) ____. Imagine how much important stuff is on your computer. Imagine if it all (2) ____ disappeared. What would happen if your passwords ended (3) ____ in the wrong hands? The Association for Computer Security Day started this event in 1988. It hoped to (4) ____ awareness of the importance of security issues. It also wanted to encourage people to think more about their computers and information. (5) ____, CSD is on November the 30th. However, if this is a weekend, many companies and organizations hold their events on the next working day. More than 50 countries (6) ____ participate in this day, distributing posters and holding workshops.

Information is key to survival and (7) ____ in today’s connected world. A top information protection agency stressed: “Information is among a business’s greatest assets…It is crucial (8) ____ make information security a high priority and to make employees aware of the important role they play in strengthening the organization’s security.” The Association for Computer Security Day website suggests over 50 ways for companies to (9) ____ their info more secure. These include practical things, like installing smoke alarms in computer rooms, to common (10) ____ measures, such as staff regularly changing their passwords and backing (11) ____ their data. One interesting idea is to: “Declare an amnesty day for computer security violators who (12) ____ to reform.”

Put the correct words from this table into the article.

1.

(a)

seriously

(b)

serious

(c)

seriousness

(d)

series

2.

(a)

sudden

(b)

suddenness

(c)

suddenly

(d)

saddened

3.

(a)

down

(b)

in

(c)

on

(d)

up

4.

(a)

rise

(b)

raise

(c)

up

(d)

elevate

5.

(a)

official

(b)

officials

(c)

officially

(d)

officialdom

6.

(a)

active

(b)

activity

(c)

activate

(d)

actively

7.

(a)

survive

(b)

survives

(c)

survival

(d)

surviving

8.

(a)

at

(b)

for

(c)

to

(d)

in

9.

(a)

keep

(b)

be

(c)

do

(d)

take

10.

(a)

sensory

(b)

sense

(c)

sensation

(d)

senses

11.

(a)

in

(b)

on

(c)

down

(d)

up

12.

(a)

wishing

(b)

wish

(c)

wishful

(d)

wishes


SPELLING

Spell the jumbled words (from the text) correctly.

Paragraph 1

1.

tnmipaotr stuff

2.

ended up in the gnrwo hands

3.

aires awareness

4.

security suises

5.

the next rwinokg day

6.

gnoidlh workshops

 

Paragraph 2

7.

key to asriuvvl

8.

today’s entdecnco world

9.

a high yiiptrro

10.

keep their info more usrece

11.

common sense mesrause

12.

gncbika up their data


PUT THE TEXT BACK TOGETHER

Number these lines in the correct order.

(    )

and information. Officially, CSD is on November the 30th. However, if this is a weekend, many

1  )

We all need to take Computer Security Day seriously. Imagine how much important stuff is on your

(    )

stressed: “Information is among a business’s greatest assets…It is crucial to make information security a high

(    )

priority and to make employees aware of the important role they play in strengthening the organization’s

(    )

security.” The Association for Computer Security Day website suggests over 50 ways for companies to keep their info more

(    )

Information is key to survival and success in today’s connected world. A top information protection agency

(    )

idea is to: “Declare an amnesty day for computer security violators who wish to reform.”

(    )

awareness of the importance of security issues. It also wanted to encourage people to think more about their computers

(    )

sense measures, such as staff regularly changing their passwords and backing up their data. One interesting

(    )

computer. Imagine if it all suddenly disappeared. What would happen if your passwords ended up in the wrong

(    )

secure. These include practical things, like installing smoke alarms in computer rooms, to common

(    )

actively participate in this day, distributing posters and holding workshops.

(    )

hands? The Association for Computer Security Day started this event in 1988. It hoped to raise

(    )

companies and organizations hold their events on the next working day. More than 50 countries


SCRAMBLED SENTENCES

With a partner, put the words back into the correct order.

1.

Computer    seriously    all    take    Day    We    to    Security    need.   

2.

wrong     ended     hands     up     in     Your     the     passwords.    

3.

issues     security     of     importance     The.    

4.

computers    think    more     Encourage    about    people     their     to.

5.

than     countries     participate     More     50     actively.    

6.

is     Information     success     and     survival     to     key.    

7.

priority     information     security     Crucial     a     to     high     make.    

8.

of    role    aware    important    play    employees    the    they    Make.   

9.

more    Ways    to    info    companies    their    secure    for    keep.   

10.

backing    Changing    up    their    their    passwords    data    and.   


DISCUSSION (Write your own questions)

STUDENT A’s QUESTIONS (Do not show these to student B)

1.

________________________________________________________

2.

________________________________________________________

3.

________________________________________________________

4.

________________________________________________________

5.

________________________________________________________

6.

________________________________________________________

------------------------------------------------------------------------------

STUDENT B’s QUESTIONS (Do not show these to student A)

1.

________________________________________________________

2.

________________________________________________________

3.

________________________________________________________

4.

________________________________________________________

5.

________________________________________________________

6.

________________________________________________________


THE COMPUTER SECURITY DAY SURVEY

Write five questions about Computer Security Day in the table. Do this in pairs/groups. Each student must write the questions on his / her own paper.

Without your partner, interview other students. Write down their answers.

 

STUDENT 1

_____________

STUDENT 2

_____________

STUDENT 3

_____________

Q.1.

 

 

 

 

Q.2.

 

 

 

 

Q.3.

 

 

 

 

Q.4.

 

 

 

 

Q.5.

 

 

 

 

Return to your original partner(s) and share and talk about what you found out.  Make mini-presentations to other groups on your findings.


WRITING

Write about Computer Security Day for 10 minutes. Show your partner your paper. Correct each other’s work.

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________


HOMEWORK

1. VOCABULARY EXTENSION: Choose several of the words from the text. Use a dictionary or Google’s search field (or another search engine) to build up more associations / collocations of each word.

2. INTERNET: Search the Internet and find more information about Computer Security Day. Talk about what you discover with your partner(s) in the next lesson.

3. MAGAZINE ARTICLE: Write a magazine article about Computer Security Day. Write about what happens around the world. Include two imaginary interviews with people who did something on this day.

Read what you wrote to your classmates in the next lesson. Give each other feedback on your articles.

4. POSTER: Make your own poster about Computer Security Day. Write about what will happen on this day around the world.

Read what you wrote to your classmates in the next lesson. Give each other feedback on your articles.

ANSWERS

Check your answers in "THE READING / TAPESCRIPT" section at the top of this page.


Copyright © 2009 by Sean Banville | Privacy Policy