module 4. basic software - This web client requires that you have


Add to my manuals
89 Pages

advertisement

module 4. basic software - This web client requires that you have | Manualzz

88

MODULE 4. BASIC SOFTWARE

Learning objectives

In this lesson, you will learn how to:

 Extract relevant information form texts about system software

 Recognize the characteristics of a typical graphical user interface or GUI

 Make a summary of a written text

 Talk about word processors

 Identify the function of different word-processing capabilities: search and replace, cut and paste, spell checkers, etc.

 Understand the basic features of spreadsheets and databases

 Acquire specific vocabulary related to Internet utilities.

88

Lesson 1. Operating Systems

I. Warm-up

A. Look at the diagram. What is the function of the operating system?

89

B. Read the text below and complete it with the phrases in the box.

Operating Systems

An operating system is a piece of software that presents an interface between the computer and the user.

One of the first operating systems was the GM OS or General Motors

Operating System created in 1955.

There are two major kinds of operating systems, Command Line

Interfaces (CLI), and more recently,

Graphical User Interfaces (GUI). CLIs use only text and no graphics to display information and the user navigates by means of the shell.

Examples of popular CLI operating systems still in use today are MS-DOS and Linux. Examples of popular GUI operating systems are Windows, [X-

Windows], and Macintosh OS.

Perhaps the most popular OS up until the 1990’s was Unix on the mainframe and [MS-DOS] on the PC.

Unix was created by mavericks

Dennis Ritchey and Ken Thompson in

1970 from an older MULTICS system which they both used but did not like very much. All versions of Linux and

Mac OS X can trace their roots to directly back to the original Unix.

MS-DOS was Microsoft Corporation's predecessor to Windows. Bill Gates liked the Unix-like functionality of a program designed by Tim Paterson of

Seattle Computer Products called

QDOS, and he bought it, rebranded it

MS-DOS, and licensed it to IBM. MS-

DOS became the underlying CLI for all of Microsoft's GUI operating systems up to and including Windows

XP.

89

90

The main operating system today on PCs is of course Microsoft

Windows with over 90% market share. Windows started out as a home and office OS but has recently become a serious challenger to Unix systems even in the enterprise, where UNIXderived systems still have a solid foothold.

What exactly is an operating system composed of? The base unit of the operating system is a collection of programs called the kernel. The kernel is the most basic layer which controls the hardware and the file system.

Other programs which help the kernel interface with the components and

II. Reading

Read the text and answer these questions:

1) What is an operating system ?

2) What are two major kinds of operating systems?

3) Name one of popular GUI operating systems?

4) What was the most popular OS up until the 1990’s?

5) Whom was Unix created by?

6) Which is the main operating system today on PCs?

7) What exactly is an operating system composed of?

8) What is the kernel?

9) What is another main task for an operating system?

10) What do modern operating systems offer? peripherals are called device drivers.

Another main task for an operating system is to control which users have access to specific parts of a computer's resources. Most operating systems have a facility to require users to authenticate with a username and password before being permitted to use the system resources. For example, the OS will allow a system administrator to set permissions on a file or a directory.

Modern operating systems also offer many utilities and conveniences including the ability to easily install and uninstall software applications, monitor hardware, upgrade itself through a network connection, and more. Even basic productivity applications such as web browsers and text editors are now included as standard on most operating system releases.

90

III. Basic DOS commands

Match the DOS commands on the left with the explanations on the right.

Some commands are abbreviations of English words.

1 FORMAT a erases files and programs from your disk

2 CD (or CHDIR) b copies all files from one floppy disk to another c changes your current directory d initializes a floppy disk and prepares it for use

3 DIR

4 MD ( or

MKDIR)

5 DISKCOPY

6 BACKUP

7 REN

(RENAME)

8 DEL e f g h displays a list of the files of a disk or directory changes names of your files creates a subdirectory saves the contents of the hard disk on floppy disk for security purposes

IV. Language work: Revision of the passive

A. The present simple passive

We form the present simple passive with am/is/are + past participle.

Example:

- This program is written in a special computer language.

- Programs and data are usually stored on disks.

Remember that the word data takes a singular verb (3 rd

person singular) when it refers to the information operated on in a computer program.

- The data is ready for processing.

B. Fill in the blanks with the correct form of the verbs in brackets.

1) Various terminals (connect) ………………… to this workstation.

2) Microcomputers (know) ………………… as ‘PCs’.

3) Magazines (typeset) ………………… by computers.

4) When a particular program is run, the data (process) ………………… by the computer very rapidly.

5) Hard disks (use) ………………… for the permanent storage of information.

91

6) The drug-detecting test in the Tour de France (support)

………………… by computers.

7) All the activities of the computer system (coordinate)

………………… by the central processing unit.

8) In some modern systems information (hold) ………………… in optical disks.

V. Quiz

Work with a partner. Try to answer as many questions as possible.

(Use the Glossary if you need to)

1) What name is given to the set of programs that interface between the user, the applications programs, and the computer?

2) What types of programs are designed for particular situations and specific purposes?

3) What does ‘MS-DOS’ stand for?

4) What is the basic DOS command for copying a file?

5) The Macintosh operating system is kept in various locations. Where exactly are these?

6) Can you give synonym for the term ‘routine’?

7) What is the abbreviation for ‘International Business Machines’?

8) Which company developed UNIX?

9) Which programming language allows you to play animations on the

Web?

10) What are the effects of computer viruses?

92

Lesson 2. The graphical user interface

I. A user-friendly interface

The picture below illustrates a user interface based on graphics.

Read the definitions in the HELP box and then match with the concept in the right column:

HELP box

The interface elements of the Windows XP

a. Is an area of the computer screen where you can see the contents of a folder, a file, or a program. Some systems allow several windows on the screen at the same time and windows can overlap each other. The window on the top is the one which is ‘active’, the one in use.

1. window

2. menu

3. pointer

4. icons b. Are small picture on the screen. They present programs, folders, or files. For example, the Recycle Bin icon represents a program for deleting and restoring files. Most systems have a special area of the screen on which icons appear.

5. folders c. Give the user a list if choice. You operate the menu by pressing and releasing one or more buttons on the mouse. d. Is the arrow you use to select icons or to choose options from a menu. You move the pointer across the screen with the mouse. Then you click a button on the mouse to use the object selected by the pointer. e. Containers for documents and applications, similar to the subdirectories of a PC platform.

93

II. Reading

A. Read the article below and decide which of the expressions in the box best describe a graphical user interface (GUI).

user-friendly slow text-based complex graphics-based attractive

The terms user-interface refers to

GUIs

applications with a high level of the standard procedures the user follows to interact with a particular consistency.

Today, the most innovative GUIs computer.

A good user interface is important because when you buy a program you want to use it easily. Moreover, a graphical user interface saves a lot of are the Macintosh, Microsoft

Windows, and IBM OS/2 Warp.

These three platforms include similar features: a desktop with icons, windows, and folders, a printer time: you don’t need to memorize commands in order to execute an application; you only have to point and click so that its content appears on the screen.

Macintosh computers – with a user interface based on graphics and intuitive tools – were designed with a single clear aim: to facilitate interaction with the computer. Their interface is called WIMP: Window,

Icon, Mouse, and Pointer, and software products for the Macintosh have been designed to take full advantage of its features using this interface. In addition, the ROM chips of a Macintosh contain libraries that provide program developers with routines for generating windows, dialog boxes, icons, and pop-up menus. This ensures the creation of selector, a file finder, a control panel and various desk accessories. Double clicking a folder opens a window which contains programs, documents, or further nested folders. At any time within a folder, you can launch the desired program or document by double-clicking the icon or you can drag it to another location.

The three platforms differ in other areas such as device installation, network connectivity, or compatibility with application programs.

These interfaces have been so successful because they are extremely easy to use. It is well known that computers running under an attractive interface stimulate users to be more creative and produce high quality results, which has a major impact on the general public.

94

B. Look at the text again and guess the meaning of the words in bold and italics in your own language.

C. Find answers to these questions.

1) What does the abbreviation ‘GUI’ stand for?

2) What is the contribution of Macintosh computers to the development of graphic environments?

3) What does the acronym ‘WIMP’ mean?

4) What computing environments based on graphics are mentioned in the text?

5) How do you run a program on a computer with a graphical interface?

6) Can you give two reasons for the importance of user-friendly interfaces?

III. Exercise work

Add to the statements (1-10) using the extra information (a-j).

1. A barcode is a pattern of printed black lines a. it contains the main electronic components.

2. A floppy is a disk b. it adds features to a computer

3. A mother is a printed circuit board

4. A password is a secret set of characters

5. A monitor is an output device

6. A disk drive is a unit

7. An expansion card is an electronic board

8. A CD-ROM drive is a common storage device

9. A notebook is a portable computer c. it is about the size of a piece of paper. d. supermarkets use them for pricing e. it reads and writes to disks. f. it can hold 1.44Mb of data. g. it allows access to a computer system h. it controls all the other boards in a computer i. it displays data on a screen.

95

10. The system unit is the main part of the computer j. it read data from a

CD_ROM disk

IV. Language work: Short relative clauses

We can join these sentences by using a relative clause.

1) Her house has a network.

2) It allows basic file-sharing and multi-player gaming.

1) + 2) Her house has a network which allows basic file-sharing and multi-player gaming.

Relative clauses with certain active verbs can be shortened by omitting the relative word and changing the verb to its ‘-ing’ form. We can shorten the relative clause like this:

Her house has a network allowing basic file-sharing and multi-player

gaming.

Note how these two sentences are joined by a relative clause.

3) The technology is here today.

4) The technology is needed to set up a home network.

3) + 4) The technology which is needed to set up a home network is here today.

Relative clauses like this with passive verbs can be shortened by omitting the relative word and the verb ‘to be’.

The technology needed to set up a home network is here today.

Now link each group of sentences into one sentence using short relative clause.

1

2

3

4

5

6 b a b a b a b a a b a

The technology is here today.

It is needed to set up a home network.

You only need one network printer.

It is connected to the server.

Her house has a network.

It allows basic file-sharing and multi-player gaming.

There is a line receiver in the living room.

It delivers home entertainment audio to speakers.

Eve has designed a site.

It is dedicated to dance.

She has built in links.

96

7

8

9 b a b a b a b

They connect her site to other dance sites.

She created the site using a program called Netscape

Composer.

It is contained in Netscape Communicator.

At the centre of France Telecom’s home of tomorrow is a network.

It is accessed through a Palm Pilot-style control pad.

The network can simulate the owner’s presence.

This makes sure vital tasks are carried out in her

10 a b c absence.

The house has an electronic door-keeper.

It is programmed to recognize you.

This gives access to family only.

Using short relative clauses is one way of reducing sentences. Other ways of reducing sentences are:

 Taking out relative pronouns where possible e.g. The software (that) we bought last year.

 Omitting qualifying words (adjectives, or modifying adverbs) e.g. (quite) complex/(very) similar

 Taking out that in reported speech or thoughts

 e.g. It is well known (that) computers…

 I think (that) there’s something wrong with this program.

 Cutting out unnecessary phrases

 e.g. Macintosh computers were designed with a clear aim: to facilitate the user’s interaction with the computer.

= Macintosh computers were designed to facilitate the user’s interaction with the computer.

V. Writing

Summarize the text in Task 2 in 70 – 75 words. You may like to follow these steps.

1. Read through the whole text again and think of a suitable title for it.

2. Make sure you understand all the main points. Go through the text and

underline the relevant information in each paragraph.

3. Make notes about the main points:

 Omit repetitions and unnecessary phrases

 Leave out details, such as examples

97

E.g. notes on the first paragraph: In the past, only experts used

computers. But now, emphasis on user-friendly interfaces.

4. Make sentences from the notes and connect the sentences by using

linking words (and, but, also, because, that’s why, in fact, therefore, etc.)

Write your first draft.

5. Improve your first draft by reducing sentences.

6. Check grammar, spelling, and punctuation. Write the final version of your summary.

98

Lesson 3. Spreadsheets

I. Looking at a spreadsheet

Look at this spreadsheet and try to answer the questions.

1 What is a spreadsheet?

What is it used for?

2 In a spreadsheet, there are

‘columns’, ‘rows’, and

‘cells’. Give an example of each from the sample spreadsheet.

3 What type of information can

This sample spreadsheet shows the income and expenses of a company. Amounts are

given in $ millions be keyed into a cell?

4 What will happen if you change the value of a cell?

II. Reading

Read the text below and decide whether these sentences are right (√) or wrong (X)

1) A spreadsheet program displays information in the form of a table, with a lot of columns and rows.

2) In a spreadsheet, you can only enter numbers and formulas.

3) In a spreadsheet you cannot change the width of the columns.

4) Spreadsheet programs can produce visual representations in the form of pie charts.

5) Spreadsheets cannot be used as databases.

A spreadsheet program is normally used in business for financial planning

– to keep a record of accounts, to analyze budgets or to make specific calculations. It’s like a large piece of paper divided into columns and rows.

Each column is labeled with a letter and each row is labeled with a number. The point where a column and a row intersect is called a cell. For example, you can have cells A1, B6,

C5, and so on.

A cell can hold three types of information: text, numbers and formulas. For example, in the sample spreadsheet, the word sales has been

99

keyed into cell A2 and the values 890,

478 and 182 have been entered into cells B2, B3, and B4 respectively. So when the formula ‘B2 + B3 + B4’ is change in one worksheet the same change is made in the other worksheet.

The format menu in a spreadsheet keyed into cell B5 the program automatically calculates and displays the result. usually includes several commands allowing you to choose the font, number alignment, borders, column width and so on.

Most spreadsheet programs can

Formulas are functions or operations that add, subtract, multiply or divide existing values to produce new values. We can use them to calculate discounts. totals, percentages or

When you change the value of one cell, the values in other cells are automatically recalculated. You can also update the information in different worksheets by linking cells. generate documents with graphic representations and some include three-dimensional options. The values of cells are shown in different ways such as line graphs, bar, or pie charts.

Some programs also have a database facility which transforms the values of the cells into a database. In this case, each column is a field and each row is a record.

This means that when you make a

III. Vocabulary

Match the terms in the box with the explanations below.

a. formul b. cell c. sales d. payroll e. shares f. revenue g. interest h. expenses

1) A sum of money that is charged or paid as a percentage of a larger sum of money which has been borrowed or invested, e.g. High rates./

7 percent ~ on a loan.

2) The intersection of a column and a row in a spreadsheet, e.g. the ~ B2.

3) The quantity sold, e.g. The ~ of PCs rose by 10 percent last year.

4) The income – or money – received by a company or organization, e.g.

The annual ~ of this multinational company is…

5) A ~ in a company is one of the equal parts into which the capital of the company is divided, entitling the holder of the ~ to a proportion of the benefits, e.g. £10 ~s are now worth £11

6) Financial costs; amounts of money spent, e.g. Travelling ~.

100

7) A function or operation that produces a new value as the result of adding, subtracting, multiplying, or dividing existing values, e.g. If we

enter the ~ B5-B10, the program calculates …

8) 1 A list of people to be paid and the amount due to each. 2 Wages or salaries paid to employees, e.g. He was on the company’s ~.

IV. Language work: Prepositions of place

A. Study these examples of prepositions of place.

1 Data moves between the

CPU and RAM.

2 Data flows from ROM to the CPU.

3 A program is read from disk into memory.

4 Data is transferred along the data bus.

5 The address number is put

onto the address bus.

6 The hard disk drive is inside a sealed case.

7 Heads move across the disk.

8 Tracks are divided into sectors.

B. Now complete each sentence using the correct preposition.

1) The CPU is a large chip ………. the computer

2) Data always flows ………. the CPU ………. the address bus.

3) The CPU can be divided ………. three parts.

4) Data flows ………. the CPU and memory.

5) Peripherals are devices ………. T

………. it. he computer but linked

101

6) The signal moves ………. the VDU screen ………. one side ………. the other.

7) The CPU puts the address ………. the address bus.

8) The CPU can fetch data ………. memory ………. the data bus.

V. Graphic representation

A. Look at the graph below and, with the help of a partner, check that it is an exact visual representation of the spreadsheet in Task 1.

B. Can you calculate the net profits of this firm during the period 1997-98?

C. What type of image is this: a pie chart, a bar chart, an area graph, or a line graph?

D. What is the advantage, if any, of displaying information as a graph, rather than as a spreadsheet?

VI. Extension

A. Spreadsheet programs are also used to make out invoices. Look at the invoice below and fill in the blanks with the right words from the box.

Quantity Description Price VAT (Value Added Tax)

Reference TOTAL Address Company

102

B. Have you got a spreadsheet program at work or school? If so, try to produce a similar invoice.

103

Lesson 4. Databases

I. Warm-up

Companies often use databases to store information about customers, suppliers and their own personnel. Study the illustrations and then try to answer these questions.

1) What is a database?

2) Which tasks can be performed by using a database? Make a list of possible applications.

3) What do the terms mean in your language: file, record, field?

Name: James Powell

Address: 12, Back

St.

Marital status: single

Identification 8994989

Job ENGINEER

SALARY

£18,750

Home phone: 456367

Department: Data processing

Commission: £18,750

II. Reading

A. Here is a part of an article about databases. First, read all the way through and underline the basic features of a database.

Basic features of database programs

With a database, you can store, organize, and retrieve a large collection of related information on computer. If you like, it is the electronic equivalent of an indexed filing cabinet. Let us look at some features and applications.

 Information is entered on a database via fields. Each field holds a separate piece of information, and the fields are collected together into records.

For example, a record about an employee might consist of several fields which give their name, address, telephone number, age, salary, and length of employment with the company. Records are grouped together into files which hold large amounts of information.

Files can easily be updated: you can always change fields, add new records, or delete old ones.

104

With the right database software, you are able to keep track of stock, sales, market trends, orders, invoices, and many more details that can make our company successful.

 Another feature of database programs is that you can automatically look up and find records containing particular information. You can also search on more than one field at a time.

For example, if a managing director wanted to know all the customers that spend more than

£7,000 per month, the program would search on the name field and the money field simultaneously.

A computer database is much faster to consult and update than a card index system. It occupies a lot less space, and records can be automatically sorted into numerical or alphabetical order using any field.

The best packages also include networking facilities, which add a new dimension of productivity to businesses. For example, managers of different departments can have direct access to a common database, which represents an enormous advantage.

Thanks to security devices, you can share part of your files on a network and control who sees the information.

Most aspects of the program can be protected by user-defined passwords.

For example, if you wanted to share an employee’s personal details, but not their commission, you could protect the commission field.

In short, a database manager helps you control the data you have at home, in the library or in your business.

B. Now make a list of the words you don’t understand. Can you guess their meaning? Compare your ideas with other students.

C. Using the information in the text, complete these statements.

1) A database is used to …………..……….……………...…………..

2) Information is entered on a database via ……………...……………

3) Each field holds …………………………………………………….

4) ‘Updating’ a file means …………………………………………

5) The advantages of a database program over a manual filing system are …

6) Access to a common database can be protected by using ………………

III. Puzzle

Complete the sentences by using a term from the list. Then write the words in the crossword to find the hidden message.

database field layout merging

105

record sorted

1. In order to personalize a standard letter, you can use ‘mail …………….’ (a technique which consists of combining a database with a document made with a word processor).

2. Records can be automatically

……………. into any order. updated

3. You can decide how many fields you want to have on a …………….

4. Files can easily be ……………. by adding new information or deleting the old one.

5. A ……………. program can be used to store, organize and retrieve information of any kind.

6. The ……………. of the records can be designed by the user.

Each piece of information is given in a separate ……………. .

IV. Language work

Requirements: Need to, have to, must, be + essential, critical

Note how we describe requirements of particular

jobs:

We can also treat need as a

modal verb and use the negative form needn’t:

1. You need to be able to empathise with the person at the other end of the phone.

7. You needn’t have a degree in computing science.

2. IT managers have to take responsibility for budgets.

Have to is an ordinary verb.

Its negative form is made in the usual way:

3. You must be interested in your subject.

4. You must have worked for at least two years in systems analysis.

8. You don’t have to be an expert in everything.

Mustn’t has a quite different meaning. It means it is important not to do

106

5. Experience with mainframes is

essential/ critical.

something. It is used for warning, rules, and strong advice. For example:

We can describe things which are not requirements like

9. You mustn’t make unauthorized

this:

copies of software.

6. You don’t need to have a degree in computing science.

A. Now fill in the blanks with the appropriate form of the verbs, need to,

have to, and must, to make sensible statements. More than one answer is possible in some examples.

1) Technical qualifications ………….. to be renewed at intervals to ensure they do not go out of date.

2) You ………….. become an expert in too narrow a field.

3) You ………….. to have good communication skills to become an IT

Manager.

4) You ………….. be an expert in hardware to become a programmer.

5) You ………….. have worked with IBM mainframes for at least two years.

6) You ………….. be able to show leadership.

7) You ………….. have a degree but it ………….. be in computing science

8) You ………….. to have experience in JavaScript

9) You ………….. be able to use C++

10) These days you ………….. study BASIC

B. Study these requirements for different jobs in computing advertised on the Internet. Then describe the requirements using the methods studied in this unit.

Systems Manager/

Programmer

Support Analyst:

IBM Mainframe MVS

 Technical specialist

 IBM MVS support technician

 Min. 2 yrs work in systems programming

 1 yr exp. of VTAM,

NCP, SSP, NPM,

IBM 3745-900

Programmer

 3 yrs exp. SAP Basic

Technical

Environment

 Team player with strong analytical and

107

 Plus exp. of

Netview/ automation design & support hardware

 Authorized to work in the EU problem-solving skills

 Ability to communicate issues and solutions and manage time effectively

Webmaster

 Strong Unix experience

 Able to use

HTML,

DHTML, and

JavaScript

 Knowledge of

Shell Scripts

Cisco Technician IS Manager

 CCNA qualified

 Excellent skills in the

 Knowledge of NT and Netware surrounding technologies

 Min. 2 yrs work in

 Experience of ERP systems implementation support  Very strong managerial skills

V. Writing

Imagine that you are Barry Stephens, the sales manager of Sunrise

Computer. Write a standard letter to your clients about ‘New software products on the market’, and offer them a free demonstration disk.

108

MODULE 5. FACES OF THE INTERNET

Lesson 1. The internet and email

I. Internet basics

A. In pairs, discuss how you would define the Internet

B. Make a list of all the things you can use the Internet for

II. Internet FAQs

A. Read Part 1 of the internet FAQs and choose the correct answers

1) The internet was a. Invented in the mid-90s b. Popular in the 1960s c. Probably created in the USA

2) Which term describes any fast, high-bandwidth connection? a. Broadband b. Dial-up connection c. Wi-Fi connection

3) The power-line internet provides broadband access through a. Telephone lines b. Satellites c. Electrical power lines

4) Which device converts computer data into a form that can be transmitted over phone lines? a. ADSL b. A mobile phone c. A modem

5) The standard protocol that allows computers to communication over the Internet is called a. An IP address b. TCP/IP c. HTTP

6) The geographical region covered by one or several access points is called a a. Wireless access point b. Hotspot c. Wireless network device.

109

Internet FAQs: Part 1

How old is the Internet (the Net)? When was it created?

It’s hard to say exactly. The research that led to what we now know as the Internet was begun in the 1960s

Who created the Internet?

Again, it’s hard to say exactly who created it. The initial research was carried out by the Advanced Research Projects Agency in America, funded by the US government.

Did the Internet become popular quickly?

It took many years for the Internet to become popular around the world. It’s only really since the mid-90s that the Internet has been a part of our daily lives.

How do you get online?

To get connected, you need a computer, the right connection Software and a modem connected to the phone line. You also need an account with an

Internet Service Provider (ISP), which acts a gateway between your PC and the rest of the Net.

How fast are today’s internet connections?

Today, ISPs offer a broadband, high-speed connection. The most common types are cable-offered by local cable TV companies-and ADSL

(Asymmetric Digital Subscriber Line), which works through phone lines.

They are both faster than the traditional dial-up telephone connection.

Broadband access is also offered by some electricity networks. This connection technology, known as power-line Internet, provides low-cost access via the power plug, but is still in development.

How long has broadband existed?

Since the late 1990s.

How much does broadband access cost?

It depends on which company you choose. Nowadays, some companies even offer free broadband.

Why do you need a modem?

A modem (modulator/demodulator) converts digital signals into analogue signals so that data can be transmitted across the phone or cable network.

What does TCP/IP mean?

The language used for data transfer on the Internet is known as TCP/IP

(transmission control protocol/ Internet Protocol). This is like the internet

110

operating system. Every computer connected to the Net is identified by a unique IP address.

Are there other ways of accessing the Internet?

Other methods of internet access include Wi-Fi, satellite, mobile phones and TV set equipped with a modem, Wi-Fi-enabled laptops or PDAs allow you to connect to the Net if you are near a wireless access point, in locations called hotspots (for example, a Wi-Fi café, pack or campus).

Satellite services are used in places where terrestrial access is not available

(for example, on ships at sea). High-end mobile phones provide access through the phone network.

B. In pairs, discuss which of the internet systems (1-6) you would use to do the tasks (a-f). then read Part 2 of the FQAs and check your answers

1. Email a. Transfer files from the Internet to your hard drive

2. The Web b. Send a message to another person via the Internet

3. Newsgroups

4. Chat and IM c. Have a live conversation (usually typed) online d. Connect to a remote computer by entering instructions, and run a program on it

5. FTP

6. Telnet e. Take part in public discussion areas devoted to specific topics f. Download and view documents published on the

Internet

Internet FAQs: Part 2

Email

Email lets you exchange messages with people all over the world.

Optional attached files can include text, pictures and even audio and animation. A mailing list uses email to communicate messages to all its subscribes – that is, everyone that belongs to the list.

Which email program is the best?

Outlook Express is a popular program, but many users use web-based email accounts such as Hotmail.

The web

The Web consists of billions of document living on web servers that use the HTTP protocol. You navigate through the Web using a program called a web browser, which lets you search, view and print web pages.

How often are web pages updated?

It depends entirely on the page. Some are updated thousands of times a day.

111

Chat and Instant Messaging (IM)

Chat and Instant Messaging technologies allow you to have real-time conversations online, by typing messages at the keyboard.

FTP

FTP, of file transfer protocol, is used to transfer files over a TCP/IP network. Nowadays, this feature is built into Web browsers. You can download programs, games and music files from a remote computer to your hard drive.

Telnet

Telnet is a protocol and a program used to log onto remote computer systems. It enables you to enter commands that will be executed as if you were entering them directly on the remote server.

Newsgroups

Newsgroups are the public discussion areas which make up a system called Usenet. The contents are contributed by people who post articles or respond to articles, creating chains of related postings called message threads. You need a newsreader to subscribe to newsgroups and to read and post messages. The newsreader may be a stand-alone program or part of a web browser.

How many newsgroups are there?

There are approximately 30,000 active newsgroups.

Where can you find newsgroups?

Your newsreader may allow you to download the newsgroup addresses that your ISP has included on its news server. An alternative to using a newsreader is to visit web forums instead, which perform the same function but without the addition software.

C. Find words and phrases in part 2 with following meanings

1) A system used to distribute email to many different subscribers at once

(in Email paragraph)

2) A program used for displaying web pages (in The Web paragraph)

3) To connect to a computer by typing your username and password (in

Telnet paragraph)

4) A series of interrelated messages on a given topic (in Newsgroups paragraph)

5) A program for reading Usenet newsgroups (in Newsgroups paragraph)

III. Language work: questions

112

A. Look at the HELP box and then make a question about Sue Clarke for each of her answers

1) ………………………………………..

I’m 23 years old

2) ………………………………………..

I’m an online researcher

3) ……………………………………….

I use the Internet to find information requested by clients

4) ………………………………………..

I’ve been doing this job for six months

5) …………………………………………

I graduated from university in 2006

Sue Clarke

HELP box

Questions

Place

Where can you find newsgroups?

 In questions, we normally place the

Time auxiliary verb before the subject.

When was it created?

Are there other ways of accessing the

How often are web pages updated?

Internet?

How long has broadband existed?

 If there is no other auxiliary, we use

Reason

do/does (present simple) or did (past

Why do you need a modem? simple)

Quantity

Did

Internet become popular

How much does broadband access cost? quickly?

How many newsgroups are there?

 There are many question words in

Manner

English which we use to find out

How do you get online? more information than just yes or no

Others

People

How

fast are today’s internet

Who created the Internet? connections?

Things

How old is the Internet?

What does TCP/IP mean?

Which email program is the best?

B. In pairs, make questions using these prompts. Then practice asking and answering the questions.

113

Example: When / first / use the Internet

Internet? when did you first use the

1) What type of internet connection / have at home?

2) How fast/ your internet connection?

3) How much / pay for broadband access?

4) How often/ access the internet?

5) Which email program/use?

6) Who/ send email to?

7) Do / use you mobile phone to access the Internet?

8) Do / use the internet in public spaces using Wi-Fi?

9) Do/ play games online?

10) How many newsgroups / subscribe to?

114

Lesson 2. The web

I. A typical web page

Read the text and label the features on the screenshot with the terms in bold

A typical web page

At the top of the pages is the URL updates. When a web page won’t load,

address.

URL means

Uniform

Resource Locator – the address of a file on the Internet. A typical URL look like this http://www.24h.com.vn/abc you can refresh the current page, meaning the page reloads (downloads again). If you want to mark a website address so that you can easily revisit the

In this URL, http:// means

Hypertext Transfer protocol and tells the program to look for a web page. www mean

world wide web.

24h.com.vn is the domain name of the page at a later time, you can add it to your favorites, or bookmark it. When you want to visit it again you simply click show favorites.

On the web page itself, most sites feature clickable image links and

clickable hypertext links. Together, these are known as hyperlinks and take you to other web pages when clicked.

server that hosts the website – a company based in Vietnamese; other top-level domains are .com

(commercial site), .edu (education),

.org (organization) or .net (network); abc is the directory path where the web page is located. The parts of the URL are separated by . (dot), / (slash) and :

(colon). Some sites begin ftp://, a file

transfer protocol used to copy files from one computer to another.

The toolbar shows all the navigation icons, which let you go back one page or go forward one page. You can also go to the home page or stop the current transfer when the circuits are busy

Tab buttons let you view different sites at the same time, and the built-in

search box helps you look for information. If the feed button lights up, it means the site offers RSS feeds, so you can automatically receive

115

II. Language work: collocations 2

A. Look at the HELP box and then match the words on the left (1-6) with the words on the right (a-f) to make collocations. There may be more than one possible answer.

1. Online

2. Take

3. Email

a. friends

b. photos

4. Upload

5. Portable

c. action

d. website

e. encyclopedia

6. official

f. player

B. In pairs, make sentences using the collocations above.

C. Find the collocations in these sentences and say what type they are

1) Once you are online, you can browse the Web, visit chat rooms or send and receive emails.

2) Instant messaging can be a great way to communicate with friends.

3) This software may not be fully compatible with older operating systems.

4) Most webcam plug into a USB port.

5) This highly addictive game will keep you playing for hours

6) Companies are starting to use virtual reality on their websites.

HELP box

 Verb + particle

 Adverb + adjective

Collocations 2

A collocation is a pair or group of

Highly sensitive information

Freely available on the Web words that are often used together.

For example, we say make phone call,

 Adjective + noun

Mathematical formulas

not do phone calls.

Here are some common types of

Up-to-date information

The world online often collocates collocation with other words and can function as

 Verb + noun adjective or adverb.

Surf the Web

Adjective: They post opinions on

Download music

online journals

Adverb: a podcast is an audio

Hack into a computer

Log onto a bank account recording posted online.

D. Complete the extracts with words from the box

Authorization Fake Internet auction Shopping cart

116

Browse Login steal

1) Occasionally I also buy things on………….sites such as eBay where people offer and sell things to the highest bidder.

2) First you enter a site dedicated to e-commerce and…………..their products

3) Then you put the items you want to buy into a virtual…………-a program that lets you select the products and buy with a credit card

4) You may have to……….with a username and a password…

5) …for some transactions, you will be required to use a TAN, a transaction………number

6) Be aware of phishing – you may receive………….emails claiming to be from your bank and asking for personal information or account details in an attempt to……….you identity.

III. Language work: the prefixes e- and cyber-

Look at the HELP box and then complete these sentences

1 A………….is an employee who uses his company’s internet connection during work hours to

HELP box

The prefixes e- and cyber-

chat with friends, play games, etc.

2 An ……….is a postcard sent via the

 The e- prefix means electronic and we add it to activities that take place on computers or online, for example

Internet

3 An……….is a small magazine or

e-business/e-commerce – business conducted over the Internet. Other newsletter published online

4 In a…………..you can use example include; e-card, e-learning, computers with internet access for a fee

e-zine, e-voting, e-signature, e-

assessment, e-cash, e-book and e-

5 Examples of……….include internet

pal.

There are often spelling variations, fraud, digital piracy, theft of confidential information, etc. with or without a hyphen, so always check your dictionary.

6 In the future, all elections will be carried out using………

 The cyber- prefix comes from cybernetics, and we use it to describe

7 You can now sign legal documents online using an……………. things related to computer networks,

8 ……………will revolutionize the way we take exams for example cybercafé – an internet café. Other examples include:

cybercrime, cyberculture,

cyberslacker and cyberspace

117

9 ………..can be used on some websites instead of real money to make purchases.

It reduces the risk of fraud.

10 An………………. is like the paper version, but in digital form.

118

IV. What do you use the Web for?

In pairs, discuss these questions. Give reasons for your answers.

1 what is your favorites search engine to find information on the Web? Why?

2 Do you download music or video clips from the Web?

Do you pay for them?

3 Do you buy things online? Is it better to buy online or go to a shop?

4 Have you ever listened to the radio or watched TV online?

5 Do you use the Web to do school/university assignments or projects? How?

119

Lesson 3. Internet security

I. On alert

A. In pair, discuss these questions.

2) What is a hacker?

3) How easy do you think it is to infiltrate the Internet and teal sensitive information?

4) How can you protect your computer from viruses and spyware?

A. Match the captions (1-4) with the pictures (a-d)

1 A secure website can be recognized in two ways: the address bar shows the letters https and a closed padlock or key is displayed at the bottom of the screen.

2 You have to type your username and password to access a locked computer system

3 This program displays a message when it detects spyware and other unwanted software that may compromise your privacy or damage your computer.

4 Private networks use a software and/or hardware mechanism called a firewall to block unauthorized traffic from the Internet. a……………. c……….. b………… d…………….

120

II.

Security and privacy on the Internet

A. Read the text quickly and see how many of your ideas from 1A Question are mentioned

B. Read the text more carefully and answers these questions.

1) Why is security so important on the Internet?

2) What security features are offered by Mozilla Firefox?

3) What security protocol is used by banks to make online transactions secure?

4) How can we protect our email and keep it private?

5) What methods are used by companies to make internal networks secure?

6) In what ways can a virus enter a computer system?

7) How does a worm spread itself?

Security and privacy on the Internet

There are many benefits from an

cookies – small files placed on your open system like the Internet, but one hard drive by web servers so that they of the risks is that we are exposed to

hackers, who break into computer systems just for fun, to steal information, or to spread viruses. So how do we go about making our online transactions secures?

Security on the Web

Security is crucial when you send confidential information online.

Consider, for example, the process of buying a book on the Web. You have to type your credit card number into an order form which passes from computer to computer on its way to can recognize your PC when you return to their site.

If you use online banking services, make sure they

Email privacy

use

digital

certificates – files that are like digital identification cards and that identify users and web servers. Also be sure to use a browser that is compliant with

SSL (Secure Socket Layer), a protocol which provides secure transactions.

Similarly, as you email travels across the Net, it is copied temporarily the online bookstore. If one of the intermediary computers is infiltrated by hackers, your data can be copied.

To avoid risks, you should set all security alerts to high on your web browser. Mozilla Firefox displays a lock when the website is secure and allows you to disable or delete onto many computers in between.

This means that it can be read by people who illegally enter computer systems.

The only way to protect a message is to put it in a sort of virtual envelope

– that is, to encode it with some form of encryption. A system designed to

121

send email privately is Pretty Good privacy, a freeware program written by Phil Zimmerman. disc drive – if you insert an infected disc – or via the Internet. A worm is a self-copying program that spreads through email attachments; it

Network security

Private networks can be attacked by intruder who attempt to obtain information such as Social Security numbers, bank accounts or research and business reports. To protect replicates itself and sends a copy to everyone in an address book. A

Trojan horse is disguised as a useful program; it may affect data security.

Spyware collects information from crucial data, companies hire security consultants who analyze the risks and provide solutions. The most common methods of protection are passwords for access control, fire walls, and your PC without your consent. Most spyware and adware (software that allows pup-ups- that is, advertisements that suddenly appear on your screen) is included with

encryption and decryption systems.

Encryption changes data into a secret code so that only someone with a key

“free” downloads.

If you want to protect your PC, don’t open mail attachments from can read it. Decryption converts encrypted data back into its original form.

Malware protection

strangers and take care when downloading files from the Web.

Remember to update your anti-virus

software as often as possible, since new viruses are being created all the

Malware (malicious software) are programs designed to infiltrate or damage your computer, for example

viruses, worms, Trojans and time.

spyware. A virus can enter a PC via a

III. The history of hacking

A. Read Part 1 of the text and answer these questions.

1) Which hacking case inspired the film War Games?

2) When did Captain Zap hack into the Pentagon?

3) Why was Nicholas Whitely arrested in 1988

4) How old was the hacker that broke into the US defense computer in

1982?

The history of hacking – Part 1

1971-

John Draper discovered that a whistle offered in boxes of Cap’n

Crunch breakfast cereal perfectly generated the 2,600Hz signal

122

used by the AT&T phone company. He started to make free calls.

He was arrested in 1972 but wasn’t sent to prison

1974-

Kevin Mitnick, a legend among hackers, began hacking into banking networks and altering the credit reports of his enemies.

He didn’t expect that his most famous exploit – hacking into the

North American Defense Command in Colorado Springs – would inspire the film War Games in 1983

1981-

Ian Murphy, a 23-year – old know as Captain Zap on the networks, hacked into the White House and the Pentagon

1987-

The IBM international network was paralyzed a hacker’s

Christmas message.

1988-

The Union Bank of Switzerland almost lost £32 million to hackers. Nicholas Whitely was arrested in connection with virus spreading.

1989-

A fifteen-year-old hacker creaked the US defense computer

1991-

Kevin Poulsen, known as Dark Dante on the network, was accused of stealing military files.

B. In pairs, discuss which of the cases in part 1 you had heard of. Which do you think is the most important?

IV. Language work: the past simple

A. Look at the HELP box and then complete Part 2 of the text with the past simple form of the verbs in the box

show spread steal launch affect attempt overwrite be infect

The history of hacking – Part 2

1992-

David L Smith (1)…………..prosecuted for writing the Melissa virus, which was passed in Word files sent via mail

1997-

The German hacker Chaos Computer Club (2)………… on TV how to obtain money from bank accounts

2000-

A Russian hacker (3)………… to extort $100,000 from online music retailer CD Universe. A Canada hacker (4)………… a massive denial of service attack against website like Yahoo! And

Amazon.

The ILoveYou virus, cleverly disguised as a love letter,

(5)………… so quickly that email had to be shut down in many companies. The worm (6)………. Image and sound files with a

123

copy of itself.

2001-

The Code Red worm (7)………. Tens of thousands of machines

2006-

Hackers (8)………….the credit card details of almost 20,000

AT&T online customers. However, subscribers to its services (9)

(not)………….

HELP box

Past simple

 There are many verbs which are

 We use the past simple to talk irregular in the past simple about a complete action or event

Kevin Mitnick began hacking into…

which happened at a specific time in the past

We form questions and negatives for irregular verbs in the same way as

 We form the past simple of for regular verbs. The exception is be regular verbs by adding –(e)d to

When did Kevin Mitnick begin

the infinitive

hacking into…?

John Draper discovered that a

He didn’t begin hacking until 1974 whistle…

We form questions and negatives

 We form the past passive with the past simple of be + the past using did/didn’t participle

When did Captain Zap hack into IBM international was paralyzed by the Pentagon?

He didn’t expect that his most He wasn’t sent to prison

famous exploit

hackers.

Why was Nicholas Whitely arrested

in 1998?

B. Read these landmarks in the history of the Internet and prepare at least five questions in the past simple

Example: what happened in 1969? What did Ray Tomlinson do in 1971?

1969-

The US Defense Department establishes ARPANET, a network connecting research centre

1971-

Ray Tomlison of BBN invents an email program to send message across a network. The @ sign is chosen for its at meaning

1981-

IBM sells the first IBM PC, BITNET provides email and file transfers to universities

1982-

TCP/IP is adopted as the standard language of the Internet

1988-

Jarkko Oikarinen develops the system known as Internet Relay

Chat (IRC)

124

1991-

CERN creates the World Wide Web.

1998-

Online banking, e-commerce and MP3 music become popular

2001-

Napster, whose software allows users to share downloaded music, maintains that it does not perpetrate or encourage music piracy.

However, a judge rules that Napster’s technology is an infringement of music copyright

2004-

Network Solution begins offering 100-year domain registration

2006-

Americans spend over $100 billion shopping online

C. In pairs, ask and answer your questions

V. Internet issues

A. In small groups, look at the list of cybercrimes and discuss these questions

1) Which crimes are the most dangerous?

2) Is it fair or unfair to pay for the songs, videos, books or articles that you download? Should copyright infringement be allowed online?

3) What measures can be taken by governments to stop cybercrime?

4) Do you think governments have the right to censor material on the

Internet

5) Personal information such as our address, salary, and civil and criminal records is held in databases by marketing companies. Is our privacy in danger?

Cybercrimes

Piracy – the illegal copy and distribution of copyrighted software, games or music files

Plagiarism and theft of intellectual property – pretending that someone else’s work is your own

Spreading of malicious software

Phishing (password harvesting fishing) – getting passwords for online bank accounts or credit card numbers by using emails that look like they are from real organizations, but are in fact fake; people believe the message is from their bank and send their security details.

IP spoofing – making one computer look like another in order to gain unauthorized access

Cyberstalking – online harassment or abuse, mainly in chat rooms or newsgroups

Distribution of indecent or offensive material

125

B. Write a summary of your discussion on PowerPoint and present it to the rest of the class

126

MODULE 6. CREATIVE SOFTWARE

Learning objectives

In this module, you will learn how to:

 Identify the functions of different graphics tools

 Understand specific aspects of desktop publishing and multimedia applications

 Write a letter to a newspaper asking for information about the hardware and page-layout software used for its production

127

Lesson 1. Multimedia

I. Multimedia is here!

Look at the cover for Encarta ’05.

What types of data are integrated in multimedia applications?

II. Reading

A. Read the texts and match them with the headings in the box below.

Sound, Music, MIDI CD-ROM titles full of pictures, action and sound!

The potential of using multimedia

CD-ROM is more than just heavy metal

7. ……………………………

Multimedia magic!

Until now, multimedia applications have been used mainly in the fields of information, training, and entertainment. For example, some museums, banks, and estate agents have information kiosks that use multimedia. Several companies produce training programs on optical disks, and marketing managers use presentation packages (like Microsoft PowerPoint or Lotus Freelance Graphics for

Windows) to make business presentations. They have all found that moving images, sound, and music involve viewers emotionally as well as inform them, and make their message more memorable.

8. ……………………………

Sound is an important component of the multimedia approach. The effective use of sound can be used to grab the attention of the participant, set the mood, or underscore a point. The most popular way of delivering sound is the hardware soundboard. Such boards offer two important capabilities. The first of these is a built-in stereo synthesizer complete with a built-in audio amplifier. Just connect a set of speakers and you’ve got instant sound, music and speech capabilities. The second capability is the musical instrument digital interface, or MIDI. This is a specialized serial interface that allows an electronic musical instrument to communicate with other MIDI-equipped instruments or PCs.

128

CD-ROM is popular

9. …………………………..

Between 80 and 90 percent of all multimedia applications are distributed on

CD-ROM, some just on CD, some on several media (as with Autodesk’s

Multimedia Explorer, which comes with both a CD-ROM and diskettes). The reason for CD-ROM’s popularity in multimedia is simple – a single CD can contain

650 MB of data. That’s over 500 floppy disks’ worth of programs, sound, and graphics. The newest CD-ROM standard, CD-ROM XA (for eXtended

Architecture) uses data compression to fit even more on these shiny discs. Many

XA drives are also compatible with Kodak’s PhotoCD technology, which digitizes photographs and places them on a CD-ROM.

10. ………………………..

Electronic encyclopedias integrate text, pictures, and sound, and usually have a video section with a full motion video window. The Compton’s Encyclopedia enables you to read about whales, look at photos of whales, listen to whale songs, and view an animated sequence showing whale movements through the ocean.

Similarly, the Grolier Encyclopedia lets you read about birds, view pictures of birds, and listen to recordings of their songs.

Other CD-ROMs include dictionaries, guides, and courses about history, science, the human body, cinema, literature, foreign languages, etc. For example,

Cinemania from Microsoft has information on thousands of films and photographs, reviews, biographies and dialogues from films.

(Section 2 and 3 adapted from ‘Updating to multimedia’ in PC Upgrade, June 1993)

B. Read the texts again and correct these statements. There is a technical mistake in each of them.

1) Multimedia applications do not use huge amounts of data.

2) You don’t need to have a soundboard on your PC to hear speech and music.

3) Most multimedia software is distributed on magnetic disks.

4) Kodak’s PhotoCD technology is not compatible with many CD-ROM drives.

129

5) There are no language courses available on CD-ROM

D. Match these terms in the box with the explanations.

b. Computer animation c. Video computing d. MIDI interface e. CD-ROM player f. Multimedia control panels

1) Small programs inside the OS designed to work with audio and video files.

2) A code for the exchange of information between PCs and musical instruments.

3) A drive used to handle CD-Rom disks.

4) Manipulating and showing moving images recorded with a video camera or captured from a TV or video recorder.

5)

Images which move on the screen.

III. Language work: If – clauses

A. Conditional clauses

When you want to talk about a possible situation and its consequences, you use a conditional sentence. Here, we examine two types of conditionals.

First conditional (possible situation)

If A happens, B will happen.

(present + simple), (will + verb)

E.g. If you click on the speaker icon, you’ll get a piece of dialogue from the movie.

In the main clause, we can also have modal (can), an imperative, or a present tense verb.

Second conditional (unlikely situation)

If A happened, B would happen.

(past simple), (would + verb)

E.g. If I had the money, I would (I’d) invest in a multimedia upgrade kit.

Other modals (could, should, might) may appear in the main clause.

Read these sentences, then identify the tenses used in the if-clause and in the main clause.

1 If you upgrade your PC, you’ll be able to run multimedia applications.

2 If the marketing manager had a multimedia system, she could make more effective presentations.

B. Put the verbs in brackets into the correct form.

130

1) If I (get) …………… a sound card, I’ll be able to create my own music with a MIDI.

2) If the system (have) …………… a SuperVGA card, we would obtain a better resolution.

3) You won’t be able to play CD-ROM disks if you (not have)

…………… a CD-ROM drive.

4) If you (come) …………… to the annual computer exhibition, you could see the new Macs.

5) If I could afford it, I (buy) …………… a Multimedia PC

C. Match the sentences in Column A with appropriate sentences from

Column B. Then join each action and effect using an if-sentence.

Column A

1 You press Print Screen

2 You press Ctrl + Alt + Del in

Windows 98

3 You added more memory

4 You installed a modem

Column B

a you can drag it across the screen b it would speed up the computer c you may lose data d you would have more space at your desk

5 You used a better search engine

6 You forget to save regularly

7 You hold down the mouse button over an icon

8 You used an LCD display e you would be able to connect to a telephone line f you can make a copy of the screen g you would find more relevant results h it displays a list of active programs

D. Describe the consequences of these actions using an if-sentence.

1) you don’t virus-check floppies

2) there was a power cut while you were using your computer

3) you install a faster processor

4) you forgot your password

5) you press the delete key

131

6) you use search engine

7) you double-click on an icon

8) you use power-saving options

IV. Multimedia on the Web

Read the text and find:

1) the function of the extension that is usually added to a file name.

2) the language used to create the majority of text files on the Web.

3) the graphics interchange format created by CompuServe to compress images.

4) the small program (plug-in) that lets you hear audio recordings on the net. like Winzip.

Recognizing file formats

Web pages can contain different multimedia elements: text, graphics, sounds, video and animation. To identify the format or type of file, an extension (a threeletter suffix) is usually added to the file name when it’s saved on disk

Text

5) the most popular video formats.

6) the format created by the Moving Picture Experts’ Group to capture, store and play back movies.

7) the extension for the files that can be decompressed with a program

Graphics

The most common text extensions are .txt, .pdf, .doc and .htm (or

.html). Most of the text files that you find on the Web have the extension .htm, created with the hypertext markup language.

Graphics on the Web can include pictures, photos, paintings, image-maps and buttons. The most common formats are .gif (a standard image format developed by CompuServe) and .jpg or

.jpeg (created by the Joint Photographic Expert’s Group).

Sounds

The Internet is a great place to find and hear hit songs, movie soundtracks, and recorded interviews. The most common formats are these:

.wav: wave files can be played with Sound Recorder included with Windows.

132

.ra or .ram: files generated by RealAudio, a plug-in you can download from the Web.

Video and animation

You can see cartoons and movie clips on the Web, but you need the appropriate software. Video files are usually stored in: .avi,

.mov and .mpg (or .mpeg) formats.

To view MPEG videos, you just need Video for Windows. However, to create high-quality movie clips, you need a dedicated MPEG expansion card. You can also find animation and 3-D worlds. The two standard tools to manipulate animated worlds are VRML and Java. To view a virtual animation, you need a program like QuickTime VR.

Compressed files

When you download files, they’re probably compressed.

Windows files have a .zip extension. Macintosh files usually have a .sit extension and are opened with StuffIt.

133

Lesson 2. Web design

I. A typical home page

In pairs, discuss these questions

1) Why do companies have websites?

2) What is the difference between a website and a web page?

3) What is a home page?

4) Do you have a blog or personal website? Describe the home page to your partner

II. Web page design

A. Read the text and find the following

1) The language used to create web documents

2) The type of software that lets you design web pages without writing

HTML codes

3) The format invented by Adobe to distribute text files over the Internet

4) A method of displaying multiple HTML documents in the same browser window

5) Three common graphics formats used on websites

6) Three popular formats used to store and play back video

HTML and web editors

The code behind most web pages

Web page design

language), which consists of commands called tags. Tags are is HTML (Hypertext markup placed around pieces of text to tell the

134

web browser how to display text or pictures. You can view the source

HTML code of a web page by choosing the Page Source option in your web browser. But you needn’t learn HTML in order to build your own website. Instead, you can use a word processor with web design capabilities or dedicated web editor like Macromedia Dreamweaver or

Microsoft FrontPage. Web editors are user-friendly and WYSIWYG (What

You See Is What You Get). Different buttons and menu items let you design a page without writing HTML

HTML files have this basic structure:

Start with <html>

Have heading text that begins with

<head>, which has a title enclosed between tags and ends with </head>

Have body text that starts with

<body>, where you place the contents of the actual document (i.e. text, images, links, etc.) and ends with

</body>

End with </html>

You can create link to other web pages by using the tag <a href =

“filename”>active text </a>

Web page elements

There are a number of different elements that you can use on a web page:

Text – displayed in a variety of fronts and sizes. Most text files are available in two formats: HTML of

PDF (the portable document

format that can be viewed with

Acrobat Reader).

Background – the underlying colors and patterns of a web page

Tables – with columns and rows, used to position images and text on a page

Frames – rectangular areas that allow the display of different pages in the same browser window.

Cascading Style Sheets (CSS) – a mechanism for adding styles to web documents. You could use

HTML code to specify the font, text styles and background color.

Nowadays, however, it is more common to use CSS. This makes, it easy to apply presentation changes across a website.

Graphics,

clip

art, icons,

background

templates,

wallpaper, and

transparent

images – common formats are .jpg

(joint photographic experts group), ideal for pictures with many colors, .gif (graphics interchange format), ideal for pictures with fewer colors, and .png (portable network graphics), which supports

16 million colors.

Hyperlinks – highlighted text or pictures (buttons, image maps, etc.) that act as links to other pages. If you want to share information with people, you can use RSS feeds and provide readers

135

with a link to the feed. RSS allows subscribers to receive updates of blogs, news, podcasts, etc. Before going live, you should check that all the links work.

Audio, video and animation

Many websites now incorporate audio files, and if you’re designing a site, you may like to insert songs, podcasts, etc. The most common audio formats are .wav (Windows wave audio format), .ra (RealAudio file) and .mp3 (MPEG-1 Audio Layer

3).

Full-motion video is stored in these formats: .avi (audio video interleave),

.mov (QuickTime movie) and .mpg

(moving picture experts group).

If you want to inject something special into you web pages, you can use Adobe Flash to include interactive

animations and streaming audio.

Additionally, you can insert Java applets – small programs that enable the creation of interactive files.

Animations are made up of a series of independent pictures put together in sequence to look like moving pictures.

To see or hear all these files, you must have the right plug-in, an auxiliary program that expands the capabilities of your web browser.

B. Read the text again and then match the sentence beginnings (1-6) with the correct ending (a-f)

1) Instructions in HTML

2) Cascading Style Sheets are the way

3) A hyperlink is any clickable text

4) A plug-in is a small program

5) Java applets are used to provide

6) RSS feeds are summaries of web content

a. Image or button that takes you to another place on the Web

b. Used for handling audio, video and animation files

c. Are called tags

d. Interactive features to web applications

e. To define the presentation of web pages, from fonts and colors to page layout

f. Published in the Really Simple Syndication format for download

III. Language work: modal verbs

A. Underline all the modal verbs in the above text and then look at the

HELP box. Which modal verb from the HELP box does not appear in the text? Can you think of any other modal verbs?

136

HELP box

 To talk about ability

Modal verbs

They are looking for artists who

We use modal verbs to add extra

can draw and design web pages

meaning to the main verb. They are

Could is the past tense of can followed by infinitive without to. and is used to talk about ability in

Modal verbs are used in the following to express weaker possibilities and the past ways:

 To express a possibility

 To talk about obligation or necessity

To see or hear all these files. You

You can/could use Adobe Flash to include interactive animations

must have the right plug-in

You may like to insert songs,

…you needn’t learn HTML in

podcasts, etc.

order to build your own website

Can and

could are often

Needn’t means don’t need to or interchangeable when talking about

don’t have to and is used to express possibility. May and might are used a lack of obligation

 To give advice often come before the verb like to

Before going live, you should

mean It is possible you will like

check that all the links work

 To ask for permission

Can/Could/May I use your mobile phone?

May is more formal than can or

could

B. Complete these sentences with suitable modal verbs from the HELP box.

There may be more than one possible answer

1) With Java, I…………. include some attractive banners on my website

2) With a web editor, you……..create a web document easily

3) These days, you………….learn how to use complicated HTML codes.

Modern web design software is user-friendly and converts a visual layout into HTML code

4) Once live, you…………update your website regularly

5) To view a PDF file, you……….have Adobe Acrobat Reader

6) Websites with graphics are more inviting than those written in plain text, so you…………..like to insert some graphics into your documents.

137

7) …………………I use your laptop? I need to print out this report.

C. In pairs, discuss at least two things

1) You can now do more easily because of the Internet

2) You could do better if you had a faster internet connection

3) That may/might happen to the Internet in the next ten years.

4) You must consider when designing a website

5) You should take into account when choosing which PC to buy.

IV. Blogs

A. In pairs, discuss these questions

1) What is a blog?

2) Which blogs do you read regularly?

B. Imagine you wanted to start your own blog. In pairs, discuss these questions

1) Why would you start your own blog – to write a diary of your thoughts or to share you expertise on a particular topic?

2) What types of media would you include – text, photos, video, audio

(including podcasts)?

3) Would you insert links to other blogs? Which ones?

4) Would you focus on a particular subject or have a mix of several topics?

5) Which site would you use to host your blog?

138

MODULE 7. PROGRAMING / JOBS IN ICT

Learning objectives

In this module, you will learn how to:

 Understand basic concepts in programming, and acquire vocabulary connected with it

 Recognize acronyms and abbreviations associated with programming

 Ask and answer questions about computer languages

 Discuss the professional skills and personal qualities required for the jobs of senior programmer and DTP operator

 Write a letter applying for a job.

139

Lesson 1. Program design

I. Warm-up

A. In pairs, try to think of an answer for the question.

What is programming?

Look at the definition in the Glossary. Is it similar to yours?

B. Complete the following definitions with the words and phrases in the

box.

the various parts of the program may occur in programs binary numbers language a given problem

1. algorithm

The step-by-step specification of how to reach the solution………..

2. flow chart

A diagram representing the logical sequence between the various parts of the program………………………………...

3. coding

The translation of the logical steps into a programming …………

4. machine code

The basic instructions understood by computers. The processor operates on codes which consist of ……………....................

The techniques of detecting, diagnosing and correcting errors (or ‘bugs) which may occur in programs…………

II. Reading

Read the text and find answers to these questions.

1) Do computers understand human languages?

2) What are the differences between low-level and high-level languages?

3) What is an assembler?

4) What is the function of compilers?

5) What do you understand by the terms source program and object

program?

6) In the future, could computers be programmed in Spanish, French, or

Japanese?

140

Programming languages

Unfortunately, computers cannot quite complex and restricted to understand ordinary spoken English or any other natural language. The only particular machines.

To make the programs easier to language they can understand directly is called machine code. This consists of the 1s and 0s (binary code) that are processed by the CPU.

However, machine code as a write and to overcome the problem of intercommunication between different types of machines, higher-level languages were designed such as

BASIC, COBOL, FORTRAN, or means of communication is very difficult to write. For this reason, we use symbolic languages that are easier to understand. Then, by using a special program, these languages can be translated into machine code. For example, the so-called assembly

languages use abbreviations such as

ADD, SUB, MPY to represent instructions. These mnemonic codes are like labels easily associated with the items to which they refer.

Basic languages, where the

Pascal. These are all problem-oriented rather languages compiler than machine-oriented.

Programs written in one of these

(known

programs) are converted into a lower-level language by means of a

(generating as the

source object

program). On compilation, each statement in a high-level language is generally translated into machine code instructions. many

People communicate instructions to the computer in symbolic languages program is similar to the machine code version, are known as low-level

languages. In these languages, each instruction is equivalent to a single machine code instruction, and the program is converted into machine code by a special program called an

assembler. These languages are still and the easier this communication can be made, the wider the application of computers will be. Scientists are already working on Artificial

Intelligence and the next generation of computers may be able to understand human languages.

III. Language work: Infinitive constructions

A. The infinitive is used:

 After adjectives

- It is difficult to use machine code.

 After modal verbs with to: ought to, used to

- I ought to make a back-up copy.

- Using a computer is much easier than it used to be.

141

 After modal and auxiliary verbs without to: can, could, may, might, shall,

should, will, would, would rather, would sooner

- Unfortunately, computers can’t understand English.

- I’d rather buy a game than a spreadsheet.

B. Make sentences as in the example.

Example

Not easy/write instructions in Pascal

It is not easy to write instructions in Pascal

1) advisable/test the program under different conditions.

2) expensive/set up a data-processing area.

3) unusual for a program/work correctly the first time it is tested.

4) difficult for students/learn FORTRAN.

5) important/consider the capabilities of the programming language.

6) quite easy/write instructions in BASIC.

C. Now look again at the reading passage in Task 2. Underline the infinitive constructions after modal verbs.

Example:

Unfortunately, computers cannot understand ordinary spoken English…

D. Look at these pairs of examples and decide where there is an ‘important’ change in meaning.

1 a

I remember shutting down the computer before I left the room.

2

3 b a b a

Please, remember to buy the new program.

They stopped to look at the flowchart.

They stopped looking at the flowchart.

I like studying C language.

5

4 b a b a b

I like to study C language in the evenings.

It has started to rain.

It has started raining.

He needs to work harder.

This hard disk needs repairing.

Lesson 2. Languages

I. Warm-up

A. Make a list of as many computer languages as you can think of.

B. Study this table about Java and answer the questions below.

Language Date Characteristics Uses

1995 Java

Invented by

Sun

Microsystems.

Cross-platform language that can run on any machine.

Small Java programs, called

‘applets’, let you watch animated characters, play music and interact with information.

Designed to create Internet applications.

When you see a Web page containing

Java links, a

Java program is executed automatically.

1. Who invented Java?

2. When was Java developed?

3. Can Java run on any computer (Mac, PC, or UNIX workstation)?

What are Java’s small programs called?

What can you do with them?

II. Language work: Would, Revision of time clauses

A. The use of ‘would’

We use ‘would’ in conditional sentences. For example:

If you spilled coffee on the keyboard, you would damage it.

Often the condition is implied, not stated. For example:

(If I had time) I’d like to build in new links.

(If I had to make a choice) my favorite site would have to be the

Internet Movie Database.

What is the implied condition in this extract?

I would look at other sites too for good ideas.

B. Complete the gaps in this dialogue with ‘will’ or ‘would’ or the reduced forms ‘’ll’ and ‘’d’ where appropriate.

A What ………..

1

you do when you finish your diploma?

B

A

B

A

B

A

B

I ………..

2

like to take a course in multimedia.

How long ………..

3

that take?

If I choose the certificate, it ………..

4

take 6 months but if I chose the master’s, it ………..

5

take a full year.

What ………..

6

be the advantage of the master’s?

I guess I ………..

7

have better job prospects.

When ………..

8

you decide?

It depends on my finals. If I do well, I ………..

9

go for the master’s.

C. Link these statements using an appropriate time clause.

1 a You click the mouse pointer on the file

2 b a

It is highlighted.

You cannot save a file.

4

3

5

6 b a b a b a b a b

You name it.

The files are transferred.

The transfer is graphically displayed.

Remove any floppies.

You close down the computer.

The OK button is clicked.

The copying process begins.

The percentage of file transferred is displayed.

Your browser downloads from the Internet.

10

8

7

9 a b a b a b a b

The virus is not activated.

You open the infected file.

You repair a PC.

Ensure the machine is disconnected.

Don’t open an email attachment.

You have virus-checked it.

You add memory.

Change the BIOS settings.

III. Speaking

Work in pairs. Student A:

IV. A short description of BASIC

Read the passage and complete it with verbs in brackets in the correct form.

BASIC is a general purpose high-level programming language, originally designed (develop) ……………

1

program in conversational mode. The name BASIC (stand) ……………

2

for Beginner’s Allpurpose Symbolic Instruction Code. This language is (find)

……………

3

on most microcomputers because it (be) ……………

4 user-friendly and easy to learn.

BASIC (consist) ……………

5

of two main parts: the source language statements – the instructions which form the program – and the system commands which (allow) ……………

6

us to control and edit a program.

BASIC enables the user (interact) ……………

7

with the program while it is being (execute) ……………

8

, which means that data can be

(input) ……………

9

while the program is running. Each instruction is

(give) ……………

10

a line number which defines the logical sequence of statements within the program. Some well-known system commands in BASIC are: RUN, which executes a program (hold) ……………

11

in a BASIC file; LIST, which prints a listing of a program on the screen; and DELETE, which (remove) ……………

12

a program from a file.

A large number of PC manufacturers adopted BASIC. At present, however, there (be) ……………

13

so many versions and extensions

that programs written for one type of PC are not directly portable to another.

Lesson 3. Jobs in ICT

I. IT professionals

Complete these definitions with jobs from the box

Software engineer Computer security Blog administrator specialist

Help desk technician webmaster DTP operator Hardware engineer Network administrator

1) A………..designs and develops IT devices

2) A………..writes computer programs

3) A………….edits and deletes posts made by contributors to a blog

4) A………….uses page layout software to prepare electronic files for publication

5) A………..manages the hardware and software that comprise a network

6) A………..designs and maintains websites

7) A…………works with companies to build secure computer systems

8) A…………..helps end-users with their computer problems in person, by email or over the phone

II. Job advertisements

Discuss if you would like to apply for one of the jobs. Give reason answers

DTP operator

Required for a leading financial magazine

We are looking for a bright, competent QuarkXpress operator with at least three years’ experience in design and layout. Skills in

Photoshop, Freehand or Illustrator an advantage.

Ability to work in a team and to tight deadlines is vital.

Please apply in writing, with CV and samples of your work, to Tom

Parker, Production Manager,

Financial Monthly, Stockton Street,

London

DIGITUM-UK

SENIOR PROGRAMMER required by DIGITUM-

UK, a leading supplier of business systems to the insurance industry.

You will be able to work on the full range of software development activities – analysis, design, coding, testing, debugging and implementation. At least two years’ experience of COBOL or C++ is necessary.

As we are active in Europe, fluency in French, Italian or another European language is desirable.

Don’t miss this opportunity to learn new skills and develop your career.

Send your CV to CHRIS SCOTT, PERSONNEL

MANAGER, DIGITUM-UK, 75 PARKSHILL

STREET, LONDON SW14 3DE

III. A letter of application

A. Read the letter of application below and answer these questions

1) Which job is Sarah Brown applying for?

2) Where did she see the advertisement?

3) How long has she been working as a software engineer?

4) What type of programs has she written?

5) When did she spend three months is Spain?

Dear Mr Scott,

I am writing to apply for the position of Senior Programmer, which was advertised on 28 th

March in The Times.

I graduated in May 2007 and did a work placement with British Gas as part of my degree. Before taking my present job I worked for a year with NCR. I stayed in this job (1)…………….March 2009.

(2)……………….the last three years I have been working as a software engineer for Intelligent Software. I have designed four programs in COBOL for commercial use, and (3)……………..January I have been writing programs in C for use in large retail chains. These have been very successful and we have won several new contracts in the UK and Europe on the strength of my team’s success.

Two year (4)………….. I spent three months in Spain testing our programs and also made several visits to Italy, so I have a basic knowledge of Spanish and Italian.

I now feel ready for more responsibility and more challenging work, and would welcome the opportunity to learn about a new industry.

I enclose my curriculum vitae. I will be available for an interview at any time.

HELP box for, since, ago, until

I look forward to hearing from you

Yours sincerely,

 We use for to refer to a period of time.

I’ve lived in Liverpool for five years.

Sarah Brown

B. Look at the HELP box and

 We use since to refer to a point in time

I’ve been unemployed since May 2007

then complete the letter with for, since, ago or until

 We use ago with the past simple to say when something happened. We put ago after the time period.

I got married five years ago.

 We use until to mean up to a certain time

I stayed at high school until I was 18

IV. Language work: the present perfect

A. Look at the HELP box and then choose the correct words in brackets to complete these sentences

1) He (‘s never liked/ ‘s never been liking) Maths

2) They (‘ve worked/ ’ve been working) on the project all day

3) John (‘s used / ‘s been using) the computer for hours – he looks really tired

4) How many emails (have you written / have you been writing) to day?

5) She (‘s written / ‘s been writing) this essay since 9 o’clock.

6) They (‘ve interviewed/ ‘ve been interviewing) five candidates today.

HELP box

Present perfect simple Present perfect continuous

We form the present perfect simple with We form the present perfect continuous

have/has + past participle with have/has been + present participle

I’ve used Microsoft Access for many

Since January I’ve been writing years. program in C

I haven’t used Microsoft Access for

We use this tense to talk about:

years.

We use this tense to talk about:

 Action which started in the past and

 States that started in the past and continue to the present

Since 2006, I’ve been a computer

are still happening

For the last three years I’ve been

working as a software engineer of

Intelligent Software operator for PromoPrint

 Past actions that continue to the

 Past actions that continue to the present, where we put an emphasis on present, where we put an emphasis on quantity (how many) duration (how long)

She’s been working all morning

I have designed four programs in

COBOL

Contrast with the past simple

We use the past simple to talk about

 Personal experiences, especially with events that happened at a specific time ever and never. in the past that are now finished

Have you ever worked

with

I graduated in May 2007

database?

Not: I have graduated in…

I’ve never worked with databases.

I stay in this job until March 2009

Two years ago, I spent three months

in Spain

B. Make questions using these prompts. In pairs, ask and answer the questions

1) Ever/live or work in another country?

2) Ever/ have a bad job interview?

3) Ever/do a job you hated?

4) How long/study English?

5) How long / use computers?

6) How many emails / receive today?

7) How many jobs / apply for this year?

MODULE 8. COMPUTERS TOMORROW

Learning objectives

In this module, you will learn how to:

 Talk about different kinds of data communication systems: teletext, fax, local bulletin boards and the Internet

 Describe the components and functions of a computer network, in oral and written form

 Understand and discuss basic ideas about security and privacy on the Internet

 Talk and write about new technologies

 Understand predictions about the impact of computers on our lifestyle.

Lesson 1. Electronic communications

I. Before you read

Try to answer these questions.

1) How can a PC be connected to another computer?

2) What data communication systems can you think of? Make a list.

II. Reading

A. Match the data communication services on the left with the requirements on the right. Then read the passage and check your answers.

1. fax

2. electronic mail (e-mail)

a. To send a personal message to a friend who is at a different workstation.

3. teletext b. To send a copy of a paper document – for instance, a scientific article – from Trento

University to Cambridge University.

4. local bulletin board system (BBS)

5. commercial service online c. To access massive databases containing all kinds of information, or to be connected with an airline reservations service. d. To receive shareware and public domain programs from a user group. e. To find out weather forecasts and sports information from the television.

Channels of communication

What are ‘telecommunications’?

This term refers to the transmission of information over long distances using the telephone system, radio, TV, satellite, or computer links. Examples are two people speaking on the phone, a sales department sending a fax to a client, or someone reading the teletext pages on TV. But in the modern world, telecommunications mainly means transferring information from one PC to another via modem and phone lines (or fibre-optic cables)

What can you do with a modem?

A modem is your computer’s link to the external world. With a modem, you can exchange email and files with friends and colleagues; you can access the Web and search for information about the stock market, current affairs, entertainment, etc.; you can participate in newsgroups and live conversations; you can make bank transactions and buy things from the comfort of your home. You can also access your office from your computer at home or your laptop in a hotel room.

Modems

Your PC is a digital device.

However, the telephone system is an analogue device, designed to transmit the sounds and tones of the human voice. That’s why we need a modem – a bridge between digital and analogue signals. The word ‘modem’ is an abbreviation of

Odulator/DEModulator. When a modem modulates, it sends very rapid on/off pulses. The computer on the other end translates (demodulates) those signals into intelligible text or graphics. Modem transmission speeds are measured in kilobits per second.

Typical speeds are 28.8, 33.6 and 56 kbps.

Today, a lot of companies find it more efficient to have some employees doing their work at home.

Using a modem, they transfer their work into the office where it is printed and distributed. The list of applications is endless.

What do you need to telecommunicate?

You just need a PC (or a terminal), a modem connected to the computer and the telephone line, and communication software. Once you have installed and configured your modem, you can communicate with people through bulletin boards and online services.

Local bulletin boards

Bulletin board systems (BBS) are frequently free because they are run by enthusiasts and sponsored by user groups or small businesses. The first time you make a BBS connection you are required to register your name,

address, phone number, and other information such as the kind of computer and modem you are using.

The person who administers the BBS is called sysop (system operator). You can use a BBS to download artwork, games, and programs, or you can participate in ongoing discussions.

You can also upload (send) programs, but make sure they are shareware or public domain programs.

Online service providers

To gain access to the Internet, you must first open an account with an

Internet service provider (ISP) or a commercial online service provider.

Both offer Internet access, but the latter provides exclusive services. program to download files from

FTP sites, and IRC software so that you can have live chats with other users. Most ISPs charge a flat monthly or annually fee that gives you unlimited access to the

Internet.

The main commercial reservations, professional

online

services are America Online,

CompuServe, Prodigy, and the

Microsoft Network. They differ from dedicated ISPs in two ways: (1) they use a smooth, easy-to-use interface, and (2) they have extra services for members only (but they charge higher prices). For example, they offer airline forums, online shopping, and stories for

Internet service providers usually offer access to the Web and newsgroups, an email address, a children. They also let you search their online encyclopedias and special database.

B. Complete the sentences by using a term from the list. Then write the

words in the crossword. modem network online download newsgroups services

1. When you are connected to the

Internet, you are described as being

……………

2. To communicate via the Internet, you need a PC, modem, and a

…………… account telephone

3. To have access to the Internet, you must first open an ……………

4. You need a …………… to convert computer data into a form that can be

transmitted over the phone lines.

5. The public discussion areas on the Internet are called ……………

6. You can use a BBS to …………… clip-art, games, and shareware to your

PC.

7. CompuServe and America Online offer exclusive …………… to their customers.

8. The Internet is a global …………… of computer networks.

III. Language work: Making predictions

A prediction is a statement about a particular subject in which we say what we think will happen in the future. Predictions are not always absolute, but can be expressed with different levels of certainty, according to the context in which they are made.

a. Certainty can be expressed by:

will (definitely, certainly) certain, sure without a doubt, without question

b. Probability can be expressed by:

probable, probably, likely most/highly probable, most probably most/ highly likely c.

Possibility can be expressed by: may (not), might (not), can, could possible, possibly, perhaps d. Improbability can be expressed by: improbable, unlikely doubtful, questionable probably not most/ highly improbable/ unlikely most/ highly doubtful/ questionable

most probably not

e. Impossibility can be expressed by:

present or future

cannot, could not not possible, impossible

past

could not not possible, impossible

A. These expressions are used in sentences in different ways. For examples:

1) Notebook computers will definitely be cheaper next year.

2) It is (highly) probable/ likely that notebook computers will be cheaper next year.

3) Notebook computers may/ might be cheaper next year.

4) Perhaps notebook computers will be cheaper next year.

5) It is unlikely/ doubtful that notebook computers will be cheaper next year.

6) Notebook computers will most probably not be cheaper next year.

7) Notebook computers will definitely not be cheaper next year.

8) It is impossible that notebook computers will be cheaper next year.

B. Match the if-clauses (1 to 6) to the main clauses (a to f) to make complete sentences.

1 If you never read computer magazines… a …you would be able to access our bulletin board.

2 If you never back up your hard disk…

3 If you had a modem…

4 If you software… don’t copy pirated b …it is unlikely that you will have a problem with computer viruses. c …we would have a bigger range of typefaces and fonts to choose from. d …you will miss important new products.

5 If I knew more programming languages…

6 If we bought a better printer… e …I would get a better job. f …you will probably lose some important files.

C. Complete the sentences with the words in the box. Are the sentences first (F) or second (S) conditionals?

would not post will be look at will get grows wanted leave Would need will be reduced installed

1 If you ………... your VDU in direct sunlight, it ………... damaged

2 If you ………... your screen for too long, you………... a headache.

3 If you ………... to link your PCs with a mainframe, you ………... to install a network.

4 If the market for portable computers ………..., prices ………... even more next year.

5 If we ………... a fax machine and email facility, we ………... so many letters each day.

D. Now make up three first conditional and three second conditional

sentences of your own

Lesson 2. Internet issues

I. Warm-up

1. Try to answer these questions.

1) Is it technically possible for computer criminals to infiltrate into the

Internet and steal sensitive information?

2) What is a hacker?

3) Can viruses enter your PC from the Internet?

2. Match these texts with the correct pictures.

1. Web browsers warn you if the 2. Private networks use a software connection is not secure; they display a message when you try to send personal information to a server. and hardware mechanism, called a

‘firewall’, to block unauthorized traffic from the Internet.

3. You have to type your user name 4. An open padlock in Netscape and password to access a locked computer system or network

Communicator indicates the page is not secure; a closed padlock indicates the page is encrypted. a b d c

II. Reading

A. Read the text on the following page and find answers to these questions.

1) Why is security so important on the Internet?

2) What security features are offered by Netscape Communicator and

Internet Explorer?

3) What security standard is used by most banks to make online transactions secure?

4) How can we protect and keep our email private?

5) What methods are used by companies to make internal networks secure?

6) Which ways can a virus enter a computer system?

Security and privacy on the Internet

There are a lot of benefits from an allow you to disable or delete open system, like the Internet, but we are also exposed to hackers who break

‘cookies’.

If you use online bank services, into computer systems just for fun, as well as to steal information or propagate viruses. So how do you go about making online transactions make sure your bank uses digital certificates. A popular security standard is SET (secure electronic transactions). secure?

Security on the Web

The question of security is crucial when sending confidential information such as credit card numbers. For example, consider the process of buying a book on the Web.

You have to type your credit card number into an order form which passes from computer to computer on its way to the online bookstore. If one of the intermediary computers is infiltrated by hackers, your data can be copied. It is difficult to say how often this happens, but it’s technically possible.

To avoid risks, you should set all security alerts to high on your Web browser, Netscape Communicator, and Internet Explorer display a lock when the Web page is secure and

Email privacy

Similarly, as your email message travels across the net, it is copied temporarily on many computers in between. This means it can be read by unscrupulous people who illegally enter computer systems.

The only way to protect a message is to put it in a sort of ‘envelope’, that is, to encode it with some form of encryption. A system designed to send email privately is Pretty Good

Privacy, a freeware program written by Phil Zimmerman.

Network security

Private networks connected to the

Internet can be attacked by intruders who attempt to take valuable information such as Social Security numbers, bank accounts, or research and business reports.

To protect crucial data, companies hire security consultants who analyze the risks and provide security solutions. The most common methods of protection are passwords for access control, encryption and decryption systems, and firewalls.

Virus protection

care when downloading files from the

Web. (Plain text email alone can’t pass a virus)

Remember also to update your anti-virus software as often as possible, since new viruses are being created all the time.

Viruses can enter a PC through files from disks, the Internet, or bulletin board systems. If you want to protect your system, don’t open email attachments for strangers and take

HELP box

hacker: a person who obtains unauthorized access to computer data

cookies: small files used by Web servers to know if you have visited their site before

certificates: files that identify users and Web servers on the net, like digital identification

encryption: the process of encoding data so that unauthorized users can’t read it

decryption: the process of decoding encrypted data transmitted to you.

B. Complete these sentences by using a term from the text. Then write the words in the puzzle.

1. Users have to enter a p…………. to gain access to a network.

2. You can download a lot of f…………. or public domain programs from the net.

3. Hundreds of h…………. break into computer systems every year.

4. A computer v…………. can infect your files and corrupt your hard disk.

5. The process of encoding data so that unauthorized users can’t read the data is known as e………….

6. A f…………. is a device which allows limited access to an internal network from the Internet.

7. You can include an a…………. as part of your email message.

This company uses d…………. techniques to decode (or decipher) secret data.

III. Hackers!

Read the text in order to answer these questions.

1) Which hacking case inspired the film War Games?

2) Why was Nicholas Whitely arrested in 1988?

3) How old was the hacker that cracked the US defense computer in

October 1989?

4) Who was known as ‘Dark Dante’ on the networks? What was he accused of?

5) Which computer club showed on TV a way to attack bank accounts?

Sept ‘70 John Draper, also known as Captain Crunch, discovers that the penny whistle offered in boxes of Cap’n Crunch breakfast cereal perfectly generates the 2,600 cycles per second (Hz) signal that

AT&T used to control its phone network at the time. He starts to make free calls.

Aug ‘74

Kevin Mitnick, a legend among hackers, begins his career, hacking into banking networks and destroying data, altering credit reports of his enemies, and disconnecting the phone lines of celebrities. His most famous exploit – hacking into the North

American Defense Command in Colorado Springs – inspired War

Games, the 1983 movie.

Jul ‘81

Ian Murphy, a 23-year-old known as Captain Zap on the networks, gains instant notoriety when he hacks into the White House and the Pentagon.

Dec ‘87

IBM international network is paralyzed by hacker’s Christmas message.

Jul ‘88

Union Bank of Switzerland ‘almost’ loses 32 million to hackercriminals. Nicholas Whitely is arrested in connection with virus propagation.

Oct ‘89

Fifteen-year-old hacker cracks US defense computer.

Nov ‘90

Hong Kong introduces anti-hacking legislation.

Aug ‘91

Israelis arrest 18-year-old for hacking foreign banking and credit card networks.

Jul ‘92

In New York, five teenagers are charged with breaking into computer systems at several regional phone companies, large firms and universities.

Dec ‘92

Kevin Paulson, known as ‘Dark Dante’ on the networks, is charged with stealing tasking orders relating to an Air Force military exercise. He is accused of theft of US national secrets and faces up to 10 years in jail.

Feb ‘97

German Chaos Computer Club shows on TV the way to electronically obtain money from bank accounts using a special program on the Web.

May ‘98 Computer criminals propagate a lot of viruses through the

Internet.

IV. Language work: The past simple (revision)

Look at the text in Task 3 again and put the verbs into the past.

Example

In September 1970, John Draper discovered that the penny whistle … generated

He started to make free calls.

Lesson 3. Networks

I. Small networks

In pairs, discuss these questions

1) What is a computer network?

2) What are the benefits of using networks?

II. Networking FAQs

A. Look at the FAQs (i - vi) without reading the whole text. In pairs, try to answer as many of the questions as you can

B. Read the whole text and answer these questions.

1) What does PAN stand for?

2) What is a network protocol?

3) How do you log on to an Internet Service Provider?

4) WiMAX is a type of wireless network. What is it used for?

5) What equipment do you need to set up a wireless LAN?

6) What are the advantages and disadvantages of wireless networks?

i.

Networking FAQs

How many types of network are

capabilities – that is, share files

there?

and peripherals without

Networks are classified according to different criteria: requiring a separate server computer.

Topology, or layout: In busGeographical

area: PANs

(Personal Area Networks) typically include a laptop, a mobile phone and a PDA;

LANs cover a building; MANs

(Metropolitan Area Networks) network, all the computers are connected to a main cable, or bus. In a star network, all data flows through a central hub, a common connection point for cover a campus or a city;

WANs (Wide Area Networks) cover a country or a continent.

Architecture: In a client-

server network, a computer acts as a server and stores and distributes information to the other nodes, or clients. In a

peer-to-peer network, all the computers have the same the devices in the network. In a

ring network, all devices are connected to one another in a continuous loop, or ring.

Network protocol: This is the language, or set of rules, that computers use to communicate with each other. Networks use different protocols. For

instance, the Internet uses

TCP/IP

ii. How do I install a wired modem router?

A modem router is a device that connects your computer or home LAN to the Internet

 Plug one end of the phone cord directly into a phone jack, and the other end into the ADSL port on the router.

 Plug one end of the Ethernet cable into your computer’s network port and the other end into an Ethernet port on the router.

 Turn on your computer. To set up, or configure, the router, you’ll need to input some parameters, for example your

ISP’s name and phone number.

NOTE: A router has various

Ethernet ports, so you can connect various PCs to the router via Ethernet cables. If you already have a hub or switch connecting a LAN, you only need one cable to connect the hub to the router.

iii. How do I log on to the Internet service Provider?

You need to type in your username and password. Once you are online, you can get email, look for information on the Web, look up IT words in dictionaries, try out new software, and sign up for RSS feeds, newsletters, etc. It is important that you remember to log off after using the Internet. An open line increases the risk of viruses, and hackers might break into your computer to steal confidential data.

iv. What is wireless networking?

Wired networks are linked by

Ethernet cables, phone lines and highspeed fiber optic cables. Wireless networks, however, use electromagnetic waves, such as radio waves, to transmit data. These are the main types of wireless networks:

Satellites – for long distances

WiMAX – for connecting Wi-

Fi hotspots.

Wi-Fi – for medium-range distances

Bluetooth – for short distances

GSM – for mobile phones

v. What do I need to set up a home wireless LAN?

You’ll need computers equipped with a wireless adapter or wireless card, a wireless access point (a wireless router) and a broadband internet connection.

vi. Which is better, a wired or wireless LAN?

Wired LANs are more difficult to install, but they are cheaper, faster and more reliable. Wireless networks let you move, or roam, from one access point to another, but they are less secure and subject to interference.

C. In pairs, do this network quiz. See which pair can finish first.

1) This network typically consists of two or more local area networks, covering a large geographical area.

a. LAN b. WAN c. Intranet

2) This type of network does not have a dedicated server; all the computers are independent.

a. Peer-to-peer b. Client-server c. Metropolitan Area Network

3) On this topology, all devices are connected to the same circuit, forming a continuous loop

a. Star b. Ring c. bus

4) The language used by computers to communicate with each other on the Internet is called

a. Ethernet b. ADSL c. TCP/IP

5) Which cables are used to transfer information for the Internet over long distances at high speeds?

a. Telephone lines b. Ethernet cables c. Fiber optic cables

6) Which device allows several computers on a local network to share an internet connection?

a. An ADSL port b. A router c. Wireless adapter

7) Which device serves as a common connection point devices in a wireless network?

a. Wireless access point b. Wire router c. Wireless adapter

8) Bluetooth is a wireless technology that uses radio waves to transmit data over

a. Long distances b. Medium-range distances

c. Short distances (ten meters of less)

III. Language work: phrasal verbs

A. Look at the HELP box. Do you have the equivalent of phrasal verbs in your language? How do you say the phrasal verbs in the HELP box?

HELP box

Phrasal verbs

 The meaning of some verbs with particle (often called phrasal verbs) can be easily understood form its two parts

Look at the photos

Separate network are linked over a public network, the Internet.

 However, many phrasal verbs have an idiomatic meaning, not predictable from

the meaning of its parts.

carry (= transport); carry out (= execute)

Computer carry out the programs…

 Certain particles have similar meanings, regardless of the verb (on/off, in/out, etc.)

Turn on / switch on

(= start the operation of something)

Turn off / switch off

(= stop the operation of something)

 Other common phrasal verbs in computing include:

Plug into (= connect)

Plug one end of the phone cord into the phone jack

Set up (= establish)

What do I need to set up a wireless LAN?

Sign up (= register, enroll in a service)

Once connected, you can sign up for RSS feeds, newsletters, etc.

Try out (= test or use experimentally)

You can try out new software on their site

Find out ( = learn, discover)

Search the Web to find out more information about WiMAX

Take up ( = occupy)

Fiber optic cables take up less space than copper cables

make up ( = constitute, form)

Several LANs connected together make up a WAN

fill in (= write the necessary information)

You need to fill in this online form

 When the verb has a preposition associated with it, the preposition must precede the object:

You can look for information on the Web.

(not: look information for)

When the particle is an adverb, it can precede or follow the direct object:

You need to type in your username/…type your username in

Turn on the computer/ turn the computer on

If the direct object is a pronoun, the: particle must follow it

You need to type it in

(not: type in it)

B. Complete these sentences with the correct form of a phrasal verb from the HELP box

1) To join the club, …………..this form and send it to our office

2) The CPU………..all the basic operations on the data

3) Digital music…………a lot of space – about 10 MB for every minute of stereo sound.

4) Thousands of networks…………..the Internet

5) You can use newsgroups to……….about the latest trends, customer needs, etc.

C. Match the questions (1-6) with the answers (a-f)

1) Why was the hacker arrested?

2) Is it OK to log on to my bank account using public computers in a cybercafé?

3) How do I set up an internet connection at home?

4) Can I download software from your site?

5) How can I add video to instant messaging?

6) What do I need to do sign up for a Yahoo! Email account? a. Yes, but always remember to log off after you’ve ended your session. b. Yes, you can even try the programs out for a period before you buy them! c. Because he broke into a computer system and stole confidential data d. Simply install this program and plug the webcam into your computer. e. You need to install the software for your router. Follow the instructions provided by your ISP, probably in the form of a .pdf file on a CD f. You have to create a username and password and then give some personal details.

Lesson 4. New technologies

I. Future trends

A. In pairs, discuss these questions

1) What do you think a trend is?

2) What trends in ICT do you think will affect our lives in the future?

Make a list.

B. Match the texts (1-5) with the pictures (a-e). which trends from your list in A are mentioned?

a…………. b…………… d……………. e………… c……………

1

By all accounts, nanotechnology – the science of making devices from single atoms and molecules – is going to have a huge impact on both business and our daily lives. Nano devices are measured in nanometers (one billionth of a meter) and are expected to be used in the following areas.

Nanocomputers: Chip makers will make tiny microprocessors with

nanotransistors, ranging from 60 to 5 nanometers in size.

Nanomedicine: By 2020, scientists believe that nano-sized robots, or

nanobots, will be injected into the body’s bloodstream to treat diseases at the cellular level.

Nanomaterials: New materials will be made from carbon atoms in the form of nanotubes, which are more flexible, resistant and durable than steel of aluminum. They will be incorporated into all kinds of products, for example stain-resistant coatings for clothes and scratch-resistant paints for cars.

2

Artificial Intelligence (AI) is the science of making intelligent machines and programs. The term originated in the 1940s, when Alan Turing said: “A machine has artificial intelligence when there is no discernible difference between the conversation generated by the machine and that of an intelligent person”. A typical AI application is robotics. One example is ASIMO,

Honda’s intelligent humanoid robot. Soon, engineers will have built different types of android, with the form and capabilities of humans. Another AI application is expert systems – programs containing everything that an

“expert” knows about a subject. In a few years, doctors will be using expert systems to diagnose illness.

3

Imagine you are about to take a holiday in Europe. You walk out to the garage and talk to your car. Recognizing your voice, the car’s doors unlock. On the way to the airport, you stop at an ATM. A camera mounted on the bank machine looks you in the eye, recognizes the pattern of your iris and allows you to withdraw cash from your account.

When you enter the airport, hidden camera compares the digitized image of your face to that of suspected criminals. At the immigration checkpoint, you swipe a card and place your hand on a small metal surface. The geometry of your hand matches the code on the card, and the gate opens. You’re on your way.

Does it sound futuristic? Well, the future is here. Biometrics uses computer technology to identify people based on physical characteristics such as fingerprints, facial features, voice, iris and retina patterns.

Adapted from the Richmond Times-Dispatch.

4

Ubiquitous computing, also known as pervasive computing, is a new approach in which computer functions are integrated into everyday life, often in a invisible way. Ubiquitous devices can be anything from smartphones to tiny sensors in homes, offices and cars, connected to networks, which allow information to be accessed anytime and anywhere – in other words, ubiquitously. In the future people will interact naturally with hundreds of these

smart devices (objects containing a microchip and memory) every day, each invisibly embedded in our environment and communicating with each other without cables.

5

In the ideal smart home, appliances and electronic devices work in sync to keep the house secure. For example, when a regular alarm system senses that someone is breaking into the house, it usually alerts the alarm company and then the police. A smart home system would go further, turning on the lights in the home and then sending a text message to the owner’s phone. Motorola

Homesight even sends images captured by wireless cameras to phones and

PCs.

Smart homes can remember your living patterns, so if you like to listen to some classical music when you come home from work, your house can do that for you automatically. They will also know when the house is empty and make sure all appliances are turned off. All home devices will be interconnected over a home area network where phones, cable services, home cinemas, touch screens, smart mirrors and even the refrigerator will cooperate to make our lives more comfortable.

Adapted from www.businessweek.com

C. Read the text again and answer these questions

1) Which unit of measurement is used in nanotechnology?

2) What are the advantages of nanotubes over regular materials?

3) What will doctors use experts systems for?

4) What featutes are analyzed by biometrics?

5) Which trend refers to computers embedded in everyday devices, communicating with each other over wireless networks?

6) What will the alarm system do if someone breaks into a smart home.

7) How will devices be interconnected inside the smart home?

D. Find words in the text with the following meanings.

1) A microscopic robot, built with nanotechnology (text 1)………..

2) A robot that resembles a human (text 2)……….

3) Biological identification of a person (text 3)……………

4) Integrated; inserted into (text 4)……………….

5) Electrical devices, or machines, used in the home (text 5)…………

II. Language work: future forms

A. Look at the HELP box and then choose the correct words in brackets to complete these sentences.

1) In the future, I hope we (‘ll have/ ‘re going to have) robots in the home to help us with the housework.

2) Hey, Nick, be careful, you (‘re going to spill/ ‘ll spill) that coffee on the computer!

3) It’s John’s birthday next week. We (‘ll give/ ‘re going to give) him a mobile phone.

4) – My laptop has crashed!

- Don’t worry. I (‘ll lend/ ‘m going to lend) you mine.

5) The Internet (will probably change/ is probably going to change) the publishing industry in the way that TV changed the movie industry

6) Futurists predict that smart technology (will be/ is going to be) incorporated into fabrics, so you’ll be able to email from your coat!

HELP box

Future forms

We use be going to + verb in the

We use the future simple (will/ won’t + following ways: verb) in the following ways:

 To make predictions when you don’t have present evidence that something

 To describe future intentions

She’s going to write a book about ubiquitous computing.

will happen.

Nanobots will be injected into the

 To make predictions when you have present evidence that something is

body’s bloodstream to treat diseases

going to happen

 To talk about hopes and promises, especially with the words expect, think, hope and probably

They hope that people will interact

By all accounts, nanotechnology is

going to have a huge impact on business and our daily lives.

We use the future continuous (will

naturally with hundreds of smart

be + -ing form of the verb) to talk about

devices at a time

actions in progress at a specific time in

 To describe an instant decision, often the future. when we make an offer

In a few years, doctors will be using

Sure, I’ll help you with your expert systems to diagnose illnesses homework.

We use the future perfect (will have

 To talk about facts that will

+ past participle) to talk about actions inevitably happen finished at a specific time in the future.

She’ll be 21 in May

Soon, engineers will have built different types of android.

B. Complete these sentences with the correct future form of the verb in

brackets. Use the future continuous of future perfect.

1) Thanks to ICT, by the year 2030 we (find)………cures for the major diseases of our time.

2) In twenty years’time, some people (live)…………in space, perhaps inside a computerized colony.

3) By this time next week, I (work) ……………..for IBM

4) By this time next month, I (buy)…………..that BlackBerry that I’ve been wanting to buy for months.

5) Scientists predict that in twenty years’s time nearly everyone

(live)………….in smart houses.

C. In pairs, discuss these predictions. Do you agree or disagree? Give reasons for your answers. Look at the Useful language box to help you.

1) Someday, we’ll be talking to computers naturally, like friends.

2) Microchips implanted in our arms will serve as ID cards and contain our medical records.

Useful language

3) Robots will learn to build themselves, without human help.

4) Smart homes will be

I think that…….

What do you think about number…?

I’m not sure that…….will……..

I completely agree/disagree with…… voice-activated.

5) Computers will be ubiquitous and almost invisible, embedded into our homes and integrated into our lives.

III. Making predictions

A. Write your own predictions about these topics\

Work/Jobs

Example: By the year 2030, human labor in industry will have been

replaced by robots.

Money

Example: Cash will be replaced by electronic money

Education

Example: By the end of this century, every student in every school will

have a PC.

The internet

Example: People in every country will have high-speed access to the

Internet with five years.

B. In pairs, compare your predictions. Find out more about your partners’.

CÁC THUẬT NGỮ CHUYÊN MÔN

(font chữ Times New Roman, in hoa, cỡ chữ 14, Bold)

…………

(font chữ Times New Roman, cỡ chữ 14)

TÀI LIỆU THAM KHẢO

1. Thạc Bình Cường, Hồ Xuân Ngọc, Tiếng anh chuyên ngành Công nghệ thông tin, Nhà xuất bản Khoa học và kỹ thuật, 2001.

2. Thạc Bình Cường, Tiếng Anh chuyên ngành Công nghệ thông tin, Nhà xuất bản Đại học sư phạm, 2006.

3. Tiếng Anh dành cho người sử dụng máy tính Infotech, Nhà xuất bản thống kê,

2000.

4. English for Information Technology, Nhà xuất bản OXFORD, 2005

DANH SÁCH BAN BIÊN SOẠN GIÁO TRÌNH DẠY NGHỀ

TRÌNH ĐỘ TRUNG CẤP, CAO ĐẲNG

(font chữ Times New Roman, in hoa, cỡ chữ 14 Bold)

Tên giáo trình:

(font chữ Times New Roman, cỡ chữ 14, Bold)

Tên nghề:

(font chữ Times New Roman, cỡ chữ 14, Bold)

1. Ông (bà)...... Chủ nhiệm

2. Ông (bà)...... Phó chủ nhiệm

3. Ông (bà)...... Thư ký

4. Ông (bà)...... Thành viên

5. Ông(bà)...... Thành viên

6. Ông(bà)...... Thành viên

7. Ông(bà)..... Thành viên

8. Ông(bà)...... Thành viên

9. Ông(bà)...... Thành viên

DANH SÁCH HỘI ĐỒNG NGHIỆM THU

GIÁO TRÌNH DẠY NGHỀ TRÌNH ĐỘ TRUNG CẤP, CAO ĐẲNG

(font chữ Times New Roman, in hoa, cỡ chữ 14 Bold)

1. Ông (bà)...... Chủ tịch

2. Ông (bà)...... Phó chủ tịch

3. Ông (bà)...... Thư ký

4. Ông (bà)...... Thành viên

5. Ông(bà)...... Thành viên

6. Ông(bà)...... Thành viên

7. Ông(bà)..... Thành viên

8. Ông(bà)...... Thành viên

9. Ông(bà)...... Thành viên

advertisement

Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

advertisement