My
1,000 Ideas e-Book |
Breaking News EnglishHOME | HELP MY SITE | 000s MORE FREE LESSONS |
My
1,000 Ideas e-Book |
40+ activities | |||||
LISTEN | READ | GRAMMAR | SPELL | WORDS | |
|
* MP3 (UK male)* MP3 (USA male)* MP3 (20 questions)* Listen & spell* Dictation - |
* Speed Reading
|
* Grammar gap-fill* Articles gap-fill* Prepositions* Word order |
* Consonants* Vowels* Missing letters* Initials only* No letters |
* Word pairs* Missing words* Gap-fill |
Researchers from the University of California, Berkeley's School of Information have come up with an ingenious device that might, one day soon, replace the need for passwords. A press release explains: "Instead of typing your password, in the future you may only have to think your password." Their research explored the feasibility of brainwave-based computer authentication as a substitute for passwords. This resulted in the creation of the Neurosky MindSet headset – a $100 device that can read brainwaves. The team believes this new technology is secure, accurate, and user-friendly. They also believe people would be willing to replace passwords with pass-thoughts.
The project's findings were unveiled at the 2013 Workshop on Usable Security at the Seventeenth International Conference on Financial Cryptography and Data Security. Team leader Professor John Chuang explained his new technique provides a more fail-safe and cheaper solution than things like fingerprint scans, retina scans, or facial or voice recognition. He said his team's inexpensive headset connects to a computer wirelessly using Bluetooth and is little different to headsets used with mobile phones, music players, and other computing devices. However, security experts expressed concern regarding the ability of software that can "hack" people's minds to extract things like ATM PINs. Sources: WARM-UPS 1. PASSWORDS: Students walk around the class and talk to other students about passwords. Change partners often and share your findings. 2. CHAT: In pairs / groups, decide which of these topics or words from the article are most interesting and which are most boring.
Have a chat about the topics you liked. Change topics and partners frequently. 3. THOUGHTS: What do you think of these future uses of thoughts? Complete this table with your partner(s). Change partners often and share what you wrote.
4. THE FUTURE: Students A strongly believe a future in which we control things by thoughts is a good one; Students B strongly believe the opposite. Change partners again and talk about your conversations. 5. PASSWORD: Rank these and share your rankings with your partner. Put the thing most in need of a password at the top. Change partners often and share your rankings.
6. BRAINWAVES: Spend one minute writing down all of the different words you associate with the word 'brainwaves'. Share your words with your partner(s) and talk about them. Together, put the words into different categories. BEFORE READING / LISTENING 1. TRUE / FALSE: Read the headline. Guess if a-h below are true (T) or false (F).
2. SYNONYM MATCH: Match the following synonyms from the article.
3. PHRASE MATCH: (Sometimes more than one choice is possible.)
GAP FILL
LISTENING - Guess the answers. Listen to check.
LISTENING – Listen and fill in the gaps Researchers from the University of California, Berkeley's School of Information have come (1) _______________________ device that might, one day soon, replace the need for passwords. (2) _______________________: "Instead of typing your password, in the future you may only have to think your password." Their research (3) _______________________ of brainwave-based computer (4) _______________________ substitute for passwords. This resulted in the creation of the Neurosky MindSet headset – a $100 device that can read brainwaves. The team (5) _______________________ is secure, (6) _______________________. They also believe people would be willing to replace passwords with pass-thoughts. The project's (7) _______________________ at the 2013 Workshop on Usable Security at the Seventeenth International Conference on Financial Cryptography and Data Security. Team leader Professor John Chuang explained his new technique (8) _______________________ and cheaper solution than things like fingerprint scans, retina scans, or facial or voice recognition. He said his (9) _______________________ connects to a computer wirelessly using Bluetooth (10) _______________________ headsets used with mobile phones, music players, and other computing devices. However, (11) _______________________ concern regarding the ability of software that can "hack" people's (12) ______________________ like ATM PINs. COMPREHENSION QUESTIONS
MULTIPLE CHOICE - QUIZ
ROLE PLAY A TV CHAT SHOW
AFTER READING / LISTENING 1. WORD SEARCH: Look in your dictionary / computer to find collocates, other meanings, information, synonyms … for the words 'pass' and 'word'.
2. ARTICLE QUESTIONS: Look back at the article and write down some questions you would like to ask the class about the text.
3. GAP FILL: In pairs / groups, compare your answers to this exercise. Check your answers. Talk about the words from the activity. Were they new, interesting, worth learning…? 4. VOCABULARY: Circle any words you do not understand. In groups, pool unknown words and use dictionaries to find their meanings. 5. TEST EACH OTHER: Look at the words below. With your partner, try to recall how they were used in the text:
PASSWORDS SURVEY Write five GOOD questions about passwords in the table. Do this in pairs. Each student must write the questions on his / her own paper. When you have finished, interview other students. Write down their answers.
PASSWORDS DISCUSSION STUDENT A's QUESTIONS (Do not show these to student B)
----------------------------------------------------------------------------- STUDENT B's QUESTIONS (Do not show these to student A)
DISCUSSION (Write your own questions)
----------------------------------------------------------------------------
MULTIPLE CHOICE - LANGUAGE Researchers from the University of California, Berkeley's School of Information have come (1) ____ with an (2) ____ device that might, one day soon, replace the need for passwords. A press release explains: "Instead of (3) ____ your password, in the future you may only have to think your password." Their research explored the (4) ____ of brainwave-based computer authentication as a substitute for passwords. This resulted in the creation of the Neurosky MindSet headset – a $100 device that can read brainwaves. The team believes this new technology is (5) ____, accurate, and user-friendly. They also believe people would be (6) ____ to replace passwords with pass-thoughts. The project's findings were (7) ____ at the 2013 Workshop on Usable Security at the Seventeenth International Conference (8) ____ Financial Cryptography and Data Security. Team leader Professor John Chuang explained his new technique provides a more fail-safe and cheaper solution than things like fingerprint scans, retina scans, or facial or (9) ____ recognition. He said his team's inexpensive headset connects to a computer wirelessly using Bluetooth and is (10) ____ different to headsets used with mobile phones, music players, and other (11) ____ devices. However, security experts expressed concern regarding the ability of software that can "hack" people's minds to (12) ____ things like ATM PINs. Put the correct words from the table below in the above article.
SPELLING
PUT THE TEXT BACK TOGETHER Number these lines in the correct order.
PUT THE WORDS IN THE RIGHT ORDER
CIRCLE THE CORRECT WORD (20 PAIRS) Researchers from the University of California, Berkeley's School of Information have come down / up with an ingenious / ingenuous device that might, one day soon, replace the need / necessary for passwords. A press release explains: "Instead of typed / typing your password, in the future you may only have to think / thought your password." Their research explored the feasibility of brainwave-based computer authentication as a complement / substitute for passwords. This resulted in the creatively / creation of the Neurosky MindSet headset – a $100 device that can read brainwaves. The team belief / believes this new technology is secure, accurate / accuracy, and user-friendly. They also believe people would be wailing / willing to replace passwords with pass-thoughts. The project's findings were unraveled / unveiled at the 2013 Workshop on / in Usable Security at the Seventeenth International Conference on Financial Cryptography and Data Securely / Security. Team leader Professor John Chuang explained his new technique provides a more fail-safe / failure-safety and cheaper solution than things like fingerprint scans, retina scans, or facial / farcical or voice recognition. He said his team's inexpensive headset connects / connections to a computer wirelessly using Bluetooth and is little / bit different to headsets used with mobile phones, music players, and other computing / computable devices. However, security experts expressed concern regarding the disability / ability of software that can "hack" people's minds to extract / distract things like ATM PINs. Talk about the connection between each pair of words in italics, and why the correct word is correct. INSERT THE VOWELS (a, e, i, o, u) R_s__rch_rs fr_m th_ _n_v_rs_ty _f C_l_f_rn__, B_rk_l_y's Sch__l _f _nf_rm_t__n h_v_ c_m_ _p w_th _n _ng_n___s d_v_c_ th_t m_ght, _n_ d_y s__n, r_pl_c_ th_ n__d f_r p_ssw_rds. _ pr_ss r_l__s_ _xpl__ns: "_nst__d _f typ_ng y__r p_ssw_rd, _n th_ f_t_r_ y__ m_y _nly h_v_ t_ th_nk y__r p_ssw_rd." Th__r r_s__rch _xpl_r_d th_ f__s_b_l_ty _f br__nw_v_-b_s_d c_mp_t_r __th_nt_c_t__n _s _ s_bst_t_t_ f_r p_ssw_rds. Th_s r_s_lt_d _n th_ cr__t__n _f th_ N__r_sky M_ndS_t h__ds_t – _ $100 d_v_c_ th_t c_n r__d br__nw_v_s. Th_ t__m b_l__v_s th_s n_w t_chn_l_gy _s s_c_r_, _cc_r_t_, _nd _s_r-fr__ndly. Th_y _ls_ b_l__v_ p__pl_ w__ld b_ w_ll_ng t_ r_pl_c_ p_ssw_rds w_th p_ss-th__ghts. Th_ pr_j_ct's f_nd_ngs w_r_ _nv__l_d _t th_ 2013 W_rksh_p _n _s_bl_ S_c_r_ty _t th_ S_v_nt__nth _nt_rn_t__n_l C_nf_r_nc_ _n F_n_nc__l Crypt_gr_phy _nd D_t_ S_c_r_ty. T__m l__d_r Pr_f_ss_r J_hn Ch__ng _xpl__n_d h_s n_w t_chn_q__ pr_v_d_s _ m_r_ f__l-s_f_ _nd ch__p_r s_l_t__n th_n th_ngs l_k_ f_ng_rpr_nt sc_ns, r_t_n_ sc_ns, _r f_c__l _r v__c_ r_c_gn_t__n. H_ s__d h_s t__m's _n_xp_ns_v_ h__ds_t c_nn_cts t_ _ c_mp_t_r w_r_l_ssly _s_ng Bl__t__th _nd _s l_ttl_ d_ff_r_nt t_ h__ds_ts _s_d w_th m_b_l_ ph_n_s, m_s_c pl_y_rs, _nd _th_r c_mp_t_ng d_v_c_s. H_w_v_r, s_c_r_ty _xp_rts _xpr_ss_d c_nc_rn r_g_rd_ng th_ _b_l_ty _f s_ftw_r_ th_t c_n "h_ck" p__pl_'s m_nds t_ _xtr_ct th_ngs l_k_ _TM P_Ns. PUNCTUATE THE TEXT AND ADD CAPITALS researchers from the university of california, berkeley's school of information have come up with an ingenious device that might one day soon replace the need for passwords a press release explains "instead of typing your password in the future you may only have to think your password" their research explored the feasibility of brainwave-based computer authentication as a substitute for passwords this resulted in the creation of the neurosky mindset headset – a $100 device that can read brainwaves the team believes this new technology is secure accurate and user-friendly they also believe people would be willing to replace passwords with pass-thoughts the project's findings were unveiled at the 2013 workshop on usable security at the seventeenth international conference on financial cryptography and data security team leader professor john chuang explained his new technique provides a more fail-safe and cheaper solution than things like fingerprint scans retina scans or facial or voice recognition he said his team's inexpensive headset connects to a computer wirelessly using bluetooth and is little different to headsets used with mobile phones music players and other computing devices however security experts expressed concern regarding the ability of software that can "hack" people's minds to extract things like atm pins PUT A SLASH ( / ) WHERE THE SPACES ARE
FREE WRITING Write about passwords for 10 minutes. Comment on your partner's paper. _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ ACADEMIC WRITING Pass-thoughts may be a good replacement for passwords, but they will never make information totally secure. Discuss this and the advantages and disadvantages of pass-thoughts. _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ HOMEWORK 1. VOCABULARY EXTENSION: Choose several of the words from the text. Use a dictionary or Google's search field (or another search engine) to build up more associations / collocations of each word. 2. INTERNET: Search the Internet and find out more about passwords. Share what you discover with your partner(s) in the next lesson. 3. PASSWORDS: Make a poster about passwords. Show your work to your classmates in the next lesson. Did you all have similar things? 4. PASS-THOUGHTS: Write a magazine article about pass-thoughts. Include imaginary interviews with people who are for and against the idea. Read what you wrote to your classmates in the next lesson. Write down any new words and expressions you hear from your partner(s). 5. WHAT HAPPENED NEXT? Write a newspaper article about the next stage in this news story. Read what you wrote to your classmates in the next lesson. Give each other feedback on your articles. 6. LETTER: Write a letter to a computer security expert. Ask him/her three questions about passwords and pass-thoughts. Give him/her three of your opinions on them. Read your letter to your partner(s) in your next lesson. Your partner(s) will answer your questions. ANSWERS TRUE / FALSE (p.4)
SYNONYM MATCH (p.4)
COMPREHENSION QUESTIONS (p.8)
MULTIPLE CHOICE - QUIZ (p.9)
ALL OTHER EXERCISES Please check for yourself by looking at the Article on page 2. Help Support This Web Site
Sean Banville's Book
Thank You Copyright © 2004-2023 by Sean Banville | Links | About | Privacy Policy
|