Unit One: Section A

advertisement
Unit One: Section A
Duel in the Cyberspace
Teacher: YANG Zhiting
Attendants: Students of Class 7, Grade 2001
Place: Multimedia Classroom 8-5
Duration of Time: 50 min.
Objectives for This Class
a) To inform the students of the background information
b) To give opportunities for understanding the important elements of story
c). Have an analysis of the organization of Duel in Cyberspace
Teaching Procedures
I. Introduction of Background information
A. Origin of the word “Cyberspace”
“Cyberspace: A consensual hallucination experienced daily by billions of legitimate operators, in
every nation, by children being taught mathematical concepts...A graphical representation of data
abstracted from the banks of every computer in the human system. Unthinkable complexity. Lines of
light ranged in the non-space of the mind, clusters and constellations of data. Like city lights,
receding…”
--William Gibson, Neuromancer
B. Hacker
Old School Hackers:
Script Kiddies, or Cyber-Punks:
Professional Criminals, or Crackers:
Coders and Virus Writers:
C. IP Spoofing
II. Understanding the elements of story
A. Definition of the literary form “story”.
B. Characteristics of story
consciously made
definite formal development
firmness in construction
unity in plot, theme, character, tone, mood, even, occasionally, in style
C. Ways of getting closer to story
point of view
character
plot
structure
D. Point of view
Two main kinds
narrator as a participant (writing in the first person)
narrator as a non-participant (writing in the third person)
E. Characters
Protagonist
Antagonist
F. Plot
elements:
Time
Place
Character
Background
Conflict
Crisis
Resolution
J. Conflict
Essential patterns of conflict:
Ÿ character against character
Ÿ character against society
Ÿ character vs. some material force
Ÿ character vs. some supernatural entity
H. Crisis and Denouement
I. Structure
III. Understanding the organization of the story: Duel in Cyberspace
A. The first section
conflict
main characters
background information
a. someone broke into the narrator’s computers
b. The log file summaries were stolen
c someone was challenging the narrator
d. the narrator was going to take action
B. The second section
Measures I took
--- put digitized phone messages on the Internet as a bait
--- keep in touch with FBI
--- set up monitoring system
Compare and Contrast
---- in common
a fascination with computers
---- in discrepancy
write technical programs
for company
sentenced to prison
C. The third section
How did the man get caught
---- monitor from NETCOM
---- found he was logging on
---- reported to FBI
D. The fourth section
The result of the duel.
---- My first face-to-face meeting with my opponent
IV. Online Reading
Go through the articles “the Online World” and “the Hacking”.
V. Review the Internet Security Issue
A. Watch the movie “Cyberspace”
B. Prepare for group discussion questions for next Class
How do people make good use of internet in their work and daily life.
Tell a story about hacker or cyber-theft to share with the class.
How to protect computer system
Download