SlideShare a Scribd company logo
DIGITAL LITERACY
  How can I read and understand hypertexts? (Part 4)
3rd level – Brazillian Medium School – General Education Teacher: Gisele F. L. Domith
WHAT WILL WE DO TODAY?
Working on the reading and comprehension of two important text
genres used on virtual context

Our objectives:
• Identify and recognize the genres by its characteristics and
  singularities;
• read the information and produce meaning from the texts, trying to
  guess how they are produced, how they circulate, the author´s
  intension, etc.;
• work on the genre comprehension process to improve our abilities to
  use virtual data, computers and the web in a safe way and;
• practice some reading strategies: pre-reading, skimming, scanning,
  post-reading;
• Review and practice the usage of should.
OUR CLASS

•   Topic and theme presentation/ warm up;
•   reading activity;
•   text comprehension work;
•   vocabulary study;
•   remembering “should” usage;
•   discussing security on the web;
•   homework
Have you ever seen/read these texts?
PRE-READING PROCESS
1. Observe the extracts of the text in a quickly
way and try to guess their subject(s). Do they all
present the same theme?

                  SECURITY.
2. How could you get your answer?

   PREVIOUS KNOWLEDGE, COGNATES, TEXT
       LAYOUT, SOCIAL PRACTICE, ETC.
3. Where can you find these texts?

    USING THE COMPUTER, ON THE INTERNET.

4. Now read the text quickly (skim) and mark the
best option(s) about the text subject.

The texts present information about security on…
( ) online magazine          ( ) online store
( ) web                      ( ) newspaper
( ) computer system           ( ) anti-virus
( ) game                     ( ) cell phone
Now, what about define the texts subjects, their
  place of publication, sender and receiver?
  1




Subject: security on the computer
Place of publication: Computer screen
Sender: Computer System       Receiver: Computer user
2




Subject: security on the computer
Place of publication: Computer screen
Sender: Computer System       Receiver: Computer user
3




Subject: security to play the game Tibia
Place of publication: Tibia page
Sender: Tibia team          Receiver: Tibia player
4




Subject: security on the internet/Facebook
Place of publication: Facebook scurity page
Sender: Facebook team        Receiver: Facebook user
IDENTIFYING THE TEXTS GENRE
    1. The text 1 and 2 present similar structures.
       What are their characteristics?
• Form/text type: alert;
• sent to the computer user;
• brief text;
• one or more indirect or direct requests;
• demand an answer/position from the receiver
  stopping the computer task;
• options to choise by clicking/answering the
  alert.
2. What about the texts 3 and 4? What they
              present that is similar?
•   Form: guidelines for safe usage;
•   available on the internet sites;
•   detailed descriptions and explanations;
•   imperative verb forms;
•   text organized in topics;
•   offer the receivers some security tips or hints;
•   not obligation to the users.
THE TEXT GENRES
     1 and 2                   3 and 4

  Textual genre              Textual genre
       alert           Informational Interaction
a virtual alert sign

Main textual type         Main textual type
   Exposition                 Exposition
Order/Procedure        Instructional/Procedure
Deep into the text genre
     comprehension – Texts 1 and 2
1. When do we receive those texts? Why?
2. What are the objectives of the text sender with
   those security massages?
3. What do you think is expected to us when we
   receive the texts?
4. How can we interact with this text genre? What
   is the sender strategy to make us interact?
5. Could you say some other examples of similar
   text genres ?
Deep into the text genre
        comprehension – Texts 3 and 4
1. How can we access these text genres? Can them be sent to
   us sometime ?
2. What probably are the text senders’ objectives with those
   security texts? Do you think is possible to consider that the
   site team also wants to protect themselves? Why?
3. What do the texts propose to the receivers in order to be
   safe? Is there some strategy in the text?
4. What do you think is expected to us when we read the
   texts?
5. How can we interact with this text genre?
6. Could you say some other examples of similar text genres?
SCANNING A TEXT GENRE
     Deep into the vocabulary comprehension
Read this extract from Tibia page:

“Once the installation FILE has been downloaded Tibia is ready to be installed
on your computer. Installing Tibia is easy. Simply start the installation file. The
Tibia SETUP WIZARD will lead you through the installation process. Once more
you will be asked to read and to confirm our service agreement. Also, you will
be asked which DIRECTORY you would like to install the Tibia FOLDER to, what
name you would like the Tibia FOLDER to have, and whether or not you would
like to have Tibia icons on the DESKTOP and/or QUICKSTART BAR.[…] As it is
possible to FAKE the sender of an email, it can happen that you receive an
email that has Tibia or CipSoft as sender which was not sent by us. Such emails
usually contain links or attachments and are designed in a way to look like an
official email from us. Do not simply click on links in such emails. To make sure
that you are entering the official website, we strongly recommend you
manually type www.tibia.com. […]… a HACKER can already spy out data from
your computer if you visit a website with an old BROWSER. Ideally, all
programs on your computer should be updated to the latest available version”.
Text 3
Are you familiar with these words?
(   )FILE                     (    ) BROWSER
(   ) SETUP WIZARD            (    ) DIRECTORY
(   ) FOLDER                  (    ) DESKTOP
(   ) QUICKSTART BAR           (   ) HACKER
(   ) FAKE                     (    ) UPDATE

Relate them to the groups:

1. Threats                   2. Document storage
3. To access/find software   3. Internet
4. Installation              4. Software
If you want to play Tibia in safe, you
               SHOULD...
( ) Open e-mails from Tibia, especially with
attachments;
( ) do not click on links in suspect emails;
( ) verify the suspect e-mails entering the
official website manually typing the game
address;
( ) always use the same web browser;
( ) update all programs on the computer.
Remembering something about
             SHOULD…

To have a safe access to your email you should
have a password.

You shouldn’t click on suspect links.

Should I use the same browser without updates?
Some interesting discursive effects
Compare these sentences.
“You SHOULD only run programs from publishers
you trust.” – text 1
“Add a mobile number to your account […] Pick a
security question for your Facebook account. […]
Become a fan of the Facebook security page”. –
text 4
Advice forms (should) ≠ Imperative forms
Scanning another text genre
Read the following alert:
Scan the text and find the information:

•   The problem:
•   The problem comes from:
•   The consequence to the system:
•   The receiver option to solve the problem:
•   Is there other possibility to the receiver?
    Which one?
Could you find other ways to safe
 usage of the computer and internet?
Read the other two texts, number 1 and 3 to search
for information on data and system security. Which
other actions should we do to be safe on the net?
Do you know other texts with that information?
Show us them!
Helping each other to use computers
      and internet in a safer way

       Avoiding some security alerts. Safe surfing net.

• What SHOULD we do to protect our data and computer?
  Scan the texts for information and write some advice.

Let’s organize a campaign to help people to safe use the
computer and internet da. What about create a blog?



 Tip: USE SHOULD + THE TEXTS INFORMATION
Some ideas from the read text genres
• We shouldn’t open suspect e-mails from
  companies, specially with attachments;
• We shoudn’t click on links in suspect emails;
• We should verify the suspect e-mails entering
  the official website manually typing the game
  address;
• We shouldn’t use the same web browser;
• We should update all programs on the
  computer.
Just for finishing…
Today we:

• Read two different text genres: security
  alerts/warns and the security tips/hints;
• worked on the text genre comprehension;
• studied internet and computer vocabulary;
• remembered “should” usage;
• discussed about security on the web.
References
CipSoft. [1996] (2012) Tibia. A massively multiplayer online
role-playing game. On line game. Available on:
<http://www.tibia.com/gameguides/?subtopic=manual&sectio
n=guilds> Access: 02/08/2012 (TEXT 3).

COSTA, M. B. (2010) Globetrekker. São Paulo: Macmillan. 2nd ed.
Book 3. 194p.

Facebook. (2012) Facebook Security Tips. Online page.
Available on:      < http://www.facebook.com/security>
Access: 02/08/2012 (TEXT 4).

Microsoft Windows (2012) Security warns. Personal computer
images (TEXTS 1 and 2).

More Related Content

Viewers also liked

Ruby + JS to Roptotype
Ruby + JS to RoptotypeRuby + JS to Roptotype
Ruby + JS to Roptotype
Sho KUSANO
 
Daily report senin, 4 maret 2013
Daily report   senin, 4 maret 2013Daily report   senin, 4 maret 2013
Daily report senin, 4 maret 2013
Setip Kandio
 
Crossing Power Point
Crossing Power PointCrossing Power Point
Crossing Power Point
gueste26b5
 
Daily Report Rabu 20 Maret 2013
Daily Report Rabu 20 Maret 2013Daily Report Rabu 20 Maret 2013
Daily Report Rabu 20 Maret 2013
Setip Kandio
 
Future monthly feb 2013 (ebook)
Future monthly feb 2013 (ebook)Future monthly feb 2013 (ebook)
Future monthly feb 2013 (ebook)Setip Kandio
 
かねをかせぐ
かねをかせぐかねをかせぐ
かねをかせぐSho KUSANO
 
Daily Report Kamis 14 Maret 2013
Daily Report  Kamis 14 Maret 2013Daily Report  Kamis 14 Maret 2013
Daily Report Kamis 14 Maret 2013
Setip Kandio
 

Viewers also liked (7)

Ruby + JS to Roptotype
Ruby + JS to RoptotypeRuby + JS to Roptotype
Ruby + JS to Roptotype
 
Daily report senin, 4 maret 2013
Daily report   senin, 4 maret 2013Daily report   senin, 4 maret 2013
Daily report senin, 4 maret 2013
 
Crossing Power Point
Crossing Power PointCrossing Power Point
Crossing Power Point
 
Daily Report Rabu 20 Maret 2013
Daily Report Rabu 20 Maret 2013Daily Report Rabu 20 Maret 2013
Daily Report Rabu 20 Maret 2013
 
Future monthly feb 2013 (ebook)
Future monthly feb 2013 (ebook)Future monthly feb 2013 (ebook)
Future monthly feb 2013 (ebook)
 
かねをかせぐ
かねをかせぐかねをかせぐ
かねをかせぐ
 
Daily Report Kamis 14 Maret 2013
Daily Report  Kamis 14 Maret 2013Daily Report  Kamis 14 Maret 2013
Daily Report Kamis 14 Maret 2013
 

Similar to Digital literacy – part 3

Lessonplan-1.docx
Lessonplan-1.docxLessonplan-1.docx
Lessonplan-1.docx
ALVAREZAPRILROSE
 
Lessonplan-1 (1).docx
Lessonplan-1 (1).docxLessonplan-1 (1).docx
Lessonplan-1 (1).docx
ALVAREZAPRILROSE
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
Mustafa Amiri
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Avansa Mid- en Zuidwest
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
Arthur Landry
 
Commonwealth of Learning cybersecurity training for teachers | 2022
Commonwealth of Learning  cybersecurity training for teachers | 2022Commonwealth of Learning  cybersecurity training for teachers | 2022
Commonwealth of Learning cybersecurity training for teachers | 2022
KharimMchatta
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
UmaraZahidLecturer
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
andregoron
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
salvepepe
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
Varun Mithran
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
RheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
JakeTorio1
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
EliseoBartolome1
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
TrixieAnneAlindao
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
EhraicaSaquing
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
ChadrickThompson1
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
DineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
Liberty Aquino
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
CedricPada
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 

Similar to Digital literacy – part 3 (20)

Lessonplan-1.docx
Lessonplan-1.docxLessonplan-1.docx
Lessonplan-1.docx
 
Lessonplan-1 (1).docx
Lessonplan-1 (1).docxLessonplan-1 (1).docx
Lessonplan-1 (1).docx
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
Commonwealth of Learning cybersecurity training for teachers | 2022
Commonwealth of Learning  cybersecurity training for teachers | 2022Commonwealth of Learning  cybersecurity training for teachers | 2022
Commonwealth of Learning cybersecurity training for teachers | 2022
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONImpowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZON
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 

Recently uploaded

Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 

Recently uploaded (20)

Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 

Digital literacy – part 3

  • 1. DIGITAL LITERACY How can I read and understand hypertexts? (Part 4) 3rd level – Brazillian Medium School – General Education Teacher: Gisele F. L. Domith
  • 2. WHAT WILL WE DO TODAY? Working on the reading and comprehension of two important text genres used on virtual context Our objectives: • Identify and recognize the genres by its characteristics and singularities; • read the information and produce meaning from the texts, trying to guess how they are produced, how they circulate, the author´s intension, etc.; • work on the genre comprehension process to improve our abilities to use virtual data, computers and the web in a safe way and; • practice some reading strategies: pre-reading, skimming, scanning, post-reading; • Review and practice the usage of should.
  • 3. OUR CLASS • Topic and theme presentation/ warm up; • reading activity; • text comprehension work; • vocabulary study; • remembering “should” usage; • discussing security on the web; • homework
  • 4. Have you ever seen/read these texts?
  • 5. PRE-READING PROCESS 1. Observe the extracts of the text in a quickly way and try to guess their subject(s). Do they all present the same theme? SECURITY. 2. How could you get your answer? PREVIOUS KNOWLEDGE, COGNATES, TEXT LAYOUT, SOCIAL PRACTICE, ETC.
  • 6. 3. Where can you find these texts? USING THE COMPUTER, ON THE INTERNET. 4. Now read the text quickly (skim) and mark the best option(s) about the text subject. The texts present information about security on… ( ) online magazine ( ) online store ( ) web ( ) newspaper ( ) computer system ( ) anti-virus ( ) game ( ) cell phone
  • 7. Now, what about define the texts subjects, their place of publication, sender and receiver? 1 Subject: security on the computer Place of publication: Computer screen Sender: Computer System Receiver: Computer user
  • 8. 2 Subject: security on the computer Place of publication: Computer screen Sender: Computer System Receiver: Computer user
  • 9. 3 Subject: security to play the game Tibia Place of publication: Tibia page Sender: Tibia team Receiver: Tibia player
  • 10. 4 Subject: security on the internet/Facebook Place of publication: Facebook scurity page Sender: Facebook team Receiver: Facebook user
  • 11. IDENTIFYING THE TEXTS GENRE 1. The text 1 and 2 present similar structures. What are their characteristics? • Form/text type: alert; • sent to the computer user; • brief text; • one or more indirect or direct requests; • demand an answer/position from the receiver stopping the computer task; • options to choise by clicking/answering the alert.
  • 12. 2. What about the texts 3 and 4? What they present that is similar? • Form: guidelines for safe usage; • available on the internet sites; • detailed descriptions and explanations; • imperative verb forms; • text organized in topics; • offer the receivers some security tips or hints; • not obligation to the users.
  • 13. THE TEXT GENRES 1 and 2 3 and 4 Textual genre Textual genre alert Informational Interaction a virtual alert sign Main textual type Main textual type Exposition Exposition Order/Procedure Instructional/Procedure
  • 14. Deep into the text genre comprehension – Texts 1 and 2 1. When do we receive those texts? Why? 2. What are the objectives of the text sender with those security massages? 3. What do you think is expected to us when we receive the texts? 4. How can we interact with this text genre? What is the sender strategy to make us interact? 5. Could you say some other examples of similar text genres ?
  • 15. Deep into the text genre comprehension – Texts 3 and 4 1. How can we access these text genres? Can them be sent to us sometime ? 2. What probably are the text senders’ objectives with those security texts? Do you think is possible to consider that the site team also wants to protect themselves? Why? 3. What do the texts propose to the receivers in order to be safe? Is there some strategy in the text? 4. What do you think is expected to us when we read the texts? 5. How can we interact with this text genre? 6. Could you say some other examples of similar text genres?
  • 16. SCANNING A TEXT GENRE Deep into the vocabulary comprehension Read this extract from Tibia page: “Once the installation FILE has been downloaded Tibia is ready to be installed on your computer. Installing Tibia is easy. Simply start the installation file. The Tibia SETUP WIZARD will lead you through the installation process. Once more you will be asked to read and to confirm our service agreement. Also, you will be asked which DIRECTORY you would like to install the Tibia FOLDER to, what name you would like the Tibia FOLDER to have, and whether or not you would like to have Tibia icons on the DESKTOP and/or QUICKSTART BAR.[…] As it is possible to FAKE the sender of an email, it can happen that you receive an email that has Tibia or CipSoft as sender which was not sent by us. Such emails usually contain links or attachments and are designed in a way to look like an official email from us. Do not simply click on links in such emails. To make sure that you are entering the official website, we strongly recommend you manually type www.tibia.com. […]… a HACKER can already spy out data from your computer if you visit a website with an old BROWSER. Ideally, all programs on your computer should be updated to the latest available version”. Text 3
  • 17. Are you familiar with these words? ( )FILE ( ) BROWSER ( ) SETUP WIZARD ( ) DIRECTORY ( ) FOLDER ( ) DESKTOP ( ) QUICKSTART BAR ( ) HACKER ( ) FAKE ( ) UPDATE Relate them to the groups: 1. Threats 2. Document storage 3. To access/find software 3. Internet 4. Installation 4. Software
  • 18. If you want to play Tibia in safe, you SHOULD... ( ) Open e-mails from Tibia, especially with attachments; ( ) do not click on links in suspect emails; ( ) verify the suspect e-mails entering the official website manually typing the game address; ( ) always use the same web browser; ( ) update all programs on the computer.
  • 19. Remembering something about SHOULD… To have a safe access to your email you should have a password. You shouldn’t click on suspect links. Should I use the same browser without updates?
  • 20. Some interesting discursive effects Compare these sentences. “You SHOULD only run programs from publishers you trust.” – text 1 “Add a mobile number to your account […] Pick a security question for your Facebook account. […] Become a fan of the Facebook security page”. – text 4 Advice forms (should) ≠ Imperative forms
  • 21. Scanning another text genre Read the following alert:
  • 22. Scan the text and find the information: • The problem: • The problem comes from: • The consequence to the system: • The receiver option to solve the problem: • Is there other possibility to the receiver? Which one?
  • 23. Could you find other ways to safe usage of the computer and internet? Read the other two texts, number 1 and 3 to search for information on data and system security. Which other actions should we do to be safe on the net? Do you know other texts with that information? Show us them!
  • 24. Helping each other to use computers and internet in a safer way Avoiding some security alerts. Safe surfing net. • What SHOULD we do to protect our data and computer? Scan the texts for information and write some advice. Let’s organize a campaign to help people to safe use the computer and internet da. What about create a blog? Tip: USE SHOULD + THE TEXTS INFORMATION
  • 25. Some ideas from the read text genres • We shouldn’t open suspect e-mails from companies, specially with attachments; • We shoudn’t click on links in suspect emails; • We should verify the suspect e-mails entering the official website manually typing the game address; • We shouldn’t use the same web browser; • We should update all programs on the computer.
  • 26. Just for finishing… Today we: • Read two different text genres: security alerts/warns and the security tips/hints; • worked on the text genre comprehension; • studied internet and computer vocabulary; • remembered “should” usage; • discussed about security on the web.
  • 27. References CipSoft. [1996] (2012) Tibia. A massively multiplayer online role-playing game. On line game. Available on: <http://www.tibia.com/gameguides/?subtopic=manual&sectio n=guilds> Access: 02/08/2012 (TEXT 3). COSTA, M. B. (2010) Globetrekker. São Paulo: Macmillan. 2nd ed. Book 3. 194p. Facebook. (2012) Facebook Security Tips. Online page. Available on: < http://www.facebook.com/security> Access: 02/08/2012 (TEXT 4). Microsoft Windows (2012) Security warns. Personal computer images (TEXTS 1 and 2).