News English.com Ready-to-use ESL / EFL Lessons

Similar documents
News English.com Ready-to-use ESL / EFL Lessons 2005 was a second longer than usual

News English.com Ready-to-use ESL / EFL Lessons

News English.com Ready-to-use ESL / EFL Lessons

News English.com Ready-to-use ESL / EFL Lessons

News English.com Ready-to-use ESL / EFL Lessons

News English.com Ready-to-use ESL / EFL Lessons

News English.com Ready-to-use ESL / EFL Lessons

Amazon airbags for dropped cell phones

The word Dear disappearing in s

News English.com Ready-to-use ESL / EFL Lessons

Apple suing Samsung for copying

Unit 9 Tech savvy? Tech support. 1 I have no idea why... Lesson A. A Unscramble the questions. Do you know which battery I should buy?

NEWS ENGLISH LESSONS.com

BUSINESS ENGLISH MATERIALS.com

LISTEN A MINUTE.com One minute a day is all you need to improve your listening skills.

BUSINESS ENGLISH MATERIALS.com

BUSINESS ENGLISH MATERIALS.com

News English.com Ready-to-Use English Lessons by Sean Banville Level extra characters added to Internet

2016 All Rights Reserved

Breaking News English.com Ready-to-Use English Lessons by Sean Banville

Synthesis Paper CEP 416 Erica Lewis. variations of innovations within technology. Each technology has both strengths and

15 Minute Traffic Formula. Contents HOW TO GET MORE TRAFFIC IN 15 MINUTES WITH SEO... 3

BUSINESS ENGLISH MATERIALS.com

Communication using

Bring in several pieces of junk mail that have been opened and spread the mail around the classroom.


Breaking News English.com Ready-to-Use English Lessons by Sean Banville

LISTEN A MINUTE.com. Postal Service.

Ackworth Howard Church of England (VC) Junior and Infant School. Child-friendly GDPR privacy notice

NEWS ENGLISH LESSONS.com

Cyber Smarts Using Social Media Wisely

EL Civics Obj 48 (Online Communication) Level: Intermediate High - Advanced Task 1: Identify Internet Uses & Communication Techniques

Sending LESSON PLAN UNIT 1. Essential Question How do you connect with others through ?

EADS up. stop think connect

WORLD SMILEY DAY.

Let them check their answers against a complete version of the worksheet or by listening to you reading it all out.

Overview: Students explore how they can use to communicate with real people within their schools, families, and communities.

Clickbank Domination Presents. A case study by Devin Zander. A look into how absolutely easy internet marketing is. Money Mindset Page 1

Introduction to

PEOPLE LESSONS.com SERGEY BRIN

Welcome to the world of .

Resource Center & Messaging System

Norton Online Reputation Report: Why Millennials should manage their online footprint

Reasons to NOT Use . for Urgent Messages. Steuart Snooks. CEO Solutions For Success

Sending LESSON PLAN UNIT 1. Essential Question How do you connect with others through ?

HOW TO CONVERT VISITORS TO CLIENTS

GMAIL BEGINNERS GUIDE

Blackberry Addiction in Sekolah Bogor Raya

Launch Store. University

Sending LESSON PLAN UNIT 1. Essential Question How do you connect with others through ? Lesson Overview. Learning Objectives

Using Google Mail In this lesson we will show you how to sign into and use your Google account (or Gmail as it s commonly known).

News Debate: Cell Phone Scramble

ETIQUETTE TIPS. Traci Kasten. Executive Assistant Chief Operations Office x179

Facebook Basics (for individuals)

News English.com Ready-to-Use English Lessons by Sean Banville Level 0 Mobile phone ban while crossing roads in Honolulu

Lessons On Movies.com WORLD WAR Z.

News English.com Ready-to-Use English Lessons by Sean Banville

Introduction to

It s possible to get your inbox to zero and keep it there, even if you get hundreds of s a day.

From video conversation 2. This is a gap fill exercise and can be used as either a quiz/test of

Strategies That Work

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

Switched-On Schoolhouse 2014 User Guide Resource Center & Messaging System

Content Curation Mistakes

Lesson 12: Order and Compare with Benchmarks

SchoolMessenger App. Parent and Student User Guide - Website. West Corporation. 100 Enterprise Way, Suite A-300. Scotts Valley, CA

Welcome to Computers for ESL Students, 4th Edition

Prayerful Living Singles User s Manual

Xchange for Samsung MAC User Guide. Version 2.4

4Sight for Mac User Guide. Version 2.4

News English.com Ready-to-Use English Lessons by Sean Banville

CMO Briefing Google+:

Atlanta Urban Debate League E-Debate Teaching Project

CS 3 Midterm 1 Review

VIDEO 1: WHAT ARE THE SMART CONTENT TOOLS? VIDEO 2: HOW DO YOU CREATE A SMART CTA?

Google technology for teachers

Text 1 Cell Phones Raise Security Concerns at School

Your message is sent from your computer to a server (like the post office) where the

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk

Outline Key Management CS 239 Computer Security February 9, 2004

(c) IKSC 2010 Copying allowed for incidental, classroom purposes. Workshop 2: Playing and Staying Safe Online Student Handouts

How to Get Your Inbox to Zero Every Day

THE 18 POINT CHECKLIST TO BUILDING THE PERFECT LANDING PAGE

What s in This Book Part I: Basic Searches Part II: Specialized Searches

How to Write Engaging s

Yammer Product Manager Homework: LinkedІn Endorsements

Welcome to The Wise Woman University

Anti-Cyber Bullying Policy.

Furl Furled Furling. Social on-line book marking for the masses. Jim Wenzloff Blog:

BBC Learning English 6 Minute English Work s

facebook a guide to social networking for massage therapists

Copyright 2009 BOSMA Enterprises. Chapter 24.

Internet applications

Internet applications

Lesson Share TEACHER'S NOTES LESSON SHARE. ing by Olya Sergeeva. Overview. Preparation. Procedure

A SIMPLE STEP-BY-STEP GUIDE FOR COMPUTER BEGINNERS

By Jonathan Leger. AdSense Gold - It s time to start cashing in

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation

VIDEO 1: WHY SHOULD YOU USE TEMPLATES TO SEND YOUR S?

Circle Link 1 "Know Before You Go" Web Literacy Tips:

Transcription:

www.breaking News English.com Ready-to-use ESL / EFL Lessons The Breaking News English.com Resource Book 1,000 Ideas & Activities For Language Teachers http://www.breakingnewsenglish.com/book.html Self-destructing mobile phone messages URL: http://www.breakingnewsenglish.com/0512/051214-e-mails-e.html Contents The Article 2 Warm-ups 3 Before Reading / Listening 4 While Reading / Listening 5 Listening Gap Fill 6 After Reading 7 Discussion 8 Speaking 9 Homework 10 Answers 11 14 December, 2005

THE ARTICLE Self-destructing mobile phone messages A hi-tech company in the U.K. has launched a text messaging service that automatically destroys e-mails 40 seconds after people open them. This should be popular with anyone who wants secrets to stay secret. Subscribers have to download an application called StealthText to their mobile phone to use the service. The software s developer Staellium UK hopes its product will appeal to both business people who deal with sensitive information and love cheats. A representative said the company wants to give e-mail senders more control over the messages they send instead of trusting recipients to delete them. The technology looks like something from a 007 movie. Staellium CEO Carole Barnum said the new service has massive benefits for people from all walks of life. She also said: Ultimately, no one will have to worry about their messages or pictures ending up in the wrong hands ever again. Staellium s website suggests soccer superstar David Beckham might need SteathText. His friend Rebecca Loos suspiciously failed to delete his embarrassing mails last year. StealthText messages are not totally erased, but stay on a special computer. However, the recipient has no further access to them after 40 seconds. 2

WARM-UPS 1. ~EST MAILS: Ask your partner(s) about e-mail. Use superlatives in all of your questions. Remember the questions you asked and were asked and move on to different partners. After speaking to several people, sit down with new partners and tell them what you found out. 2. SECRETS: Are there lots of secrets in your e-mails? In pairs / groups, discuss the kinds of things or information you (or others) might want to self-destruct when writing to the following people: Your partner Your boss A parent Your best friend A colleague Someone in a chat room Your bank manager Other 3. CHAT: In pairs / groups, decide which of these topics or words are most interesting and which are most boring. Hi-tech / text messages / secrets / mobile phones / Internet links / software information / business people / love cheats / 007 / David Beckham / 40 seconds Have a chat about the topics you liked. For more conversation, change topics and partners frequently. 4. SECRET PEOPLE: Who would benefit most from self-destructing text messages? With your partners(s), talk about the kinds of secrets the following people might want to disappear forever: George W. Bush The leader of your country Brad Pitt The CEO of a global company A 16-year-old Britain s Prince Charles Osama bin Laden You 5. E-MAIL OPINIONS: Discuss these opinions with your partner(s). Do you agree with them? a. E-mail is the best invention since sliced bread. b. There should be self-destruct buttons for spam before it reaches my phone. c. I will definitely use the new StealthText service. d. What if the recipient saves the message? It doesn t destruct then! e. People shouldn t send messages they might regret later. f. The world is becoming too secretive. There is too much suspicion. g. I don t care who knows my secrets. I have nothing to hide. h. What happens if it s a really long message that takes 80 seconds to read?!!? 6. E-MAIL: Spend one minute writing down all of the different words you associate with e-mail. Share your words with your partner(s) and talk about them. Together, put the words into different categories. 3

BEFORE READING / LISTENING 1. TRUE / FALSE: Look at the article s headline and guess whether these sentences are true (T) or false (F): a. A company has invented an e-mail that destroys mobile phones. T / F b. New secret mail will disappear 40 seconds after being opened. T / F c. People have to download an application to use the software. T / F d. The developer wants people to have more control over their mails. T / F e. The technology looks like something from a 007 movie. T / F f. The company said the technology will help people from all runs of life. T / F g. No one will have to worry about mails ending up in the wrong hands. T / F h. The messages don t completely disappear. T / F 2. SYNONYM MATCH: Match the following synonyms from the article: a. launched software b. destroys receiver c. application resembles d. appeal to erase e. trusting attract f. looks like started g. massive finishing h. ending up relying on i. delete trashes j. recipient huge 3. PHRASE MATCH: Match the following phrases from the article (sometimes more than one combination is possible): a. A hi-tech company in the U.K. has e-mail senders more control b. popular with anyone who wants secrets embarrassing mails last year c. Subscribers have to download walks of life d. business people who deal an application called StealthText e. the company wants to give in the wrong hands f. The technology looks with sensitive information g. people from all launched a text messaging service h. messages or pictures ending up totally erased i. failed to delete his like something from a 007 movie j. StealthText messages are not to stay secret 4

WHILE READING / LISTENING WHOOPS: Delete the five incorrect words from the ten in bold in each paragraph. In pairs / groups, think of better words to replace them. Self-destructing mobile phone messages A hi-tech company in the U.K. has lunched a text messaging service that automatically destroys e-mails 40 seconds after people open them. This should be populated with anyone who wants secrets to stay secret. Subscribers have to download an application called StealthText to their mobile phone to use the service. The software s developer Staellium UK hopes its product will appeal to both business people who heal with sensitive information and love chats. A representative said the company wants to give e-mail senders more control over the messages they send instead of trusting recipients to delay them. The technology books like something from a 007 movie. Staellium CEO Carole Barnum said the new service has massive benefits for people from all walks of lifetime. She also said: Ultimately, no one will have to sorry about their messages or pictures ending up in the wrong feet ever again. Staellium s website suggests soccer superstar David Beckham might need SteathText. His friend Rebecca Loos suspiciously failed to delete his embarrassing mails last year. StealthText messages are not totally erased, but say on a special computer. However, the recipient has no further access to them after 40 seconds. 5

LISTENING Listen and fill in the spaces. Self-destructing mobile phone messages A hi-tech company in the U.K. has a text messaging service that automatically destroys e-mails 40 seconds after people open them. This should be popular with anyone who wants secrets to stay. Subscribers have to download an application called StealthText to their mobile phone to use the service. The software s developer Staellium UK hopes its product will to both business people who deal with information and love. A representative said the company wants to give e-mail senders more control over the messages they send instead of recipients to delete them. The technology looks like something from a 007 movie. Staellium Carole Barnum said the new service has benefits for people from all walks of life. She also said: Ultimately, no one will have to worry about their messages or pictures up in the wrong hands ever again. Staellium s website suggests soccer superstar David Beckham might need SteathText. His friend Rebecca Loos suspiciously to delete his embarrassing mails last year. StealthText messages are not totally, but stay on a special computer. However, the recipient has no further to them after 40 seconds. 6

AFTER READING / LISTENING 1. WORD SEARCH: Look in your dictionaries / computer to find collocates, other meanings, information, synonyms for the words stealth and text. Share your findings with your partners. Make questions using the words you found. Ask your partner / group your questions. 2. ARTICLE QUESTIONS: Look back at the article and write down some questions you would like to ask the class about the text. Share your questions with other classmates / groups. Ask your partner / group your questions. 3. WHOOPS: In pairs / groups, compare your answers to this exercise. Check your answers. Talk about the words from the activity. Were they new, interesting, worth learning? 4. VOCABULARY: Circle any words you do not understand. In groups, pool unknown words and use dictionaries to find their meanings. 5. STUDENT SECRETS SURVEY: In pairs / groups, write down questions about secrets and the things you write in mails. Ask other classmates your questions and note down their answers. Go back to your original partner / group and compare your findings. Make mini-presentations to other groups on your findings. 6. TEST EACH OTHER: Look at the words below. With your partner, try to recall exactly how these were used in the text: launched popular application sensitive representative trusting 007 walks hands David Beckham erased access 7

STEALTH TEXT MAIL DISCUSSION STUDENT A s QUESTIONS (Do not show these to student B) a. Did the headline make you want to read the article? b. What do you think of the idea of self-destructing mail? c. Do you think you ll be using the service? d. How often do you send mail that you would not want other people to read or that might end up in the wrong hands? e. Do you worry about privacy on the Internet? f. What do you think of the fact that the world s intelligence services can read all of your mail? g. How valuable do you think StealthText might be? h. Would you get angry about mails you receive disappearing after 40 seconds? i. People can still copy and paste and then save messages. Do you think StealthText is totally safe? j. Do you have any mails in your inbox that are top secret? STUDENT B s QUESTIONS (Do not show these to student A) a. Did you like reading this article? b. What do you think about what you read? c. Do you think all the technology we see in movies will become part of our everyday lives? d. What other useful functions would you like to see with e-mail software? e. Do you think David Beckham will subscribe to StealthText? f. Would you trust your partner if they started sending you StealthText messages? g. Who do you think will benefit most from StealthText? h. Do you think this technology could be used to stop spam mail? i. Do you ever write or receive embarrassing mails? j. Did you like this discussion? AFTER DISCUSSION: Join another partner / group and tell them what you talked about. a. What was the most interesting thing you heard? b. Was there a question you didn t like? c. Was there something you totally disagreed with? d. What did you like talking about? e. Which was the most difficult question? 8

SPEAKING SECRET INFO: Talk to you partner(s) about the people you would and would not give information to and why? INFO PARENT PARTNER FRIEND BOSS COLLEAGUE E-mail password ATM PIN number Biggest secret Most shameful experience Who you vote for in elections Salary Details of past romances Other 9

HOMEWORK 1. VOCABULARY EXTENSION: Choose several of the words from the text. Use a dictionary or Google s search field (or another search engine) to build up more associations / collocations of each word. 2. INTERNET: Search the Internet and find more information on StealthText. Share your findings with your class in the next lesson. Did you all find out similar things? 3. PERFECT MAILER: Make a poster outlining the perfect e-mail system. Explain all of the useful functions. Show your posters to your classmates in your next lesson. Did you all think of similar things? Do you all agree each other s functions might be useful? 4. MY E-MAIL HISTORY: Write an essay about your history using e- mail. Explain your first experiences, the things you like and the things that annoy you. Show what you wrote to your classmates in the next lesson. Do they have similar thoughts and experiences? 10

ANSWERS TRUE / FALSE: a. F b. T c. T d. T e. T f. F g. T h. T SYNONYM MATCH: a. launched started b. destroys trashes c. application software d. appeal to attract e. trusting relying on f. looks like resembles g. massive huge h. ending up finishing i. delete erase j. recipient receiver PHRASE MATCH: a. A hi-tech company in the U.K. has launched a text messaging service b. popular with anyone who wants secrets to stay secret c. Subscribers have to download an application called StealthText d. business people who deal with sensitive information e. the company wants to give e-mail senders more control f. The technology looks like something from a 007 movie g. people from all walks of life h. messages or pictures ending up in the wrong hands i. failed to delete his embarrassing mails last year j. StealthText messages are not totally erased WHOOPS: Self-destructing mobile phone messages A hi-tech company in the U.K. has launched a text messaging service that automatically destroys e-mails 40 seconds after people open them. This should be popular with anyone who wants secrets to stay secret. Subscribers have to download an application called StealthText to their mobile phone to use the service. The software s developer Staellium UK hopes its product will appeal to both business people who deal with sensitive information and love cheats. A representative said the company wants to give e-mail senders more control over the messages they send instead of trusting recipients to delete them. The technology looks like something from a 007 movie. Staellium CEO Carole Barnum said the new service has massive benefits for people from all walks of life. She also said: Ultimately, no one will have to worry about their messages or pictures ending up in the wrong hands ever again. Staellium s website suggests soccer superstar David Beckham might need SteathText. His friend Rebecca Loos suspiciously failed to delete his embarrassing mails last year. StealthText messages are not totally erased, but stay on a special computer. However, the recipient has no further access to them after 40 seconds. 11