2
Most read
3
Most read
STUDENT’S BOOK ANSWER KEY
PHOTOCOPIABLE
© Macmillan Publishers Limited 2015. This page may be photocopied and used within the class. 1
ADVANCED
Open Mind
Grammar
A
We should keep our private information secret/secure;
we should always shred documents before we throw
them away.
NOTICE!
Direct objects: identity theft, your data, it, money, your
life, yourself, personal documents, anything, private
information
A direct object comes after a verb.
B
consider our personal information secure
don’t see identity theft as a problem
don’t keep your data secret
find it very easy
make your life very hard
prove yourself an innocent victim
WHAT’S RIGHT?
You can’t call yourself an expert on this subject.
C
1 Do you consider identity theft (to be) very common?
2 You can’t just call yourself a police officer!
3 Do you see invasion of privacy as a major problem?
4 It’s not always easy to prove (that) an ID is fake. /
It's not always easy to prove a fake ID.
5 The press describes her as a great leader.
6 Did you find the article interesting?
Listening
B
1 F
2 F
3 T
4 F
5 T
C
1 call on
2 take out
3 run up
4 end up
5 get hold of
6 get out of
7 clear up
8 go through
Unit 3
Reading
B
1 People need to be more aware of the amount of
data that is collected about them, and they need to
demand to know how it is used.
2 Examples of how data is collected (mobile phones,
credit cards), an explanation of the types of crimes
that cyber criminals commit, and a reminder of how
our personal information is shared and used.
C
2 Effects: internet scams, blackmail
3 Effect: Information collected for one purpose can be
used for a different purpose
4 Cause: doing nothing about this situation
Effect: Companies and governments will demand
more and more information until every aspect of our
lives is recorded.
D
1 invade your privacy
2 compile
3 leave, open to
4 information age
5 monitor
6 Identity theft
7 hack
8 blackmail
9 scam
10 database
Writing
A
In favour of: Parents supporting their children at
university have a right to know what their money is
being spent on. Parents end up paying if their children
make mistakes.
Against: It is an invasion of privacy. Young people have
to learn how to manage money. It will make people feel
that their parents don’t trust them.
PHOTOCOPIABLE
© Macmillan Publishers Limited 2015. This page may be photocopied and used within the class. 2
Open Mind ADVANCED
Speaking
A
Points mentioned:
1 I don’t want anyone to invade my privacy.
2 I share more information online than my parents.
4 Different cultures view privacy differently.
5 Opinions about privacy depend on people’s
experiences.
B
Starting, finishing and keeping the discussion moving:
1 begin
2 move on
3 So
Interrupting politely:
4 Sorry
Inviting contributions:
5 add
LifeSkills
C
Possible answers:
Software and browsers:
You should use good anti-virus, anti-spyware and firewall
software to protect your computer from viruses that
let hackers get hold of your personal information.
You should also configure your browser so that it doesn’t
allow websites, adverts, or anything else that you
don’t want.
Email, secure payments and privacy policies:
You should have different email addresses for your
personal mail and for online shopping. That way,
you won’t get spam in your personal email. When you
buy something online, look for the padlock symbol
because it means that it’s a secure site. Make sure that
websites have a privacy policy. They have to explain how
they will use your data. It’s better not to use a site if it
doesn’t have a privacy policy.
D
Possible answers:
Change passwords on a regular basis. Change your
passwords at least every 90 days to reduce the chance
that a computer criminal can gain access to your
computer or online accounts. Don’t use the same
password across multiple sites.
D
1 get hold of
2 ran up
3 take out, cleared up
4 calling on
5 get out of
6 go through
7 end up
Suggestions for how to explain meanings:
get hold of – get or obtain
run up – accumulate or increase (debt or bills)
take out – apply for and get (a credit card, loan, etc)
clear up – solve (a problem, mystery or
misunderstanding)
call on – ask (someone to do something)
get out of – avoid (doing something)
go through – experience (something unpleasant or
difficult)
end up – be in a certain situation, after a series of events
Grammar
A
Susan shares a lot of personal information on social
networking sites, while Roberta doesn’t like to give out
a lot of personal information online, but prefers to keep
it private.
NOTICE!
think, feel, expect, guess, suppose, imagine
Verbs with other meanings apart from feelings or opinions
are think, feel, expect, guess, suppose, imagine.
B
We usually make the first verb negative.
1 I don’t feel that everyone needs to know …
2 I didn’t think there was anyone who wasn’t on
Facebook!
3 I guess I shouldn’t post about everything …
4 I don’t suppose many people think about …
5 I don’t expect I’m the only person …
6 I don’t imagine so.
7 I guess not.
C
1 … suspect not. I hope (that) identity theft doesn’t/
won’t increase.
2 … don’t think so. I don’t believe (that) opinions stay …
3 … hope not. I don’t imagine (that) people will give
up …
4 … guess not. I don’t feel (that) it helps …
PHOTOCOPIABLE
© Macmillan Publishers Limited 2015. This page may be photocopied and used within the class. 3
Open Mind ADVANCED
B
The main idea of the whole essay: Social media is an
important part of people’s lives, but it may not be a
positive development for society.
Paragraph 2:
Topic sentence: Of course, there are good arguments
in favour of social media. Topic sentence is in favour of
the main idea.
Points that support it: (1) People can find old friends.
(2) It is easy to stay in touch with family and friends.
(3) You can stay close to family and friends by sharing
photos and videos.
Paragraph 3:
Topic sentence: However, there are a number of
problems with social media. The sentence is against
the main idea.
Points that support it: (1) People spend more time
communicating with electronic devices than in person.
(2) People put an enormous amount of information
online, which can lead to data theft or blackmail.
(3) People spend less time doing physical activities,
which contributes to obesity.
Paragraph 4:
To summarise, although using social media allows us to
communicate easily, it has many disadvantages
Language wrap-up
1 Vocabulary
1 information age
2 privacy
3 compiled
4 leaves us open
5 databases
6 hack
7 get hold of
8 take out
9 run up
10 Identity theft
11 clear up
12 end up
2 Grammar
A
1 don’t think so
2 assume he doesn’t know
3 guess not
4 don’t think you are
5 hope not
B
1 We all need to make privacy a priority.
2 I’m careful to keep some things private.
3 You can call me paranoid, but I never use public
computers.
4 Would you describe privacy as important to you?
5 They finally found him guilty of identity theft.
Writing workshop
A
The writer seems to be against social media. The writer
emphasises that the use of social media has
many disadvantages, such as spending more time
communicating with electronic devices than in person,
putting a lot of personal information in cyberspace and
doing fewer physical activities.

More Related Content

PPT
Internet Safety Presentation
PDF
MindMake - Online Safety Talking to your Kids Parental Control
PPTX
Project
PPTX
Staying Safe Online For Kids
PPTX
Cyber Safety for Middle School Students and Parents
PPT
Keeping our kids e safe parents
PDF
Cy Q Good One
PDF
Cyber Safety: Social Media, Cyberbullying and Sexting
Internet Safety Presentation
MindMake - Online Safety Talking to your Kids Parental Control
Project
Staying Safe Online For Kids
Cyber Safety for Middle School Students and Parents
Keeping our kids e safe parents
Cy Q Good One
Cyber Safety: Social Media, Cyberbullying and Sexting

What's hot (20)

PPTX
Cyber safety: internet safety presentation for middle school students
PPT
Digital etiquette 2[1]
PPT
Social Media Safety Presentation
PPTX
Cyber saftey
PPTX
Cyber safety
PPT
Keeping our kids e safe parents no animation
PPTX
Digital citizenship for Elementary Students
PPTX
Internet safety guide
PPTX
Social media and the christian youth
PPT
Internet safety 2010
PPT
Know it All - Parents eSafety Presentation
PPTX
Parenting teens in a technology age
PPTX
Cyber safety
PPTX
Safety @ Cyber
PPT
Internet Safety
PPTX
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
PPTX
Guide to internet safety
DOCX
Social Media Tips In A Non-Deletable World
PPTX
Rules of netiquette
PPS
Internet safety
Cyber safety: internet safety presentation for middle school students
Digital etiquette 2[1]
Social Media Safety Presentation
Cyber saftey
Cyber safety
Keeping our kids e safe parents no animation
Digital citizenship for Elementary Students
Internet safety guide
Social media and the christian youth
Internet safety 2010
Know it All - Parents eSafety Presentation
Parenting teens in a technology age
Cyber safety
Safety @ Cyber
Internet Safety
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
Guide to internet safety
Social Media Tips In A Non-Deletable World
Rules of netiquette
Internet safety
Ad

Similar to Student book key unit3 (20)

PPTX
Rules of Netiquette Empowerment Technologies Lesson
PPT
8th grade presentation for slideshare
PDF
parent_teacher_tutorial
PDF
parent_teacher_tutorial
PPTX
Putting your life online
PPTX
Empowerment TECHONOLOGY 12- FIRST SEMESTER
PDF
Lect 08 computer security and privacy 2 4 q
PPT
Safer internet day 2011
PPT
Safer internet day 2011
PPTX
Mark Rogers' Social Network Presentation
PDF
Workbook key
PDF
Internet 4 Parents
PDF
Empowerment Technologies - Module 2
PPTX
2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy
PDF
Module 5: Safety
PPTX
Cyber crime ppt
PPTX
EMPOWERMENT TECHNOLOGIES LESSON 2 - NETIQUETTE
PPTX
Tech" is a shortened form of the word "technology
PPTX
Lesson 2 - Rules of Netiquette (Information and Communication Technology)
PPTX
Internet Safety Presentation for Parents
Rules of Netiquette Empowerment Technologies Lesson
8th grade presentation for slideshare
parent_teacher_tutorial
parent_teacher_tutorial
Putting your life online
Empowerment TECHONOLOGY 12- FIRST SEMESTER
Lect 08 computer security and privacy 2 4 q
Safer internet day 2011
Safer internet day 2011
Mark Rogers' Social Network Presentation
Workbook key
Internet 4 Parents
Empowerment Technologies - Module 2
2-rules-of-netiquette.pptxkjhjohhfytdtydgyfy
Module 5: Safety
Cyber crime ppt
EMPOWERMENT TECHNOLOGIES LESSON 2 - NETIQUETTE
Tech" is a shortened form of the word "technology
Lesson 2 - Rules of Netiquette (Information and Communication Technology)
Internet Safety Presentation for Parents
Ad

More from jesusmlaz (8)

PDF
Writing essay
PDF
Wordlist unit3
PDF
Thanskgiving
PDF
Tecnology vocabulary
PDF
Speaking interaction
PDF
Phrasal verbs
PDF
Mistake writing
PDF
Book password protected
Writing essay
Wordlist unit3
Thanskgiving
Tecnology vocabulary
Speaking interaction
Phrasal verbs
Mistake writing
Book password protected

Recently uploaded (20)

DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PPTX
Core Concepts of Personalized Learning and Virtual Learning Environments
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Computer Architecture Input Output Memory.pptx
PPTX
Virtual and Augmented Reality in Current Scenario
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PPTX
Education and Perspectives of Education.pptx
PDF
Empowerment Technology for Senior High School Guide
PPTX
Module on health assessment of CHN. pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Journal of Dental Science - UDMY (2021).pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
Race Reva University – Shaping Future Leaders in Artificial Intelligence
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
advance database management system book.pdf
PDF
semiconductor packaging in vlsi design fab
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Cambridge-Practice-Tests-for-IELTS-12.docx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
Core Concepts of Personalized Learning and Virtual Learning Environments
What if we spent less time fighting change, and more time building what’s rig...
Computer Architecture Input Output Memory.pptx
Virtual and Augmented Reality in Current Scenario
A powerpoint presentation on the Revised K-10 Science Shaping Paper
FORM 1 BIOLOGY MIND MAPS and their schemes
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Education and Perspectives of Education.pptx
Empowerment Technology for Senior High School Guide
Module on health assessment of CHN. pptx
Paper A Mock Exam 9_ Attempt review.pdf.
Journal of Dental Science - UDMY (2021).pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Race Reva University – Shaping Future Leaders in Artificial Intelligence
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
advance database management system book.pdf
semiconductor packaging in vlsi design fab
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf

Student book key unit3

  • 1. STUDENT’S BOOK ANSWER KEY PHOTOCOPIABLE © Macmillan Publishers Limited 2015. This page may be photocopied and used within the class. 1 ADVANCED Open Mind Grammar A We should keep our private information secret/secure; we should always shred documents before we throw them away. NOTICE! Direct objects: identity theft, your data, it, money, your life, yourself, personal documents, anything, private information A direct object comes after a verb. B consider our personal information secure don’t see identity theft as a problem don’t keep your data secret find it very easy make your life very hard prove yourself an innocent victim WHAT’S RIGHT? You can’t call yourself an expert on this subject. C 1 Do you consider identity theft (to be) very common? 2 You can’t just call yourself a police officer! 3 Do you see invasion of privacy as a major problem? 4 It’s not always easy to prove (that) an ID is fake. / It's not always easy to prove a fake ID. 5 The press describes her as a great leader. 6 Did you find the article interesting? Listening B 1 F 2 F 3 T 4 F 5 T C 1 call on 2 take out 3 run up 4 end up 5 get hold of 6 get out of 7 clear up 8 go through Unit 3 Reading B 1 People need to be more aware of the amount of data that is collected about them, and they need to demand to know how it is used. 2 Examples of how data is collected (mobile phones, credit cards), an explanation of the types of crimes that cyber criminals commit, and a reminder of how our personal information is shared and used. C 2 Effects: internet scams, blackmail 3 Effect: Information collected for one purpose can be used for a different purpose 4 Cause: doing nothing about this situation Effect: Companies and governments will demand more and more information until every aspect of our lives is recorded. D 1 invade your privacy 2 compile 3 leave, open to 4 information age 5 monitor 6 Identity theft 7 hack 8 blackmail 9 scam 10 database Writing A In favour of: Parents supporting their children at university have a right to know what their money is being spent on. Parents end up paying if their children make mistakes. Against: It is an invasion of privacy. Young people have to learn how to manage money. It will make people feel that their parents don’t trust them.
  • 2. PHOTOCOPIABLE © Macmillan Publishers Limited 2015. This page may be photocopied and used within the class. 2 Open Mind ADVANCED Speaking A Points mentioned: 1 I don’t want anyone to invade my privacy. 2 I share more information online than my parents. 4 Different cultures view privacy differently. 5 Opinions about privacy depend on people’s experiences. B Starting, finishing and keeping the discussion moving: 1 begin 2 move on 3 So Interrupting politely: 4 Sorry Inviting contributions: 5 add LifeSkills C Possible answers: Software and browsers: You should use good anti-virus, anti-spyware and firewall software to protect your computer from viruses that let hackers get hold of your personal information. You should also configure your browser so that it doesn’t allow websites, adverts, or anything else that you don’t want. Email, secure payments and privacy policies: You should have different email addresses for your personal mail and for online shopping. That way, you won’t get spam in your personal email. When you buy something online, look for the padlock symbol because it means that it’s a secure site. Make sure that websites have a privacy policy. They have to explain how they will use your data. It’s better not to use a site if it doesn’t have a privacy policy. D Possible answers: Change passwords on a regular basis. Change your passwords at least every 90 days to reduce the chance that a computer criminal can gain access to your computer or online accounts. Don’t use the same password across multiple sites. D 1 get hold of 2 ran up 3 take out, cleared up 4 calling on 5 get out of 6 go through 7 end up Suggestions for how to explain meanings: get hold of – get or obtain run up – accumulate or increase (debt or bills) take out – apply for and get (a credit card, loan, etc) clear up – solve (a problem, mystery or misunderstanding) call on – ask (someone to do something) get out of – avoid (doing something) go through – experience (something unpleasant or difficult) end up – be in a certain situation, after a series of events Grammar A Susan shares a lot of personal information on social networking sites, while Roberta doesn’t like to give out a lot of personal information online, but prefers to keep it private. NOTICE! think, feel, expect, guess, suppose, imagine Verbs with other meanings apart from feelings or opinions are think, feel, expect, guess, suppose, imagine. B We usually make the first verb negative. 1 I don’t feel that everyone needs to know … 2 I didn’t think there was anyone who wasn’t on Facebook! 3 I guess I shouldn’t post about everything … 4 I don’t suppose many people think about … 5 I don’t expect I’m the only person … 6 I don’t imagine so. 7 I guess not. C 1 … suspect not. I hope (that) identity theft doesn’t/ won’t increase. 2 … don’t think so. I don’t believe (that) opinions stay … 3 … hope not. I don’t imagine (that) people will give up … 4 … guess not. I don’t feel (that) it helps …
  • 3. PHOTOCOPIABLE © Macmillan Publishers Limited 2015. This page may be photocopied and used within the class. 3 Open Mind ADVANCED B The main idea of the whole essay: Social media is an important part of people’s lives, but it may not be a positive development for society. Paragraph 2: Topic sentence: Of course, there are good arguments in favour of social media. Topic sentence is in favour of the main idea. Points that support it: (1) People can find old friends. (2) It is easy to stay in touch with family and friends. (3) You can stay close to family and friends by sharing photos and videos. Paragraph 3: Topic sentence: However, there are a number of problems with social media. The sentence is against the main idea. Points that support it: (1) People spend more time communicating with electronic devices than in person. (2) People put an enormous amount of information online, which can lead to data theft or blackmail. (3) People spend less time doing physical activities, which contributes to obesity. Paragraph 4: To summarise, although using social media allows us to communicate easily, it has many disadvantages Language wrap-up 1 Vocabulary 1 information age 2 privacy 3 compiled 4 leaves us open 5 databases 6 hack 7 get hold of 8 take out 9 run up 10 Identity theft 11 clear up 12 end up 2 Grammar A 1 don’t think so 2 assume he doesn’t know 3 guess not 4 don’t think you are 5 hope not B 1 We all need to make privacy a priority. 2 I’m careful to keep some things private. 3 You can call me paranoid, but I never use public computers. 4 Would you describe privacy as important to you? 5 They finally found him guilty of identity theft. Writing workshop A The writer seems to be against social media. The writer emphasises that the use of social media has many disadvantages, such as spending more time communicating with electronic devices than in person, putting a lot of personal information in cyberspace and doing fewer physical activities.