Anda di halaman 1dari 3

Name: _____________________________________________________________ No.

_______ Class: ______

The Teacher: ____________________________ Mark: ___________________

A. Pre-viewing tasks
1. Scan these reviews about Firewall and do the tasks that follow.
Brendan, Canberra
Jack, Victoria
Remarks: I really enjoyed this movie. It was really
Remarks: It's just another film about a case of kidnap and
suspenseful edge-on-your seat action. I would have
ransom that pretty much relies on Harrison Ford, and at
liked it to have gone longer. Harrison Ford was the
least he's got the energy to keep the film going. Thumbs
right actor for the part he played, a banks computer-
down to the vulgar happy ending too.
security expert.
Jenny, Sydney
Graham, Queensland
Remarks: I actually liked this movie. I found it very
Remarks: Total waste of time and money to see this
fascinating. Paul Bettany was an incredible evil character
movie on the big screen. The story is totally
and Harrison Ford played the frightened man that I think he
unbelievable with an unoriginal ending. The well-
would have been in the circumstances. Sure, it is a
known director, Richard Loncraine, was obviously out
somewhat clichd plot but this type of film a thriller is for
of his element here.
escapist entertainment and that's what I found it to be.
Adapted from

2. Find out in the reviews.

a. Who are the main actors?

b. Who is the director?

c. Which genre is the film?

d. What is the films main plot?

e. What is the main characters job?

f. Who didnt like the film?

g. Who enjoyed watching the film?

3. Put the words in order to complete this short summary of the film.
in 2006. Jack designed the best
by Richard Loncraine hackers by programming
Harrison Ford stars as Jack Stanfield, of a large bank in Seattle.
anti-theft computer system against the chief computer security expert
Firewall was directed computer firewalls.
However, Jack didn't know the human factor.
that there was one flaw in his system, outside attacks from internet

Firewall was directed

4. Complete the following definition of firewall with the words from the box:

permit messages Internet firewall unauthorized rules computer software

A ______________1 is an integrated collection of security measures designed to prevent unauthorized electronic

access to a networked ______________2 system. It is also a device or set of devices configured to
______________3, deny, encrypt, decrypt, or proxy all computer traffic between different security domains based
upon a set of ______________4 and other criteria.
It is a system designed to prevent ______________5 access to or from a private network. Firewalls can be
implemented in both hardware and ______________6, or a combination of both. Firewalls are frequently used to
prevent unauthorized ______________7 users from accessing private networks connected to the Internet,
especially intranets. All ______________8 entering or leaving the intranet pass through the firewall, which
examines each message and blocks those that do not meet the specified security criteria.
(Adapted from

B. While-viewing tasks
1. Identify the characters in the film. Match the photos with the names.

Bill Cox

Andy Stanfield

Sarah Stanfield

Jack Stanfield

Janet Stone

Beth Stanfield

2. Now write the names in the corresponding description.

a. is Jacks 14-year-old daughter who is a typical tomboy.

b. is Jacks secretary.

c. Jacks wife, , is an architect.

d. is a bank security specialist.

e. The leader of the gang of criminals is called .

f. is Jacks youngest son.

3. Choose the correct answers.

1. Where does the story take place? 3. What does Beth Stanfield do for a living?
a. Portland c. Seattle a. housewife c. real estate sales
b. Boston d. San Francisco b. author d. architect
2. What is Jack's position at the bank? 4. Jack has left a merger meeting and there is someone
waiting to meet him about a personal matter. What is this
a. computer security c. fund management about?
b. bank teller d. investments a. a computer virus c. a car accident
b. online betting debts d. network attacks