...Oral presentation of the book you’ve read You will hold a presentation of about 5 minutes. Your presentations must include: A thesis: Create a thesis based on what is typical for, or of particular importance in, your novel? The thesis indicates the focus of your presentation: Examples of different types of focus: The development of the main character, an important theme, author vs. novel, the book in the context of a series or in relation to a genre, the book and the movie based on it, etc. An introduction where the book and thesis is presented, a main body where the thesis is discussed and a conclusion/ending where you sum up your main ideas. Your presentation could include: A power point, pictures on small posters or similar visual aids. A small reading of a central or particularly descriptive paragraph. Be creative! Good luck! VURDERING For å få 5-6 på denne presentasjonen må du vise evnen til å snakke fritt om en bok du har lest. Presentasjonen må ha en funksjonell struktur og du må vise evne til å diskutere bokas innhold og tematikk med gode argumenter og med språklig presisjon. Språklig må du vise god grammatisk kontroll og presis uttale, samt vise et godt og variert ordforråd. For å få 3-4 på denne presentasjonen forventes det også en god struktur og at man presenterer noenlunde fritt fra manus. Innholdsmessig må man vise enkel diskusjon eller presentasjon av argumenter. Språklig er det rom for en del feil, men man må kommunisere...
Words: 639 - Pages: 3
...Net-Worm.Win32.Kido.ih Detected | Feb 20 2009 07:04 GMT | Released | Apr 02 2009 16:24 GMT | Published | Feb 20 2009 07:04 GMT | Manual description Auto description This description was created by experts at Kaspersky Lab. It contains the most accurate information available about this program. Manual description Auto description This is a description which has been automatically generated following analysis of this program on a test machine. This description may contain incomplete or inaccurate information. Technical Details Payload Removal instructions Technical Details This network worm spreads via local networks and removable storage media. The program itself is a Windows PE DLL file. The worm components vary in size from 155KB to 165KB. It is packed using UPX. Installation The worm copies its executable file with random names as shown below: %System%\<rnd> %Program Files%\Internet Explorer\<rnd>.dll %Program Files%\Movie Maker\<rnd>.dll %All Users Application Data%\<rnd>.dll %Temp%\<rnd>.dll %Temp%\<rnd>.tmp <rnd> is a random string of symbols. In order to ensure that the worm is launched next time the system is started, it creates a system service which launches the worm’s executable file each time Windows is booted. The following registry key will be created: [HKLM\SYSTEM\CurrentControlSet\Services\netsvcs] ...
Words: 1158 - Pages: 5
...LS4208 Product Reference Guide LS4208 Product Reference Guide 72E-69413-03 Revision A January 2007 © 2005-2007 by Symbol Technologies, Inc. All rights reserved. No part of this publication may be reproduced or used in any form, or by any electrical or mechanical means, without permission in writing from Symbol. This includes electronic or mechanical means, such as photocopying, recording, or information storage and retrieval systems. The material in this manual is subject to change without notice. The software is provided strictly on an “as is” basis. All software, including firmware, furnished to the user is on a licensed basis. Symbol grants to the user a non-transferable and non-exclusive license to use each software or firmware program delivered hereunder (licensed program). Except as noted below, such license may not be assigned, sublicensed, or otherwise transferred by the user without prior written consent of Symbol. No right to copy a licensed program in whole or in part is granted, except as permitted under copyright law. The user shall not modify, merge, or incorporate any form or portion of a licensed program with other program material, create a derivative work from a licensed program, or use a licensed program in a network without written permission from Symbol. The user agrees to maintain Symbol’s copyright notice on the licensed programs delivered hereunder, and to include the same on any authorized copies it makes, in whole or in part. The user agrees...
Words: 35954 - Pages: 144