My
1,000 Ideas e-Book |
Breaking News EnglishHOME | HELP MY SITE | 000s MORE FREE LESSONS |
My
1,000 Ideas e-Book |
Date: Dec 14, 2005
Level: Harder (Try the easier lesson.) Downloads: Word Doc | PDF Doc | Listening Audio: (1:52 - 225 KB - 16kbps)
THE ARTICLEA UK hi-tech company has come up with a “self-destruct” text messaging service, which should prove popular with anyone wishing to maintain utmost secrecy in the messages they send. Subscribers can safely send any mails in the knowledge that a downloaded application in their mobile phone, called StealthText, will destroy their secrets 40 seconds after recipients click on the link to read them. The software’s developer Staellium UK hopes the service, derived from military technology, will appeal to business people dealing with sensitive information, love cheats or others who want to allay fears about potentially incriminating information. A representative said the company wants to give senders control over the messages they send instead of relying on recipients to delete them. The technology has all the hallmarks of a gadget from a 007 movie. Staellium CEO Carole Barnum commented the fledgling service has “massive benefits for people from all walks of life”. She said: “Ultimately, no one will have to worry about their messages or pictures ending up in the wrong hands ever again.” Staellium’s website hints that soccer superstar David Beckham might need StealthText. His alleged lover Rebecca Loos conspicuously failed to delete his lovey-dovey mails last year, to his enormous embarrassment. StealthText is not, in fact, permanently wiped. To comply with U.K. legal requirements, the message stays on a secure server, even after the recipient deletes it. However, to prevent abuse, the recipient has no access to the server after the message vanishes. WARM-UPS1. SUPERLATIVE MAILS: Ask your partner(s) about e-mail. Use superlatives in all of your questions. Remember the questions you asked and were asked and move on to different partners. After speaking to several people, sit down with new partners and tell them what you found out. 2. SECRETS: Are there lots of secrets in your e-mails? In pairs / groups, discuss the kinds of things or information you (or others) might want to self-destruct when writing to the following people:
3. CHAT: In pairs / groups, decide which of these topics or words are most interesting and which are most boring.
Have a chat about the topics you liked. For more conversation, change topics and partners frequently. 4. SECRET PEOPLE: Who would benefit most from self-destructing text messages? With your partners(s), speculate on the kind of secrets the following people might want to vanish without trace:
5. E-MAIL OPINIONS: Discuss these opinions with your partner(s). Do you agree with them?
6. E-MAIL: Spend one minute writing down all of the different words you associate with e-mail. Share your words with your partner(s) and talk about them. Together, put the words into different categories. BEFORE READING / LISTENING1. TRUE / FALSE: Look at the article’s headline and guess whether these sentences are true (T) or false (F):
2. SYNONYM MATCH: Match the following synonyms from the article:
3. PHRASE MATCH: Match the following phrases from the article (sometimes more than one combination is possible):
WHILE READING / LISTENINGWHOOPS: Delete the five incorrect words from the ten in bold in each paragraph. In pairs / groups, think of replacement words. Self-destructing mobile phone messagesA UK hi-tech company has come down with a “self-destruct” text messaging service, which should prove popular with anyone wishing to maintain utmost secrecy in the messages they send. Subscribers can safely send any mails in the knowledge that a downloaded applicant in their mobile phone, called StealthText, will destroy their secrets 40 seconds before recipients click on the link to read them. The software’s developer Staellium UK hopes the service, derided from military technology, will appeal to business people dealing with sensitive information, love cheats or others who want to alloy fears about potentially incriminating information. A representative said the company wants to give senders control over the messages they send instead of relying on recipients to delete them. The technology has all the birthmarks of a gadget from a 007 movie. Staellium CEO Carole Barnum commented the fledgling service has “massive benefits for people from all walks of life”. She said: “Ultimately, no one will have to worry about their messages or pictures ending up in the wrong feet ever again.” Staellium’s website hints that soccer superstar David Beckham might need StealthText. His alleged lover Rebecca Loos conspicuously failed to delete his lovey-dovey mails last year, to his enormous embarrassment. StealthText is not, in fact, permanently swiped. To comply with U.K. legal requirements, the message stays on a secure server, even after the recipient deletes it. However, to encourage abuse, the recipient has no access to the server after the message varnishes. LISTENINGListen and fill in the spaces. Self-destructing mobile phone messagesA UK hi-tech company has _____ ___ ____ a “self-destruct” text messaging service, which should prove popular with anyone wishing to maintain ________ secrecy in the messages they send. Subscribers can safely send any mails in the ____________ that a downloaded application in their mobile phone, called StealthText, will destroy their secrets 40 seconds after ________ click on the link to read them. The software’s developer Staellium UK hopes the service, ________ from military technology, will appeal to business people dealing with sensitive information, love cheats or others who want to ______ fears about potentially incriminating information. A representative said the company wants to give senders control over the messages they send instead of ________ on recipients to delete them. The technology has all the hallmarks of a ________ from a 007 movie. Staellium CEO Carole Barnum commented the ________ service has “massive benefits for people from all walks of life”. She said: “Ultimately, no one will have to worry about their messages or pictures ending up in the ______ ______ ever again.” Staellium’s website hints that soccer superstar David Beckham might need StealthText. His ________ lover Rebecca Loos conspicuously failed to delete his lovey-dovey mails last year, to his enormous embarrassment. StealthText is not, in fact, permanently ________. To comply with U.K. legal requirements, the message stays on a ________ server, even after the recipient deletes it. However, to prevent abuse, the recipient has no access to the server after the message ________. AFTER READING / LISTENING1. WORD SEARCH: Look in your dictionaries / computer to find collocates, other meanings, information, synonyms … for the words ‘stealth’ and ‘text’.
2. ARTICLE QUESTIONS: Look back at the article and write down some questions you would like to ask the class about the text.
3. WHOOPS: In pairs / groups, compare your answers to this exercise. Check your answers. Talk about the words from the activity. Were they new, interesting, worth learning…? 4. VOCABULARY: Circle any words you do not understand. In groups, pool unknown words and use dictionaries to find their meanings. 5. STUDENT “SECRETS” SURVEY: In pairs / groups, write down questions about secrets and the things you write in mails.
6. TEST EACH OTHER: Look at the words below. With your partner, try to recall exactly how these were used in the text:
STEALTH TEXT MAIL DISCUSSIONSTUDENT A’s QUESTIONS (Do not show these to student B)
STUDENT B’s QUESTIONS (Do not show these to student A)
AFTER DISCUSSION: Join another partner / group and tell them what you talked about.
SPEAKINGSECRET INFO: Talk to you partner(s) about the people you would and would not give information to and why?
HOMEWORK1. VOCABULARY EXTENSION: Choose several of the words from the text. Use a dictionary or Google’s search field (or another search engine) to build up more associations / collocations of each word. 2. INTERNET: Search the Internet and find more information on StealthText. Share your findings with your class in the next lesson. Did you all find out similar things? 3. PERFECT MAILER: Make a poster outlining the perfect e-mail system. Explain all of the useful functions. Show your posters to your classmates in your next lesson. Did you all think of similar things? Do you all agree each other’s functions might be useful? 4. MY E-MAIL HISTORY: Write an essay about your history using e-mail. Explain your first experiences, the things you like and the things that annoy you. Show what you wrote to your classmates in the next lesson. Do they have similar thoughts and experiences? ANSWERSTRUE / FALSE:
SYNONYM MATCH:
PHRASE MATCH:
WHOOPS: Self-destructing mobile phone messagesA UK hi-tech company has come up with a “self-destruct” text messaging service, which should prove popular with anyone wishing to maintain utmost secrecy in the messages they send. Subscribers can safely send any mails in the knowledge that a downloaded application in their mobile phone, called StealthText, will destroy their secrets 40 seconds after recipients click on the link to read them. The software’s developer Staellium UK hopes the service, derived from military technology, will appeal to business people dealing with sensitive information, love cheats or others who want to allay fears about potentially incriminating information. A representative said the company wants to give senders control over the messages they send instead of relying on recipients to delete them. The technology has all the hallmarks of a gadget from a 007 movie. Staellium CEO Carole Barnum commented the fledgling service has “massive benefits for people from all walks of life”. She said: “Ultimately, no one will have to worry about their messages or pictures ending up in the wrong hands ever again.” Staellium’s website hints that soccer superstar David Beckham might need StealthText. His alleged lover Rebecca Loos conspicuously failed to delete his lovey-dovey mails last year, to his enormous embarrassment. StealthText is not, in fact, permanently wiped. To comply with U.K. legal requirements, the message stays on a secure server, even after the recipient deletes it. However, to prevent abuse, the recipient has no access to the server after the message vanishes.
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright © 2004-2019 by Sean Banville | Links | About | Privacy Policy
|