Tài liệu Giáo trình Anh văn chuyên ngành nghề quản trị mạng máy tính (Phần 2): 88
88
MODULE 4. BASIC SOFTWARE
Learning objectives
In this lesson, you will learn how to:
Extract relevant information form texts about system software
Recognize the characteristics of a typical graphical user interface or GUI
Make a summary of a written text
Talk about word processors
Identify the function of different word-processing capabilities: search and
replace, cut and paste, spell checkers, etc.
Understand the basic features of spreadsheets and databases
Acquire specific vocabulary related to Internet utilities.
89
89
Lesson 1. Operating Systems
I. Warm-up
A. Look at the diagram. What is the function of the operating system?
B. Read the text below and complete it with the phrases in the box.
Operating Systems
An operating system is a piece of
software that presents an interface
between the computer and the user.
One of the first operating systems was
the GM OS or General Motors
Operating System created in 1955.
...
89 trang |
Chia sẻ: honghanh66 | Lượt xem: 1831 | Lượt tải: 0
Bạn đang xem trước 20 trang mẫu tài liệu Giáo trình Anh văn chuyên ngành nghề quản trị mạng máy tính (Phần 2), để tải tài liệu gốc về máy bạn click vào nút DOWNLOAD ở trên
88
88
MODULE 4. BASIC SOFTWARE
Learning objectives
In this lesson, you will learn how to:
Extract relevant information form texts about system software
Recognize the characteristics of a typical graphical user interface or GUI
Make a summary of a written text
Talk about word processors
Identify the function of different word-processing capabilities: search and
replace, cut and paste, spell checkers, etc.
Understand the basic features of spreadsheets and databases
Acquire specific vocabulary related to Internet utilities.
89
89
Lesson 1. Operating Systems
I. Warm-up
A. Look at the diagram. What is the function of the operating system?
B. Read the text below and complete it with the phrases in the box.
Operating Systems
An operating system is a piece of
software that presents an interface
between the computer and the user.
One of the first operating systems was
the GM OS or General Motors
Operating System created in 1955.
There are two major kinds of
operating systems, Command Line
Interfaces (CLI), and more recently,
Graphical User Interfaces (GUI). CLIs
use only text and no graphics to
display information and the user
navigates by means of the shell.
Examples of popular CLI operating
systems still in use today are MS-DOS
and Linux. Examples of popular GUI
operating systems are Windows, [X-
Windows], and Macintosh OS.
Perhaps the most popular OS up
until the 1990’s was Unix on the
mainframe and [MS-DOS] on the PC.
Unix was created by mavericks
Dennis Ritchey and Ken Thompson in
1970 from an older MULTICS system
which they both used but did not like
very much. All versions of Linux and
Mac OS X can trace their roots to
directly back to the original Unix.
MS-DOS was Microsoft Corporation's
predecessor to Windows. Bill Gates
liked the Unix-like functionality of a
program designed by Tim Paterson of
Seattle Computer Products called
QDOS, and he bought it, rebranded it
MS-DOS, and licensed it to IBM. MS-
DOS became the underlying CLI for
all of Microsoft's GUI operating
systems up to and including Windows
XP.
90
90
The main operating system today
on PCs is of course Microsoft
Windows with over 90% market
share. Windows started out as a home
and office OS but has recently become
a serious challenger to Unix systems
even in the enterprise, where UNIX-
derived systems still have a solid
foothold.
What exactly is an operating
system composed of? The base unit of
the operating system is a collection of
programs called the kernel. The kernel
is the most basic layer which controls
the hardware and the file system.
Other programs which help the kernel
interface with the components and
peripherals are called device drivers.
Another main task for an operating
system is to control which users have
access to specific parts of a
computer's resources. Most operating
systems have a facility to require users
to authenticate with a username and
password before being permitted to
use the system resources. For
example, the OS will allow a system
administrator to set permissions on a
file or a directory.
Modern operating systems also
offer many utilities and conveniences
including the ability to easily install
and uninstall software applications,
monitor hardware, upgrade itself
through a network connection, and
more. Even basic productivity
applications such as web browsers and
text editors are now included as
standard on most operating system
releases.
II. Reading
Read the text and answer these questions:
1) What is an operating system ?
2) What are two major kinds of operating systems?
3) Name one of popular GUI operating systems?
4) What was the most popular OS up until the 1990’s?
5) Whom was Unix created by?
6) Which is the main operating system today on PCs?
7) What exactly is an operating system composed of?
8) What is the kernel?
9) What is another main task for an operating system?
10) What do modern operating systems offer?
91
III. Basic DOS commands
Match the DOS commands on the left with the explanations on the right.
Some commands are abbreviations of English words.
1 FORMAT a erases files and programs from your disk
2 CD (or CHDIR) b copies all files from one floppy disk to another
3 DIR c changes your current directory
4 MD ( or
MKDIR)
d initializes a floppy disk and prepares it for use
5 DISKCOPY e displays a list of the files of a disk or directory
6 BACKUP f changes names of your files
7 REN
(RENAME)
g creates a subdirectory
8 DEL h saves the contents of the hard disk on floppy disk for
security purposes
IV. Language work: Revision of the passive
A. The present simple passive
We form the present simple passive with am/is/are + past participle.
Example:
- This program is written in a special computer language.
- Programs and data are usually stored on disks.
Remember that the word data takes a singular verb (3rd person singular) when it
refers to the information operated on in a computer program.
- The data is ready for processing.
B. Fill in the blanks with the correct form of the verbs in brackets.
1) Various terminals (connect) to this workstation.
2) Microcomputers (know) as ‘PCs’.
3) Magazines (typeset) by computers.
4) When a particular program is run, the data (process)
by the computer very rapidly.
5) Hard disks (use) for the permanent storage of
information.
92
6) The drug-detecting test in the Tour de France (support)
by computers.
7) All the activities of the computer system (coordinate)
by the central processing unit.
8) In some modern systems information (hold) in
optical disks.
V. Quiz
Work with a partner. Try to answer as many questions as possible.
(Use the Glossary if you need to)
1) What name is given to the set of programs that interface between the
user, the applications programs, and the computer?
2) What types of programs are designed for particular situations and
specific purposes?
3) What does ‘MS-DOS’ stand for?
4) What is the basic DOS command for copying a file?
5) The Macintosh operating system is kept in various locations. Where
exactly are these?
6) Can you give synonym for the term ‘routine’?
7) What is the abbreviation for ‘International Business Machines’?
8) Which company developed UNIX?
9) Which programming language allows you to play animations on the
Web?
10) What are the effects of computer viruses?
93
Lesson 2. The graphical user interface
I. A user-friendly interface
The picture below illustrates a user interface based on graphics.
Read the definitions in the HELP box and then match with the concept
in the right column:
The interface elements of the Windows XP
HELP box
a. Is an area of the computer screen where you can see the
contents of a folder, a file, or a program. Some systems
allow several windows on the screen at the same time and
windows can overlap each other. The window on the top is
the one which is ‘active’, the one in use.
b. Are small picture on the screen. They present programs,
folders, or files. For example, the Recycle Bin icon
represents a program for deleting and restoring files. Most
systems have a special area of the screen on which icons
appear.
c. Give the user a list if choice. You operate the menu by
pressing and releasing one or more buttons on the mouse.
d. Is the arrow you use to select icons or to choose options
from a menu. You move the pointer across the screen with
the mouse. Then you click a button on the mouse to use the
object selected by the pointer.
e. Containers for documents and applications, similar to the
subdirectories of a PC platform.
1. window
2. menu
3. pointer
4. icons
5. folders
94
II. Reading
A. Read the article below and decide which of the expressions in the box
best describe a graphical user interface (GUI).
user-friendly slow text-based
complex graphics-based attractive
GUIs
The terms user-interface refers to
the standard procedures the user
follows to interact with a particular
computer.
A good user interface is important
because when you buy a program you
want to use it easily. Moreover, a
graphical user interface saves a lot of
time: you don’t need to memorize
commands in order to execute an
application; you only have to point
and click so that its content appears on
the screen.
Macintosh computers – with a user
interface based on graphics and
intuitive tools – were designed with a
single clear aim: to facilitate
interaction with the computer. Their
interface is called WIMP: Window,
Icon, Mouse, and Pointer, and
software products for the Macintosh
have been designed to take full
advantage of its features using this
interface. In addition, the ROM chips
of a Macintosh contain libraries that
provide program developers with
routines for generating windows,
dialog boxes, icons, and pop-up
menus. This ensures the creation of
applications with a high level of
consistency.
Today, the most innovative GUIs
are the Macintosh, Microsoft
Windows, and IBM OS/2 Warp.
These three platforms include similar
features: a desktop with icons,
windows, and folders, a printer
selector, a file finder, a control panel
and various desk accessories. Double
clicking a folder opens a window
which contains programs, documents,
or further nested folders. At any time
within a folder, you can launch the
desired program or document by
double-clicking the icon or you can
drag it to another location.
The three platforms differ in other
areas such as device installation,
network connectivity, or compatibility
with application programs.
These interfaces have been so
successful because they are extremely
easy to use. It is well known that
computers running under an attractive
interface stimulate users to be more
creative and produce high quality
results, which has a major impact on
the general public.
95
B. Look at the text again and guess the meaning of the words in bold and
italics in your own language.
C. Find answers to these questions.
1) What does the abbreviation ‘GUI’ stand for?
2) What is the contribution of Macintosh computers to the development
of graphic environments?
3) What does the acronym ‘WIMP’ mean?
4) What computing environments based on graphics are mentioned in the
text?
5) How do you run a program on a computer with a graphical interface?
6) Can you give two reasons for the importance of user-friendly
interfaces?
III. Exercise work
Add to the statements (1-10) using the extra information (a-j).
1. A barcode is a pattern of
printed black lines
a. it contains the main
electronic components.
2. A floppy is a disk b. it adds features to a
computer
3. A mother is a printed circuit
board
c. it is about the size of a
piece of paper.
4. A password is a secret set of
characters
d. supermarkets use them
for pricing
5. A monitor is an output device e. it reads and writes to
disks.
6. A disk drive is a unit f. it can hold 1.44Mb of
data.
7. An expansion card is an
electronic board
g. it allows access to a
computer system
8. A CD-ROM drive is a common
storage device
h. it controls all the other
boards in a computer
9. A notebook is a portable
computer
i. it displays data on a
screen.
96
10. The system unit is the main
part of the computer
j. it read data from a
CD_ROM disk
IV. Language work: Short relative clauses
We can join these sentences by using a relative clause.
1) Her house has a network.
2) It allows basic file-sharing and multi-player gaming.
1) + 2) Her house has a network which allows basic file-sharing and
multi-player gaming.
Relative clauses with certain active verbs can be shortened by omitting the
relative word and changing the verb to its ‘-ing’ form. We can shorten the relative
clause like this:
Her house has a network allowing basic file-sharing and multi-player
gaming.
Note how these two sentences are joined by a relative clause.
3) The technology is here today.
4) The technology is needed to set up a home network.
3) + 4) The technology which is needed to set up a home network is here
today.
Relative clauses like this with passive verbs can be shortened by omitting the
relative word and the verb ‘to be’.
The technology needed to set up a home network is here today.
Now link each group of sentences into one sentence using short relative
clause.
1 a The technology is here today.
b It is needed to set up a home network.
2 a You only need one network printer.
b It is connected to the server.
3 a Her house has a network.
b It allows basic file-sharing and multi-player gaming.
4 a There is a line receiver in the living room.
b It delivers home entertainment audio to speakers.
5 a Eve has designed a site.
b It is dedicated to dance.
6 a She has built in links.
97
b They connect her site to other dance sites.
7 a She created the site using a program called Netscape
Composer.
b It is contained in Netscape Communicator.
8 a At the centre of France Telecom’s home of tomorrow
is a network.
b It is accessed through a Palm Pilot-style control pad.
9 a The network can simulate the owner’s presence.
b This makes sure vital tasks are carried out in her
absence.
10 a The house has an electronic door-keeper.
b It is programmed to recognize you.
c This gives access to family only.
Using short relative clauses is one way of reducing sentences. Other
ways of reducing sentences are:
Taking out relative pronouns where possible
e.g. The software (that) we bought last year.
Omitting qualifying words (adjectives, or modifying adverbs)
e.g. (quite) complex/(very) similar
Taking out that in reported speech or thoughts
e.g. It is well known (that) computers
I think (that) there’s something wrong with this program.
Cutting out unnecessary phrases
e.g. Macintosh computers were designed with a clear aim: to
facilitate the user’s interaction with the computer.
= Macintosh computers were designed to facilitate the user’s
interaction with the computer.
V. Writing
Summarize the text in Task 2 in 70 – 75 words. You may like to follow
these steps.
1. Read through the whole text again and think of a suitable title for it.
2. Make sure you understand all the main points. Go through the text and
underline the relevant information in each paragraph.
3. Make notes about the main points:
Omit repetitions and unnecessary phrases
Leave out details, such as examples
98
E.g. notes on the first paragraph: In the past, only experts used
computers. But now, emphasis on user-friendly interfaces.
4. Make sentences from the notes and connect the sentences by using
linking words (and, but, also, because, that’s why, in fact, therefore, etc.)
Write your first draft.
5. Improve your first draft by reducing sentences.
6. Check grammar, spelling, and punctuation. Write the final version of
your summary.
99
Lesson 3. Spreadsheets
I. Looking at a spreadsheet
Look at this spreadsheet and try to answer the questions.
1 What is a spreadsheet?
What is it used for?
This sample spreadsheet shows the income
and expenses of a company. Amounts are
given in $ millions
2 In a spreadsheet, there are
‘columns’, ‘rows’, and
‘cells’. Give an example of
each from the sample
spreadsheet.
3 What type of information can
be keyed into a cell?
4 What will happen if you
change the value of a cell?
II. Reading
Read the text below and decide whether these sentences are right (√) or
wrong (X)
1) A spreadsheet program displays information in the form of a table,
with a lot of columns and rows.
2) In a spreadsheet, you can only enter numbers and formulas.
3) In a spreadsheet you cannot change the width of the columns.
4) Spreadsheet programs can produce visual representations in the form
of pie charts.
5) Spreadsheets cannot be used as databases.
A spreadsheet program is normally
used in business for financial planning
– to keep a record of accounts, to
analyze budgets or to make specific
calculations. It’s like a large piece of
paper divided into columns and rows.
Each column is labeled with a letter
and each row is labeled with a
number. The point where a column
and a row intersect is called a cell. For
example, you can have cells A1, B6,
C5, and so on.
A cell can hold three types of
information: text, numbers and
formulas. For example, in the sample
spreadsheet, the word sales has been
100
keyed into cell A2 and the values 890,
478 and 182 have been entered into
cells B2, B3, and B4 respectively. So
when the formula ‘B2 + B3 + B4’ is
keyed into cell B5 the program
automatically calculates and displays
the result.
Formulas are functions or
operations that add, subtract, multiply
or divide existing values to produce
new values. We can use them to
calculate totals, percentages or
discounts.
When you change the value of one
cell, the values in other cells are
automatically recalculated. You can
also update the information in
different worksheets by linking cells.
This means that when you make a
change in one worksheet the same
change is made in the other
worksheet.
The format menu in a spreadsheet
usually includes several commands
allowing you to choose the font,
number alignment, borders, column
width and so on.
Most spreadsheet programs can
generate documents with graphic
representations and some include
three-dimensional options. The values
of cells are shown in different ways
such as line graphs, bar, or pie charts.
Some programs also have a
database facility which transforms the
values of the cells into a database. In
this case, each column is a field and
each row is a record.
III. Vocabulary
Match the terms in the box with the explanations below.
a. formul b. cell c. sales d. payroll
e. shares f. revenue g. interest h. expenses
1) A sum of money that is charged or paid as a percentage of a larger
sum of money which has been borrowed or invested, e.g. High rates./
7 percent ~ on a loan.
2) The intersection of a column and a row in a spreadsheet, e.g. the ~ B2.
3) The quantity sold, e.g. The ~ of PCs rose by 10 percent last year.
4) The income – or money – received by a company or organization, e.g.
The annual ~ of this multinational company is
5) A ~ in a company is one of the equal parts into which the capital of the
company is divided, entitling the holder of the ~ to a proportion of the
benefits, e.g. £10 ~s are now worth £11
6) Financial costs; amounts of money spent, e.g. Travelling ~.
101
7) A function or operation that produces a new value as the result of
adding, subtracting, multiplying, or dividing existing values, e.g. If we
enter the ~ B5-B10, the program calculates
8) 1 A list of people to be paid and the amount due to each. 2 Wages or
salaries paid to employees, e.g. He was on the company’s ~.
IV. Language work: Prepositions of place
A. Study these examples of prepositions of place.
1 Data moves between the
CPU and RAM.
2 Data flows from ROM to
the CPU.
3 A program is read from
disk into memory.
4 Data is transferred along
the data bus.
5 The address number is put
onto the address bus.
6 The hard disk drive is inside a sealed
case.
7 Heads move across the disk.
8 Tracks are divided into sectors.
B. Now complete each sentence using the correct preposition.
1) The CPU is a large chip . the computer
2) Data always flows . the CPU . the address bus.
3) The CPU can be divided . three parts.
4) Data flows . the CPU and memory.
5) Peripherals are devices . T he computer but linked
. it.
102
6) The signal moves . the VDU screen . one side .
the other.
7) The CPU puts the address . the address bus.
8) The CPU can fetch data . memory . the data bus.
V. Graphic representation
A. Look at the graph below and, with the help of a partner, check that it is
an exact visual representation of the spreadsheet in Task 1.
B. Can you calculate the net profits of this firm during the period 1997-98?
C. What type of image is this: a pie chart, a bar chart, an area graph, or a
line graph?
D. What is the advantage, if any, of displaying information as a graph,
rather than as a spreadsheet?
VI. Extension
A. Spreadsheet programs are also used to make out invoices. Look at the
invoice below and fill in the blanks with the right words from the
box.
Quantity Description Price VAT (Value Added Tax)
Reference TOTAL Address Company
103
B. Have you got a spreadsheet program at work or school? If so, try to
produce a similar invoice.
104
Lesson 4. Databases
I. Warm-up
Companies often use databases to store information about customers,
suppliers and their own personnel. Study the illustrations and then try to
answer these questions.
1) What is a database?
2) Which tasks can be performed by using a database? Make a list of
possible applications.
3) What do the terms mean in your language: file, record, field?
Name: James Powell
Address: 12, Back
St.
Marital status:
single
Identification 8994989
Job ENGINEER
SALARY £18,750
Home phone: 456367
Department: Data
processing
Commission: £18,750
II. Reading
A. Here is a part of an article about databases. First, read all the way
through and underline the basic features of a database.
Basic features of database programs
With a database, you can store,
organize, and retrieve a large collection
of related information on computer. If
you like, it is the electronic equivalent
of an indexed filing cabinet. Let us look
at some features and applications.
Information is entered on a
database via fields. Each field
holds a separate piece of
information, and the fields are
collected together into records.
For example, a record about an
employee might consist of
several fields which give their
name, address, telephone
number, age, salary, and length
of employment with the
company. Records are grouped
together into files which hold
large amounts of information.
Files can easily be updated: you
can always change fields, add
new records, or delete old ones.
105
With the right database software,
you are able to keep track of
stock, sales, market trends,
orders, invoices, and many more
details that can make our
company successful.
Another feature of database
programs is that you can
automatically look up and find
records containing particular
information. You can also search
on more than one field at a time.
For example, if a managing
director wanted to know all the
customers that spend more than
£7,000 per month, the program
would search on the name field
and the money field
simultaneously.
A computer database is much faster
to consult and update than a card index
system. It occupies a lot less space, and
records can be automatically sorted into
numerical or alphabetical order using
any field.
The best packages also include
networking facilities, which add a new
dimension of productivity to
businesses. For example, managers of
different departments can have direct
access to a common database, which
represents an enormous advantage.
Thanks to security devices, you can
share part of your files on a network
and control who sees the information.
Most aspects of the program can be
protected by user-defined passwords.
For example, if you wanted to share an
employee’s personal details, but not
their commission, you could protect the
commission field.
In short, a database manager helps
you control the data you have at home,
in the library or in your business.
B. Now make a list of the words you don’t understand. Can you guess their
meaning? Compare your ideas with other students.
C. Using the information in the text, complete these statements.
1) A database is used to ........
2) Information is entered on a database via ...
3) Each field holds .
4) ‘Updating’ a file means
5) The advantages of a database program over a manual filing system are
6) Access to a common database can be protected by using
III. Puzzle
Complete the sentences by using a term from the list. Then write the
words in the crossword to find the hidden message.
database field layout merging
106
record sorted updated
1. In order to personalize a standard letter,
you can use ‘mail .’ (a
technique which consists of combining
a database with a document made with
a word processor).
2. Records can be automatically
. into any order.
3. You can decide how many fields you want to have on a .
4. Files can easily be . by adding new information or deleting the old
one.
5. A . program can be used to store, organize and retrieve information
of any kind.
6. The . of the records can be designed by the user.
Each piece of information is given in a separate . .
IV. Language work
Requirements: Need to, have to, must, be + essential, critical
Note how we describe
requirements of particular
jobs:
1. You need to be able to empathise
with the person at the other end of
the phone.
2. IT managers have to take
responsibility for budgets.
3. You must be interested in your
subject.
4. You must have worked for at least
two years in systems analysis.
We can also treat need as a
modal verb and use the
negative form needn’t:
7. You needn’t have a degree in
computing science.
Have to is an ordinary verb.
Its negative form is made in
the usual way:
8. You don’t have to be an expert
in everything.
Mustn’t has a quite different
meaning. It means it is
important not to do
107
5. Experience with mainframes is
essential/ critical.
We can describe things which
are not requirements like
this:
6. You don’t need to have a degree in
computing science.
something. It is used for
warning, rules, and strong
advice. For example:
9. You mustn’t make unauthorized
copies of software.
A. Now fill in the blanks with the appropriate form of the verbs, need to,
have to, and must, to make sensible statements. More than one answer is
possible in some examples.
1) Technical qualifications .. to be renewed at intervals to
ensure they do not go out of date.
2) You .. become an expert in too narrow a field.
3) You .. to have good communication skills to become an IT
Manager.
4) You .. be an expert in hardware to become a programmer.
5) You .. have worked with IBM mainframes for at least two
years.
6) You .. be able to show leadership.
7) You .. have a degree but it .. be in computing
science
8) You .. to have experience in JavaScript
9) You .. be able to use C++
10) These days you .. study BASIC
B. Study these requirements for different jobs in computing advertised on
the Internet. Then describe the requirements using the methods studied
in this unit.
Systems Manager/
Programmer
Support Analyst:
IBM Mainframe MVS
Programmer
Technical
specialist
Min. 2 yrs work
in systems
programming
IBM MVS support
technician
1 yr exp. of VTAM,
NCP, SSP, NPM,
IBM 3745-900
3 yrs exp. SAP Basic
Technical
Environment
Team player with
strong analytical and
108
Plus exp. of
Netview/
automation
design & support
hardware
Authorized to work in
the EU
problem-solving
skills
Ability to
communicate issues
and solutions and
manage time
effectively
Webmaster Cisco Technician IS Manager
Strong Unix
experience
Able to use
HTML,
DHTML, and
JavaScript
Knowledge of
Shell Scripts
CCNA qualified
Excellent skills in the
surrounding
technologies
Min. 2 yrs work in
support
Knowledge of NT
and Netware
Experience of ERP
systems
implementation
Very strong
managerial skills
V. Writing
Imagine that you are Barry Stephens, the sales manager of Sunrise
Computer. Write a standard letter to your clients about ‘New software
products on the market’, and offer them a free demonstration disk.
109
MODULE 5. FACES OF THE INTERNET
Lesson 1. The internet and email
I. Internet basics
A. In pairs, discuss how you would define the Internet
B. Make a list of all the things you can use the Internet for
II. Internet FAQs
A. Read Part 1 of the internet FAQs and choose the correct answers
1) The internet was
a. Invented in the mid-90s
b. Popular in the 1960s
c. Probably created in the USA
2) Which term describes any fast, high-bandwidth connection?
a. Broadband
b. Dial-up connection
c. Wi-Fi connection
3) The power-line internet provides broadband access through
a. Telephone lines
b. Satellites
c. Electrical power lines
4) Which device converts computer data into a form that can be
transmitted over phone lines?
a. ADSL
b. A mobile phone
c. A modem
5) The standard protocol that allows computers to communication over
the Internet is called
a. An IP address
b. TCP/IP
c. HTTP
6) The geographical region covered by one or several access points is
called a
a. Wireless access point
b. Hotspot
c. Wireless network device.
110
Internet FAQs: Part 1
How old is the Internet (the Net)? When was it created?
It’s hard to say exactly. The research that led to what we now know as
the Internet was begun in the 1960s
Who created the Internet?
Again, it’s hard to say exactly who created it. The initial research was
carried out by the Advanced Research Projects Agency in America, funded
by the US government.
Did the Internet become popular quickly?
It took many years for the Internet to become popular around the
world. It’s only really since the mid-90s that the Internet has been a part of
our daily lives.
How do you get online?
To get connected, you need a computer, the right connection Software
and a modem connected to the phone line. You also need an account with an
Internet Service Provider (ISP), which acts a gateway between your PC and
the rest of the Net.
How fast are today’s internet connections?
Today, ISPs offer a broadband, high-speed connection. The most
common types are cable-offered by local cable TV companies-and ADSL
(Asymmetric Digital Subscriber Line), which works through phone lines.
They are both faster than the traditional dial-up telephone connection.
Broadband access is also offered by some electricity networks. This
connection technology, known as power-line Internet, provides low-cost
access via the power plug, but is still in development.
How long has broadband existed?
Since the late 1990s.
How much does broadband access cost?
It depends on which company you choose. Nowadays, some
companies even offer free broadband.
Why do you need a modem?
A modem (modulator/demodulator) converts digital signals into
analogue signals so that data can be transmitted across the phone or cable
network.
What does TCP/IP mean?
The language used for data transfer on the Internet is known as TCP/IP
(transmission control protocol/ Internet Protocol). This is like the internet
111
operating system. Every computer connected to the Net is identified by a
unique IP address.
Are there other ways of accessing the Internet?
Other methods of internet access include Wi-Fi, satellite, mobile
phones and TV set equipped with a modem, Wi-Fi-enabled laptops or PDAs
allow you to connect to the Net if you are near a wireless access point, in
locations called hotspots (for example, a Wi-Fi café, pack or campus).
Satellite services are used in places where terrestrial access is not available
(for example, on ships at sea). High-end mobile phones provide access
through the phone network.
B. In pairs, discuss which of the internet systems (1-6) you would use to do
the tasks (a-f). then read Part 2 of the FQAs and check your answers
1. Email a. Transfer files from the Internet to your hard drive
2. The Web b. Send a message to another person via the Internet
3. Newsgroups c. Have a live conversation (usually typed) online
4. Chat and IM d. Connect to a remote computer by entering
instructions, and run a program on it
5. FTP e. Take part in public discussion areas devoted to
specific topics
6. Telnet f. Download and view documents published on the
Internet
Internet FAQs: Part 2
Email
Email lets you exchange messages with people all over the world.
Optional attached files can include text, pictures and even audio and
animation. A mailing list uses email to communicate messages to all its
subscribes – that is, everyone that belongs to the list.
Which email program is the best?
Outlook Express is a popular program, but many users use web-based
email accounts such as Hotmail.
The web
The Web consists of billions of document living on web servers that
use the HTTP protocol. You navigate through the Web using a program
called a web browser, which lets you search, view and print web pages.
How often are web pages updated?
It depends entirely on the page. Some are updated thousands of times a
day.
112
Chat and Instant Messaging (IM)
Chat and Instant Messaging technologies allow you to have real-time
conversations online, by typing messages at the keyboard.
FTP
FTP, of file transfer protocol, is used to transfer files over a TCP/IP
network. Nowadays, this feature is built into Web browsers. You can
download programs, games and music files from a remote computer to your
hard drive.
Telnet
Telnet is a protocol and a program used to log onto remote computer
systems. It enables you to enter commands that will be executed as if you
were entering them directly on the remote server.
Newsgroups
Newsgroups are the public discussion areas which make up a system
called Usenet. The contents are contributed by people who post articles or
respond to articles, creating chains of related postings called message
threads. You need a newsreader to subscribe to newsgroups and to read and
post messages. The newsreader may be a stand-alone program or part of a
web browser.
How many newsgroups are there?
There are approximately 30,000 active newsgroups.
Where can you find newsgroups?
Your newsreader may allow you to download the newsgroup addresses
that your ISP has included on its news server. An alternative to using a
newsreader is to visit web forums instead, which perform the same function
but without the addition software.
C. Find words and phrases in part 2 with following meanings
1) A system used to distribute email to many different subscribers at once
(in Email paragraph)
2) A program used for displaying web pages (in The Web paragraph)
3) To connect to a computer by typing your username and password (in
Telnet paragraph)
4) A series of interrelated messages on a given topic (in Newsgroups
paragraph)
5) A program for reading Usenet newsgroups (in Newsgroups paragraph)
III. Language work: questions
113
A. Look at the HELP box and then make a question about Sue Clarke for
each of her answers
1) ..
I’m 23 years old
Sue Clarke
2) ..
I’m an online researcher
3) .
I use the Internet to find information
requested by clients
4) ..
I’ve been doing this job for six months
5)
I graduated from university in 2006
HELP box
Questions
In questions, we normally place the
auxiliary verb before the subject.
Are there other ways of accessing the
Internet?
If there is no other auxiliary, we use
do/does (present simple) or did (past
simple)
Did Internet become popular
quickly?
There are many question words in
English which we use to find out
more information than just yes or no
People
Who created the Internet?
Things
What does TCP/IP mean?
Which email program is the best?
Place
Where can you find newsgroups?
Time
When was it created?
How often are web pages updated?
How long has broadband existed?
Reason
Why do you need a modem?
Quantity
How much does broadband access cost?
How many newsgroups are there?
Manner
How do you get online?
Others
How fast are today’s internet
connections?
How old is the Internet?
B. In pairs, make questions using these prompts. Then practice asking and
answering the questions.
114
Example: When / first / use the Internet when did you first use the
Internet?
1) What type of internet connection / have at home?
2) How fast/ your internet connection?
3) How much / pay for broadband access?
4) How often/ access the internet?
5) Which email program/use?
6) Who/ send email to?
7) Do / use you mobile phone to access the Internet?
8) Do / use the internet in public spaces using Wi-Fi?
9) Do/ play games online?
10) How many newsgroups / subscribe to?
115
Lesson 2. The web
I. A typical web page
Read the text and label the features on the screenshot with the terms in bold
A typical web page
At the top of the pages is the URL
address. URL means Uniform
Resource Locator – the address of a file
on the Internet. A typical URL look like
this
In this URL, http:// means
Hypertext Transfer protocol and tells
the program to look for a web page.
www mean world wide web.
24h.com.vn is the domain name of the
server that hosts the website – a
company based in Vietnamese; other
top-level domains are .com
(commercial site), .edu (education),
.org (organization) or .net (network);
abc is the directory path where the web
page is located. The parts of the URL
are separated by . (dot), / (slash) and :
(colon). Some sites begin ftp://, a file
transfer protocol used to copy files
from one computer to another.
The toolbar shows all the navigation
icons, which let you go back one page
or go forward one page. You can also
go to the home page or stop the current
transfer when the circuits are busy
Tab buttons let you view different
sites at the same time, and the built-in
search box helps you look for
information. If the feed button lights
up, it means the site offers RSS feeds,
so you can automatically receive
updates. When a web page won’t load,
you can refresh the current page,
meaning the page reloads (downloads
again). If you want to mark a website
address so that you can easily revisit the
page at a later time, you can add it to
your favorites, or bookmark it. When
you want to visit it again you simply
click show favorites.
On the web page itself, most sites
feature clickable image links and
clickable hypertext links. Together,
these are known as hyperlinks and take
you to other web pages when clicked.
116
II. Language work: collocations 2
A. Look at the HELP box and then match the words on the left (1-6) with
the words on the right (a-f) to make collocations. There may be more
than one possible answer.
1. Online
2. Take
3. Email
4. Upload
5. Portable
6. official
a. friends
b. photos
c. action
d. website
e. encyclopedia
f. player
B. In pairs, make sentences using the collocations above.
C. Find the collocations in these sentences and say what type they are
1) Once you are online, you can browse the Web, visit chat rooms or send and
receive emails.
2) Instant messaging can be a great way to communicate with friends.
3) This software may not be fully compatible with older operating systems.
4) Most webcam plug into a USB port.
5) This highly addictive game will keep you playing for hours
6) Companies are starting to use virtual reality on their websites.
HELP box
Collocations 2
A collocation is a pair or group of
words that are often used together.
For example, we say make phone call,
not do phone calls.
Here are some common types of
collocation
Verb + noun
Surf the Web
Download music
Verb + particle
Hack into a computer
Log onto a bank account
Adverb + adjective
Highly sensitive information
Freely available on the Web
Adjective + noun
Mathematical formulas
Up-to-date information
The world online often collocates
with other words and can function as
adjective or adverb.
Adjective: They post opinions on
online journals
Adverb: a podcast is an audio
recording posted online.
D. Complete the extracts with words from the box
Authorization Fake Internet auction Shopping cart
117
Browse Login steal
1) Occasionally I also buy things on.sites such as eBay where
people offer and sell things to the highest bidder.
2) First you enter a site dedicated to e-commerce and..their
products
3) Then you put the items you want to buy into a virtual-a
program that lets you select the products and buy with a credit card
4) You may have to.with a username and a password
5) for some transactions, you will be required to use a TAN, a
transactionnumber
6) Be aware of phishing – you may receive.emails claiming to
be from your bank and asking for personal information or account
details in an attempt to.you identity.
III. Language work: the prefixes e- and cyber-
Look at the HELP box and then complete these sentences
1 A.is an employee who
uses his company’s internet
connection during work hours to
chat with friends, play games, etc.
2 An .is a postcard sent via the
Internet
3 An.is a small magazine or
newsletter published online
4 In a..you can use
computers with internet access for a
fee
5 Examples of.include internet
fraud, digital piracy, theft of
confidential information, etc.
6 In the future, all elections will be
carried out using
7 You can now sign legal documents
online using an.
8 will revolutionize the
way we take exams
HELP box
The prefixes e- and cyber-
The e- prefix means electronic and
we add it to activities that take place
on computers or online, for example
e-business/e-commerce – business
conducted over the Internet. Other
example include; e-card, e-learning,
e-zine, e-voting, e-signature, e-
assessment, e-cash, e-book and e-
pal.
There are often spelling variations,
with or without a hyphen, so always
check your dictionary.
The cyber- prefix comes from
cybernetics, and we use it to describe
things related to computer networks,
for example cybercafé – an internet
café. Other examples include:
cybercrime, cyberculture,
cyberslacker and cyberspace
118
9 ..can be used on some websites instead of real money to make purchases.
It reduces the risk of fraud.
10 An. is like the paper version, but in digital form.
119
IV. What do you use the Web for?
In pairs, discuss these questions. Give reasons for your answers.
1 what is your favorites search
engine to find information on
the Web? Why?
2 Do you download music or
video clips from the Web?
Do you pay for them?
3 Do you buy things online? Is
it better to buy online or
go to a shop?
4 Have you ever listened to the radio or watched TV online?
5 Do you use the Web to do school/university assignments or projects? How?
120
Lesson 3. Internet security
I. On alert
A. In pair, discuss these questions.
2) What is a hacker?
3) How easy do you think it is to infiltrate the Internet and teal sensitive
information?
4) How can you protect your computer from viruses and spyware?
A. Match the captions (1-4) with the pictures (a-d)
1 A secure website can be recognized in two ways: the address bar
shows the letters https and a closed padlock or key is displayed at the
bottom of the screen.
2 You have to type your username and password to access a locked
computer system
3 This program displays a message when it detects spyware and other
unwanted software that may compromise your privacy or damage your
computer.
4 Private networks use a software and/or hardware mechanism called a
firewall to block unauthorized traffic from the Internet.
a.
c..
b
d.
121
II. Security and privacy on the Internet
A. Read the text quickly and see how many of your ideas from 1A Question
are mentioned
B. Read the text more carefully and answers these questions.
1) Why is security so important on the Internet?
2) What security features are offered by Mozilla Firefox?
3) What security protocol is used by banks to make online transactions
secure?
4) How can we protect our email and keep it private?
5) What methods are used by companies to make internal networks secure?
6) In what ways can a virus enter a computer system?
7) How does a worm spread itself?
Security and privacy on the Internet
There are many benefits from an
open system like the Internet, but one
of the risks is that we are exposed to
hackers, who break into computer
systems just for fun, to steal
information, or to spread viruses. So
how do we go about making our
online transactions secures?
Security on the Web
Security is crucial when you send
confidential information online.
Consider, for example, the process of
buying a book on the Web. You have
to type your credit card number into
an order form which passes from
computer to computer on its way to
the online bookstore. If one of the
intermediary computers is infiltrated
by hackers, your data can be copied.
To avoid risks, you should set all
security alerts to high on your web
browser. Mozilla Firefox displays a
lock when the website is secure and
allows you to disable or delete
cookies – small files placed on your
hard drive by web servers so that they
can recognize your PC when you
return to their site.
If you use online banking services,
make sure they use digital
certificates – files that are like digital
identification cards and that identify
users and web servers. Also be sure to
use a browser that is compliant with
SSL (Secure Socket Layer), a
protocol which provides secure
transactions.
Email privacy
Similarly, as you email travels
across the Net, it is copied temporarily
onto many computers in between.
This means that it can be read by
people who illegally enter computer
systems.
The only way to protect a message
is to put it in a sort of virtual envelope
– that is, to encode it with some form
of encryption. A system designed to
122
send email privately is Pretty Good
privacy, a freeware program written
by Phil Zimmerman.
Network security
Private networks can be attacked
by intruder who attempt to obtain
information such as Social Security
numbers, bank accounts or research
and business reports. To protect
crucial data, companies hire security
consultants who analyze the risks and
provide solutions. The most common
methods of protection are passwords
for access control, fire walls, and
encryption and decryption systems.
Encryption changes data into a secret
code so that only someone with a key
can read it. Decryption converts
encrypted data back into its original
form.
Malware protection
Malware (malicious software) are
programs designed to infiltrate or
damage your computer, for example
viruses, worms, Trojans and
spyware. A virus can enter a PC via a
disc drive – if you insert an infected
disc – or via the Internet. A worm is a
self-copying program that spreads
through email attachments; it
replicates itself and sends a copy to
everyone in an address book. A
Trojan horse is disguised as a useful
program; it may affect data security.
Spyware collects information from
your PC without your consent. Most
spyware and adware (software that
allows pup-ups- that is,
advertisements that suddenly appear
on your screen) is included with
“free” downloads.
If you want to protect your PC,
don’t open mail attachments from
strangers and take care when
downloading files from the Web.
Remember to update your anti-virus
software as often as possible, since
new viruses are being created all the
time.
III. The history of hacking
A. Read Part 1 of the text and answer these questions.
1) Which hacking case inspired the film War Games?
2) When did Captain Zap hack into the Pentagon?
3) Why was Nicholas Whitely arrested in 1988
4) How old was the hacker that broke into the US defense computer in
1982?
The history of hacking – Part 1
1971- John Draper discovered that a whistle offered in boxes of Cap’n
Crunch breakfast cereal perfectly generated the 2,600Hz signal
123
used by the AT&T phone company. He started to make free calls.
He was arrested in 1972 but wasn’t sent to prison
1974- Kevin Mitnick, a legend among hackers, began hacking into
banking networks and altering the credit reports of his enemies.
He didn’t expect that his most famous exploit – hacking into the
North American Defense Command in Colorado Springs – would
inspire the film War Games in 1983
1981- Ian Murphy, a 23-year – old know as Captain Zap on the
networks, hacked into the White House and the Pentagon
1987- The IBM international network was paralyzed a hacker’s
Christmas message.
1988- The Union Bank of Switzerland almost lost £32 million to
hackers. Nicholas Whitely was arrested in connection with virus
spreading.
1989- A fifteen-year-old hacker creaked the US defense computer
1991- Kevin Poulsen, known as Dark Dante on the network, was
accused of stealing military files.
B. In pairs, discuss which of the cases in part 1 you had heard of. Which do
you think is the most important?
IV. Language work: the past simple
A. Look at the HELP box and then complete Part 2 of the text with the past
simple form of the verbs in the box
show spread steal launch affect
attempt overwrite be infect
The history of hacking – Part 2
1992- David L Smith (1)..prosecuted for writing the Melissa
virus, which was passed in Word files sent via mail
1997- The German hacker Chaos Computer Club (2) on TV
how to obtain money from bank accounts
2000- A Russian hacker (3) to extort $100,000 from online
music retailer CD Universe. A Canada hacker (4) a
massive denial of service attack against website like Yahoo! And
Amazon.
The ILoveYou virus, cleverly disguised as a love letter,
(5) so quickly that email had to be shut down in many
companies. The worm (6). Image and sound files with a
124
copy of itself.
2001- The Code Red worm (7). Tens of thousands of machines
2006- Hackers (8).the credit card details of almost 20,000
AT&T online customers. However, subscribers to its services (9)
(not).
HELP box
Past simple
We use the past simple to talk
about a complete action or event
which happened at a specific time
in the past
We form the past simple of
regular verbs by adding –(e)d to
the infinitive
John Draper discovered that a
whistle
We form questions and negatives
using did/didn’t
When did Captain Zap hack into
the Pentagon?
He didn’t expect that his most
famous exploit
There are many verbs which are
irregular in the past simple
Kevin Mitnick began hacking into
We form questions and negatives
for irregular verbs in the same way as
for regular verbs. The exception is be
When did Kevin Mitnick begin
hacking into?
He didn’t begin hacking until 1974
We form the past passive with the
past simple of be + the past
participle
IBM international was paralyzed by
hackers.
He wasn’t sent to prison
Why was Nicholas Whitely arrested
in 1998?
B. Read these landmarks in the history of the Internet and prepare at least
five questions in the past simple
Example: what happened in 1969? What did Ray Tomlinson do in 1971?
1969- The US Defense Department establishes ARPANET, a network
connecting research centre
1971- Ray Tomlison of BBN invents an email program to send message
across a network. The @ sign is chosen for its at meaning
1981- IBM sells the first IBM PC, BITNET provides email and file
transfers to universities
1982- TCP/IP is adopted as the standard language of the Internet
1988- Jarkko Oikarinen develops the system known as Internet Relay
Chat (IRC)
125
1991- CERN creates the World Wide Web.
1998- Online banking, e-commerce and MP3 music become popular
2001- Napster, whose software allows users to share downloaded music,
maintains that it does not perpetrate or encourage music piracy.
However, a judge rules that Napster’s technology is an
infringement of music copyright
2004- Network Solution begins offering 100-year domain registration
2006- Americans spend over $100 billion shopping online
C. In pairs, ask and answer your questions
V. Internet issues
A. In small groups, look at the list of cybercrimes and discuss these
questions
1) Which crimes are the most dangerous?
2) Is it fair or unfair to pay for the songs, videos, books or articles that you
download? Should copyright infringement be allowed online?
3) What measures can be taken by governments to stop cybercrime?
4) Do you think governments have the right to censor material on the
Internet
5) Personal information such as our address, salary, and civil and criminal
records is held in databases by marketing companies. Is our privacy in
danger?
Cybercrimes
Piracy – the illegal copy and distribution of copyrighted software,
games or music files
Plagiarism and theft of intellectual property – pretending that
someone else’s work is your own
Spreading of malicious software
Phishing (password harvesting fishing) – getting passwords for online
bank accounts or credit card numbers by using emails that look like
they are from real organizations, but are in fact fake; people believe
the message is from their bank and send their security details.
IP spoofing – making one computer look like another in order to gain
unauthorized access
Cyberstalking – online harassment or abuse, mainly in chat rooms or
newsgroups
Distribution of indecent or offensive material
126
B. Write a summary of your discussion on PowerPoint and present it to the
rest of the class
127
MODULE 6. CREATIVE SOFTWARE
Learning objectives
In this module, you will learn how to:
Identify the functions of different graphics tools
Understand specific aspects of desktop publishing and multimedia applications
Write a letter to a newspaper asking for information about the hardware and
page-layout software used for its production
128
Lesson 1. Multimedia
I. Multimedia is here!
Look at the cover for Encarta ’05.
What types of data are integrated in
multimedia applications?
II. Reading
A. Read the texts and match them with the headings in the box below.
Sound, Music, MIDI CD-ROM titles full of pictures,
action and sound!
The potential of using
multimedia
CD-ROM is more than just
heavy metal
Multimedia magic!
7.
Until now, multimedia applications have been used mainly in the fields of
information, training, and entertainment. For example, some museums, banks, and
estate agents have information kiosks that use multimedia. Several companies
produce training programs on optical disks, and marketing managers use
presentation packages (like Microsoft PowerPoint or Lotus Freelance Graphics for
Windows) to make business presentations. They have all found that moving
images, sound, and music involve viewers emotionally as well as inform them, and
make their message more memorable.
8.
Sound is an important component of the multimedia approach. The effective
use of sound can be used to grab the attention of the participant, set the mood, or
underscore a point. The most popular way of delivering sound is the hardware
soundboard. Such boards offer two important capabilities. The first of these is a
built-in stereo synthesizer complete with a built-in audio amplifier. Just connect a
set of speakers and you’ve got instant sound, music and speech capabilities. The
second capability is the musical instrument digital interface, or MIDI. This is a
specialized serial interface that allows an electronic musical instrument to
communicate with other MIDI-equipped instruments or PCs.
129
CD-ROM is popular
9. ..
Between 80 and 90 percent of all multimedia applications are distributed on
CD-ROM, some just on CD, some on several media (as with Autodesk’s
Multimedia Explorer, which comes with both a CD-ROM and diskettes). The
reason for CD-ROM’s popularity in multimedia is simple – a single CD can contain
650 MB of data. That’s over 500 floppy disks’ worth of programs, sound, and
graphics. The newest CD-ROM standard, CD-ROM XA (for eXtended
Architecture) uses data compression to fit even more on these shiny discs. Many
XA drives are also compatible with Kodak’s PhotoCD technology, which digitizes
photographs and places them on a CD-ROM.
10. ..
Electronic encyclopedias integrate text, pictures, and sound, and usually have
a video section with a full motion video window. The Compton’s Encyclopedia
enables you to read about whales, look at photos of whales, listen to whale songs,
and view an animated sequence showing whale movements through the ocean.
Similarly, the Grolier Encyclopedia lets you read about birds, view pictures of
birds, and listen to recordings of their songs.
Other CD-ROMs include dictionaries, guides, and courses about history,
science, the human body, cinema, literature, foreign languages, etc. For example,
Cinemania from Microsoft has information on thousands of films and photographs,
reviews, biographies and dialogues from films.
(Section 2 and 3 adapted from ‘Updating to multimedia’ in PC Upgrade, June 1993)
B. Read the texts again and correct these statements. There is a technical
mistake in each of them.
1) Multimedia applications do not use huge amounts of data.
2) You don’t need to have a soundboard on your PC to hear speech and
music.
3) Most multimedia software is distributed on magnetic disks.
4) Kodak’s PhotoCD technology is not compatible with many CD-ROM
drives.
130
5) There are no language courses available on CD-ROM
D. Match these terms in the box with the explanations.
b. Computer animation c. Video computing d. MIDI interface
e. CD-ROM player f. Multimedia control panels
1) Small programs inside the OS designed to work with audio and video
files.
2) A code for the exchange of information between PCs and musical
instruments.
3) A drive used to handle CD-Rom disks.
4) Manipulating and showing moving images recorded with a video
camera or captured from a TV or video recorder.
5) Images which move on the screen.
III. Language work: If – clauses
A. Conditional clauses
When you want to talk about a possible situation and its consequences, you
use a conditional sentence. Here, we examine two types of conditionals.
First conditional (possible situation)
If A happens, B will happen.
(present + simple), (will + verb)
E.g. If you click on the speaker icon, you’ll get a piece of dialogue
from the movie.
In the main clause, we can also have modal (can), an imperative, or a
present tense verb.
Second conditional (unlikely situation)
If A happened, B would happen.
(past simple), (would + verb)
E.g. If I had the money, I would (I’d) invest in a multimedia upgrade
kit.
Other modals (could, should, might) may appear in the main clause.
Read these sentences, then identify the tenses used in the if-clause and in the
main clause.
1 If you upgrade your PC, you’ll be able to run multimedia applications.
2 If the marketing manager had a multimedia system, she could make more
effective presentations.
B. Put the verbs in brackets into the correct form.
131
1) If I (get) a sound card, I’ll be able to create my own
music with a MIDI.
2) If the system (have) a SuperVGA card, we would obtain
a better resolution.
3) You won’t be able to play CD-ROM disks if you (not have)
a CD-ROM drive.
4) If you (come) to the annual computer exhibition, you
could see the new Macs.
5) If I could afford it, I (buy) a Multimedia PC
C. Match the sentences in Column A with appropriate sentences from
Column B. Then join each action and effect using an if-sentence.
Column A
1 You press Print Screen
2 You press Ctrl + Alt + Del in
Windows 98
3 You added more memory
4 You installed a modem
5 You used a better search engine
6 You forget to save regularly
7 You hold down the mouse button over
an icon
8 You used an LCD display
Column B
a you can drag it across the
screen
b it would speed up the computer
c you may lose data
d you would have more space at
your desk
e you would be able to connect to
a telephone line
f you can make a copy of the
screen
g you would find more relevant
results
h it displays a list of active
programs
D. Describe the consequences of these actions using an if-sentence.
1) you don’t virus-check floppies
2) there was a power cut while you were using your computer
3) you install a faster processor
4) you forgot your password
5) you press the delete key
132
6) you use search engine
7) you double-click on an icon
8) you use power-saving options
IV. Multimedia on the Web
Read the text and find:
1) the function of the extension that is usually added to a file name.
2) the language used to create the majority of text files on the Web.
3) the graphics interchange format created by CompuServe to compress
images.
4) the small program (plug-in) that lets you hear audio recordings on the
net.
5) the most popular video formats.
6) the format created by the Moving Picture Experts’ Group to capture,
store and play back movies.
7) the extension for the files that can be decompressed with a program
like Winzip.
Recognizing file formats
Web pages can contain different multimedia elements: text, graphics, sounds,
video and animation. To identify the format or type of file, an extension (a three-
letter suffix) is usually added to the file name when it’s saved on disk
Text
The most common text extensions are .txt, .pdf, .doc and .htm (or
.html). Most of the text files that you find on the Web have the
extension .htm, created with the hypertext markup language.
Graphics
Graphics on the Web can include pictures, photos, paintings,
image-maps and buttons. The most common formats are .gif (a
standard image format developed by CompuServe) and .jpg or
.jpeg (created by the Joint Photographic Expert’s Group).
Sounds
The Internet is a great place to find and hear hit songs, movie
soundtracks, and recorded interviews. The most common
formats are these:
.wav: wave files can be played with Sound Recorder
included with Windows.
133
.ra or .ram: files generated by RealAudio, a plug-in you can
download from the Web.
Video and animation
You can see cartoons and movie clips on the Web, but you need
the appropriate software. Video files are usually stored in: .avi,
.mov and .mpg (or .mpeg) formats.
To view MPEG videos, you just need Video for Windows. However, to create
high-quality movie clips, you need a dedicated MPEG expansion card. You can
also find animation and 3-D worlds. The two standard tools to manipulate
animated worlds are VRML and Java. To view a virtual animation, you need a
program like QuickTime VR.
Compressed files
When you download files, they’re probably compressed.
Windows files have a .zip extension. Macintosh files usually have
a .sit extension and are opened with StuffIt.
134
Lesson 2. Web design
I. A typical home page
In pairs, discuss these questions
1) Why do companies have websites?
2) What is the difference between a website and a web page?
3) What is a home page?
4) Do you have a blog or personal website? Describe the home page to
your partner
II. Web page design
A. Read the text and find the following
1) The language used to create web documents
2) The type of software that lets you design web pages without writing
HTML codes
3) The format invented by Adobe to distribute text files over the Internet
4) A method of displaying multiple HTML documents in the same
browser window
5) Three common graphics formats used on websites
6) Three popular formats used to store and play back video
Web page design
HTML and web editors
The code behind most web pages
is HTML (Hypertext markup
language), which consists of
commands called tags. Tags are
placed around pieces of text to tell the
135
web browser how to display text or
pictures. You can view the source
HTML code of a web page by
choosing the Page Source option in
your web browser. But you needn’t
learn HTML in order to build your
own website. Instead, you can use a
word processor with web design
capabilities or dedicated web editor
like Macromedia Dreamweaver or
Microsoft FrontPage. Web editors are
user-friendly and WYSIWYG (What
You See Is What You Get). Different
buttons and menu items let you design
a page without writing HTML
HTML files have this basic structure:
Start with
Have heading text that begins with
, which has a title enclosed
between tags and ends with
Have body text that starts with
, where you place the contents
of the actual document (i.e. text,
images, links, etc.) and ends with
End with
You can create link to other web
pages by using the tag <a href =
“filename”>active text
Web page elements
There are a number of different
elements that you can use on a web
page:
Text – displayed in a variety of
fronts and sizes. Most text files are
available in two formats: HTML of
PDF (the portable document
format that can be viewed with
Acrobat Reader).
Background – the underlying
colors and patterns of a web page
Tables – with columns and rows,
used to position images and text on
a page
Frames – rectangular areas that
allow the display of different pages
in the same browser window.
Cascading Style Sheets (CSS) – a
mechanism for adding styles to
web documents. You could use
HTML code to specify the font,
text styles and background color.
Nowadays, however, it is more
common to use CSS. This makes,
it easy to apply presentation
changes across a website.
Graphics, clip art, icons,
background templates,
wallpaper, and transparent
images – common formats are .jpg
(joint photographic experts group),
ideal for pictures with many
colors, .gif (graphics interchange
format), ideal for pictures with
fewer colors, and .png (portable
network graphics), which supports
16 million colors.
Hyperlinks – highlighted text or
pictures (buttons, image maps,
etc.) that act as links to other
pages. If you want to share
information with people, you can
use RSS feeds and provide readers
136
with a link to the feed. RSS allows
subscribers to receive updates of
blogs, news, podcasts, etc. Before
going live, you should check that
all the links work.
Audio, video and animation
Many websites now incorporate
audio files, and if you’re designing a
site, you may like to insert songs,
podcasts, etc. The most common
audio formats are .wav (Windows
wave audio format), .ra (RealAudio
file) and .mp3 (MPEG-1 Audio Layer
3).
Full-motion video is stored in these
formats: .avi (audio video interleave),
.mov (QuickTime movie) and .mpg
(moving picture experts group).
If you want to inject something
special into you web pages, you can
use Adobe Flash to include interactive
animations and streaming audio.
Additionally, you can insert Java
applets – small programs that enable
the creation of interactive files.
Animations are made up of a series of
independent pictures put together in
sequence to look like moving pictures.
To see or hear all these files, you must
have the right plug-in, an auxiliary
program that expands the capabilities
of your web browser.
B. Read the text again and then match the sentence beginnings (1-6) with
the correct ending (a-f)
1) Instructions in HTML
2) Cascading Style Sheets are the way
3) A hyperlink is any clickable text
4) A plug-in is a small program
5) Java applets are used to provide
6) RSS feeds are summaries of web content
a. Image or button that takes you to another place on the Web
b. Used for handling audio, video and animation files
c. Are called tags
d. Interactive features to web applications
e. To define the presentation of web pages, from fonts and colors to page
layout
f. Published in the Really Simple Syndication format for download
III. Language work: modal verbs
A. Underline all the modal verbs in the above text and then look at the
HELP box. Which modal verb from the HELP box does not appear in
the text? Can you think of any other modal verbs?
137
HELP box
Modal verbs
We use modal verbs to add extra
meaning to the main verb. They are
followed by infinitive without to.
Modal verbs are used in the following
ways:
To express a possibility
You can/could use Adobe Flash to
include interactive animations
You may like to insert songs,
podcasts, etc.
Can and could are often
interchangeable when talking about
possibility. May and might are used
to express weaker possibilities and
often come before the verb like to
mean It is possible you will like
To ask for permission
Can/Could/May I use your mobile
phone?
May is more formal than can or
could
To talk about ability
They are looking for artists who
can draw and design web pages
Could is the past tense of can
and is used to talk about ability in
the past
To talk about obligation or
necessity
To see or hear all these files. You
must have the right plug-in
you needn’t learn HTML in
order to build your own website
Needn’t means don’t need to or
don’t have to and is used to express
a lack of obligation
To give advice
Before going live, you should
check that all the links work
B. Complete these sentences with suitable modal verbs from the HELP box.
There may be more than one possible answer
1) With Java, I. include some attractive banners on my website
2) With a web editor, you..create a web document easily
3) These days, you.learn how to use complicated HTML codes.
Modern web design software is user-friendly and converts a visual
layout into HTML code
4) Once live, youupdate your website regularly
5) To view a PDF file, you.have Adobe Acrobat Reader
6) Websites with graphics are more inviting than those written in plain
text, so you..like to insert some graphics into your
documents.
138
7) I use your laptop? I need to print out this report.
C. In pairs, discuss at least two things
1) You can now do more easily because of the Internet
2) You could do better if you had a faster internet connection
3) That may/might happen to the Internet in the next ten years.
4) You must consider when designing a website
5) You should take into account when choosing which PC to buy.
IV. Blogs
A. In pairs, discuss these questions
1) What is a blog?
2) Which blogs do you read regularly?
B. Imagine you wanted to start your own blog. In pairs, discuss these
questions
1) Why would you start your own blog – to write a diary of your
thoughts or to share you expertise on a particular topic?
2) What types of media would you include – text, photos, video, audio
(including podcasts)?
3) Would you insert links to other blogs? Which ones?
4) Would you focus on a particular subject or have a mix of several
topics?
5) Which site would you use to host your blog?
139
MODULE 7. PROGRAMING / JOBS IN ICT
Learning objectives
In this module, you will learn how to:
Understand basic concepts in programming, and acquire vocabulary
connected with it
Recognize acronyms and abbreviations associated with programming
Ask and answer questions about computer languages
Discuss the professional skills and personal qualities required for the jobs
of senior programmer and DTP operator
Write a letter applying for a job.
140
Lesson 1. Program design
I. Warm-up
A. In pairs, try to think of an answer for the question.
What is programming?
Look at the definition in the Glossary. Is it similar to yours?
B. Complete the following definitions with the words and phrases in the
box.
the various parts of the program may occur in programs
binary numbers language a given problem
1. algorithm
The step-by-step specification of how to reach the solution..
2. flow chart
A diagram representing the logical sequence between the various parts of the
program...
3. coding
The translation of the logical steps into a programming
4. machine code
The basic instructions understood by computers. The processor operates on
codes which consist of ....................
The techniques of detecting, diagnosing and correcting errors (or ‘bugs)
which may occur in programs
II. Reading
Read the text and find answers to these questions.
1) Do computers understand human languages?
2) What are the differences between low-level and high-level languages?
3) What is an assembler?
4) What is the function of compilers?
5) What do you understand by the terms source program and object
program?
6) In the future, could computers be programmed in Spanish, French, or
Japanese?
141
Programming languages
Unfortunately, computers cannot
understand ordinary spoken English or
any other natural language. The only
language they can understand directly
is called machine code. This consists
of the 1s and 0s (binary code) that are
processed by the CPU.
However, machine code as a
means of communication is very
difficult to write. For this reason, we
use symbolic languages that are easier
to understand. Then, by using a
special program, these languages can
be translated into machine code. For
example, the so-called assembly
languages use abbreviations such as
ADD, SUB, MPY to represent
instructions. These mnemonic codes
are like labels easily associated with
the items to which they refer.
Basic languages, where the
program is similar to the machine
code version, are known as low-level
languages. In these languages, each
instruction is equivalent to a single
machine code instruction, and the
program is converted into machine
code by a special program called an
assembler. These languages are still
quite complex and restricted to
particular machines.
To make the programs easier to
write and to overcome the problem of
intercommunication between different
types of machines, higher-level
languages were designed such as
BASIC, COBOL, FORTRAN, or
Pascal. These are all problem-oriented
rather than machine-oriented.
Programs written in one of these
languages (known as source
programs) are converted into a
lower-level language by means of a
compiler (generating the object
program). On compilation, each
statement in a high-level language is
generally translated into many
machine code instructions.
People communicate instructions to
the computer in symbolic languages
and the easier this communication can
be made, the wider the application of
computers will be. Scientists are
already working on Artificial
Intelligence and the next generation of
computers may be able to understand
human languages.
III. Language work: Infinitive constructions
A. The infinitive is used:
After adjectives
- It is difficult to use machine code.
After modal verbs with to: ought to, used to
- I ought to make a back-up copy.
- Using a computer is much easier than it used to be.
After modal and auxiliary verbs without to: can, could, may, might, shall,
should, will, would, would rather, would sooner
- Unfortunately, computers can’t understand English.
- I’d rather buy a game than a spreadsheet.
B. Make sentences as in the example.
Example
Not easy/write instructions in Pascal
It is not easy to write instructions in Pascal
1) advisable/test the program under different conditions.
2) expensive/set up a data-processing area.
3) unusual for a program/work correctly the first time it is tested.
4) difficult for students/learn FORTRAN.
5) important/consider the capabilities of the programming language.
6) quite easy/write instructions in BASIC.
C. Now look again at the reading passage in Task 2. Underline the
infinitive constructions after modal verbs.
Example:
Unfortunately, computers cannot understand ordinary spoken English
D. Look at these pairs of examples and decide where there is an ‘important’
change in meaning.
1 a I remember shutting down the computer before I left
the room.
b Please, remember to buy the new program.
2 a They stopped to look at the flowchart.
b They stopped looking at the flowchart.
3 a I like studying C language.
b I like to study C language in the evenings.
4 a It has started to rain.
b It has started raining.
5 a He needs to work harder.
b This hard disk needs repairing.
Lesson 2. Languages
I. Warm-up
A. Make a list of as many computer languages as you can think of.
B. Study this table about Java and answer the questions below.
Language Date Characteristics Uses
Java
Invented by
Sun
Microsystems.
1995 Cross-platform
language that
can run on any
machine.
Small Java
programs, called
‘applets’, let you
watch animated
characters, play
music and
interact with
information.
Designed to
create Internet
applications.
When you see
a Web page
containing
Java links, a
Java program
is executed
automatically.
1. Who invented Java?
2. When was Java developed?
3. Can Java run on any computer (Mac, PC,
or UNIX workstation)?
What are Java’s small programs called?
What can you do with them?
II. Language work: Would, Revision of time clauses
A. The use of ‘would’
We use ‘would’ in conditional sentences. For example:
If you spilled coffee on the keyboard, you would damage it.
Often the condition is implied, not stated. For example:
(If I had time) I’d like to build in new links.
(If I had to make a choice) my favorite site would have to be the
Internet Movie Database.
What is the implied condition in this extract?
I would look at other sites too for good ideas.
B. Complete the gaps in this dialogue with ‘will’ or ‘would’ or the reduced
forms ‘’ll’ and ‘’d’ where appropriate.
A What ..1 you do when you finish your diploma?
B I ..2 like to take a course in multimedia.
A How long ..3 that take?
B If I choose the certificate, it ..4 take 6 months but if I
chose the master’s, it ..5 take a full year.
A What ..6 be the advantage of the master’s?
B I guess I ..7 have better job prospects.
A When ..8 you decide?
B It depends on my finals. If I do well, I ..9 go for the
master’s.
C. Link these statements using an appropriate time clause.
1 a You click the mouse pointer on the file
b It is highlighted.
2 a You cannot save a file.
b You name it.
3 a The files are transferred.
b The transfer is graphically displayed.
4 a Remove any floppies.
b You close down the computer.
5 a The OK button is clicked.
b The copying process begins.
6 a The percentage of file transferred is displayed.
b Your browser downloads from the Internet.
7 a The virus is not activated.
b You open the infected file.
8 a You repair a PC.
b Ensure the machine is disconnected.
9 a Don’t open an email attachment.
b You have virus-checked it.
10 a You add memory.
b Change the BIOS settings.
III. Speaking
Work in pairs. Student A:
IV. A short description of BASIC
Read the passage and complete it with verbs in brackets in the correct form.
BASIC is a general purpose high-level programming language,
originally designed (develop) 1 program in conversational
mode. The name BASIC (stand) 2 for Beginner’s All-
purpose Symbolic Instruction Code. This language is (find)
3 on most microcomputers because it (be) 4
user-friendly and easy to learn.
BASIC (consist) 5 of two main parts: the source
language statements – the instructions which form the program – and
the system commands which (allow) 6 us to control and
edit a program.
BASIC enables the user (interact) 7 with the program
while it is being (execute) 8, which means that data can be
(input) 9 while the program is running. Each instruction is
(give) 10 a line number which defines the logical sequence
of statements within the program. Some well-known system commands
in BASIC are: RUN, which executes a program (hold) 11 in
a BASIC file; LIST, which prints a listing of a program on the screen;
and DELETE, which (remove) 12 a program from a file.
A large number of PC manufacturers adopted BASIC. At present,
however, there (be) 13 so many versions and extensions
that programs written for one type of PC are not directly portable to
another.
Lesson 3. Jobs in ICT
I. IT professionals
Complete these definitions with jobs from the box
Software engineer Computer security
specialist
Blog administrator Help desk
technician
DTP operator Hardware engineer Network
administrator
webmaster
1) A..designs and develops IT devices
2) A..writes computer programs
3) A.edits and deletes posts made by contributors to a blog
4) A.uses page layout software to prepare electronic files for
publication
5) A..manages the hardware and software that comprise a network
6) A..designs and maintains websites
7) Aworks with companies to build secure computer systems
8) A..helps end-users with their computer problems in person,
by email or over the phone
II. Job advertisements
Discuss if you would like to apply for one of the jobs. Give reason
answers
DTP operator
Required for a leading financial
magazine
We are looking for a bright,
competent QuarkXpress operator
with at least three years’ experience
in design and layout. Skills in
Photoshop, Freehand or Illustrator an
advantage.
Ability to work in a team and to tight
deadlines is vital.
Please apply in writing, with CV and
samples of your work, to Tom
Parker, Production Manager,
Financial Monthly, Stockton Street,
London
III. A letter of application
A. Read the letter of application
below and answer these
questions
1) Which job is Sarah Brown
applying for?
2) Where did she see the
advertisement?
3) How long has she been working as a software engineer?
4) What type of programs has she written?
5) When did she spend three months is Spain?
Dear Mr Scott,
I am writing to apply for the position of Senior Programmer, which was advertised
on 28th March in The Times.
I graduated in May 2007 and did a work placement with British Gas as part of my
degree. Before taking my present job I worked for a year with NCR. I stayed in this
job (1).March 2009.
DIGITUM-UK
SENIOR PROGRAMMER required by DIGITUM-
UK, a leading supplier of business systems to the
insurance industry.
You will be able to work on the full range of software
development activities – analysis, design, coding,
testing, debugging and implementation. At least two
years’ experience of COBOL or C++ is necessary.
As we are active in Europe, fluency in French, Italian
or another European language is desirable.
Don’t miss this opportunity to learn new skills and
develop your career.
Send your CV to CHRIS SCOTT, PERSONNEL
MANAGER, DIGITUM-UK, 75 PARKSHILL
STREET, LONDON SW14 3DE
(2).the last three years I have been working as a software engineer
for Intelligent Software. I have designed four programs in COBOL for commercial
use, and (3)..January I have been writing programs in C for use in large
retail chains. These have been very successful and we have won several new
contracts in the UK and Europe on the strength of my team’s success.
Two year (4).. I spent three months in Spain testing our programs and
also made several visits to Italy, so I have a basic knowledge of Spanish and Italian.
I now feel ready for more responsibility and more challenging work, and would
welcome the opportunity to learn about a new industry.
I enclose my curriculum vitae. I
will be available for an interview
at any time.
I look forward to hearing from you
Yours sincerely,
Sarah Brown
B. Look at the HELP box and
then complete the letter with
for, since, ago or until
IV. Language work: the present perfect
A. Look at the HELP box and then choose the correct words in brackets to
complete these sentences
1) He (‘s never liked/ ‘s never been liking) Maths
2) They (‘ve worked/ ’ve been working) on the project all day
3) John (‘s used / ‘s been using) the computer for hours – he looks really
tired
4) How many emails (have you written / have you been writing) to day?
5) She (‘s written / ‘s been writing) this essay since 9 o’clock.
6) They (‘ve interviewed/ ‘ve been interviewing) five candidates today.
HELP box
Present perfect simple
We form the present perfect simple with
have/has + past participle
Present perfect continuous
We form the present perfect continuous
with have/has been + present participle
HELP box
for, since, ago, until
We use for to refer to a period of time.
I’ve lived in Liverpool for five years.
We use since to refer to a point in time
I’ve been unemployed since May 2007
We use ago with the past simple to say when
something happened. We put ago after the
time period.
I got married five years ago.
We use until to mean up to a certain time
I stayed at high school until I was 18
I’ve used Microsoft Access for many
years.
I haven’t used Microsoft Access for
years.
We use this tense to talk about:
States that started in the past and
continue to the present
Since 2006, I’ve been a computer
operator for PromoPrint
Past actions that continue to the
present, where we put an emphasis
on quantity (how many)
I have designed four programs in
COBOL
Personal experiences, especially with
ever and never.
Have you ever worked with
database?
I’ve never worked with databases.
Since January I’ve been writing
program in C
We use this tense to talk about:
Action which started in the past and
are still happening
For the last three years I’ve been
working as a software engineer of
Intelligent Software
Past actions that continue to the
present, where we put an emphasis on
duration (how long)
She’s been working all morning
Contrast with the past simple
We use the past simple to talk about
events that happened at a specific time
in the past that are now finished
I graduated in May 2007
Not: I have graduated in
I stay in this job until March 2009
Two years ago, I spent three months
in Spain
B. Make questions using these prompts. In pairs, ask and answer the
questions
1) Ever/live or work in another country?
2) Ever/ have a bad job interview?
3) Ever/do a job you hated?
4) How long/study English?
5) How long / use computers?
6) How many emails / receive today?
7) How many jobs / apply for this year?
MODULE 8. COMPUTERS TOMORROW
Learning objectives
In this module, you will learn how to:
Talk about different kinds of data communication systems: teletext, fax, local
bulletin boards and the Internet
Describe the components and functions of a computer network, in oral and
written form
Understand and discuss basic ideas about security and privacy on the Internet
Talk and write about new technologies
Understand predictions about the impact of computers on our lifestyle.
Lesson 1. Electronic communications
I. Before you read
Try to answer these questions.
1) How can a PC be connected to another computer?
2) What data communication systems can you think of? Make a list.
II. Reading
A. Match the data communication services on the left with the requirements
on the right. Then read the passage and check your answers.
1. fax
2. electronic mail (e-mail)
3. teletext
4. local bulletin board
system (BBS)
5. commercial online
service
a. To send a personal message to a friend who is
at a different workstation.
b. To send a copy of a paper document – for
instance, a scientific article – from Trento
University to Cambridge University.
c. To access massive databases containing all
kinds of information, or to be connected with
an airline reservations service.
d. To receive shareware and public domain
programs from a user group.
e. To find out weather forecasts and sports
information from the television.
Channels of communication
What are ‘telecommunications’?
This term refers to the transmission
of information over long distances
using the telephone system, radio, TV,
satellite, or computer links. Examples
are two people speaking on the phone,
a sales department sending a fax to a
client, or someone reading the teletext
pages on TV. But in the modern
world, telecommunications mainly
means transferring information from
one PC to another via modem and
phone lines (or fibre-optic cables)
What can you do with a modem?
A modem is your computer’s link
to the external world. With a modem,
you can exchange email and files with
friends and colleagues; you can access
the Web and search for information
about the stock market, current affairs,
entertainment, etc.; you can
participate in newsgroups and live
conversations; you can make bank
transactions and buy things from the
comfort of your home. You can also
access your office from your
computer at home or your laptop in a
hotel room.
Modems
Your PC is a digital device.
However, the telephone system is an
analogue device, designed to transmit
the sounds and tones of the human
voice. That’s why we need a modem –
a bridge between digital and analogue
signals. The word ‘modem’ is an
abbreviation of
Odulator/DEModulator. When a
modem modulates, it sends very rapid
on/off pulses. The computer on the
other end translates (demodulates)
those signals into intelligible text or
graphics. Modem transmission speeds
are measured in kilobits per second.
Typical speeds are 28.8, 33.6 and 56
kbps.
Today, a lot of companies find it
more efficient to have some
employees doing their work at home.
Using a modem, they transfer their
work into the office where it is printed
and distributed. The list of
applications is endless.
What do you need to
telecommunicate?
You just need a PC (or a terminal),
a modem connected to the computer
and the telephone line, and
communication software. Once you
have installed and configured your
modem, you can communicate with
people through bulletin boards and
online services.
Local bulletin boards
Bulletin board systems (BBS) are
frequently free because they are run
by enthusiasts and sponsored by user
groups or small businesses. The first
time you make a BBS connection you
are required to register your name,
address, phone number, and other
information such as the kind of
computer and modem you are using.
The person who administers the BBS
is called sysop (system operator). You
can use a BBS to download artwork,
games, and programs, or you can
participate in ongoing discussions.
You can also upload (send) programs,
but make sure they are shareware or
public domain programs.
Online service providers
To gain access to the Internet, you
must first open an account with an
Internet service provider (ISP) or a
commercial online service provider.
Both offer Internet access, but the
latter provides exclusive services.
Internet service providers usually
offer access to the Web and
newsgroups, an email address, a
program to download files from
FTP sites, and IRC software so that
you can have live chats with other
users. Most ISPs charge a flat
monthly or annually fee that gives
you unlimited access to the
Internet.
The main commercial online
services are America Online,
CompuServe, Prodigy, and the
Microsoft Network. They differ from
dedicated ISPs in two ways: (1) they
use a smooth, easy-to-use interface,
and (2) they have extra services for
members only (but they charge higher
prices). For example, they offer airline
reservations, professional forums,
online shopping, and stories for
children. They also let you search
their online encyclopedias and special
database.
B. Complete the sentences by using a term from the list. Then write the
words in the crossword.
modem network online download
newsgroups services account telephone
1. When you are connected to the
Internet, you are described as being
2. To communicate via the Internet,
you need a PC, modem, and a
3. To have access to the Internet, you must first open an
4. You need a to convert computer data into a form that can be
transmitted over the phone lines.
5. The public discussion areas on the Internet are called
6. You can use a BBS to clip-art, games, and shareware to your
PC.
7. CompuServe and America Online offer exclusive to their
customers.
8. The Internet is a global of computer networks.
III. Language work: Making predictions
A prediction is a statement about a particular subject in which we say what
we think will happen in the future. Predictions are not always absolute, but can be
expressed with different levels of certainty, according to the context in which they
are made.
a. Certainty can be expressed by:
will (definitely, certainly)
certain, sure
without a doubt, without
question
b. Probability can be expressed by:
probable, probably, likely
most/highly probable, most
probably
most/ highly likely
c. Possibility can be expressed by:
may (not), might (not), can, could
possible, possibly, perhaps
d. Improbability can be expressed by:
improbable, unlikely
doubtful, questionable
probably not
most/ highly improbable/ unlikely
most/ highly doubtful/
questionable
most probably not
e. Impossibility can be expressed by:
present or
future
cannot, could
not
not possible,
impossible
past
could not
not possible,
impossible
A. These expressions are used in sentences in different ways. For
examples:
1) Notebook computers will definitely be cheaper next year.
2) It is (highly) probable/ likely that notebook computers will be cheaper
next year.
3) Notebook computers may/ might be cheaper next year.
4) Perhaps notebook computers will be cheaper next year.
5) It is unlikely/ doubtful that notebook computers will be cheaper next
year.
6) Notebook computers will most probably not be cheaper next year.
7) Notebook computers will definitely not be cheaper next year.
8) It is impossible that notebook computers will be cheaper next year.
B. Match the if-clauses (1 to 6) to the main clauses (a to f) to make
complete sentences.
1 If you never read computer
magazines
a you would be able to access our
bulletin board.
2 If you never back up your hard
disk
b it is unlikely that you will have
a problem with computer viruses.
3 If you had a modem c we would have a bigger range
of typefaces and fonts to choose
from.
4 If you don’t copy pirated
software
d you will miss important new
products.
5 If I knew more programming
languages
e I would get a better job.
6 If we bought a better printer f you will probably lose some
important files.
C. Complete the sentences with the words in the box. Are the sentences
first (F) or second (S) conditionals?
would not
post
will be look at will get
grows wanted leave Would
need will be reduced installed
1 If you ... your VDU in direct sunlight, it ... damaged
2 If you ... your screen for too long, you... a headache.
3 If you ... to link your PCs with a mainframe, you ... to
install a network.
4 If the market for portable computers ..., prices ... even
more next year.
5 If we ... a fax machine and email facility, we ... so many
letters each day.
D. Now make up three first conditional and three second conditional
sentences of your own
Lesson 2. Internet issues
I. Warm-up
1. Try to answer these questions.
1) Is it technically possible for computer criminals to infiltrate into the
Internet and steal sensitive information?
2) What is a hacker?
3) Can viruses enter your PC from the Internet?
2. Match these texts with the correct pictures.
1. Web browsers warn you if the
connection is not secure; they
display a message when you try
to send personal information to a
server.
2. Private networks use a software
and hardware mechanism, called a
‘firewall’, to block unauthorized
traffic from the Internet.
3. You have to type your user name
and password to access a locked
computer system or network
4. An open padlock in Netscape
Communicator indicates the page
is not secure; a closed padlock
indicates the page is encrypted.
a
b
c
d
II. Reading
A. Read the text on the following page and find answers to these questions.
1) Why is security so important on the Internet?
2) What security features are offered by Netscape Communicator and
Internet Explorer?
3) What security standard is used by most banks to make online
transactions secure?
4) How can we protect and keep our email private?
5) What methods are used by companies to make internal networks
secure?
6) Which ways can a virus enter a computer system?
Security and privacy on the Internet
There are a lot of benefits from an
open system, like the Internet, but we
are also exposed to hackers who break
into computer systems just for fun, as
well as to steal information or
propagate viruses. So how do you go
about making online transactions
secure?
Security on the Web
The question of security is crucial
when sending confidential
information such as credit card
numbers. For example, consider the
process of buying a book on the Web.
You have to type your credit card
number into an order form which
passes from computer to computer on
its way to the online bookstore. If one
of the intermediary computers is
infiltrated by hackers, your data can
be copied. It is difficult to say how
often this happens, but it’s technically
possible.
To avoid risks, you should set all
security alerts to high on your Web
browser, Netscape Communicator,
and Internet Explorer display a lock
when the Web page is secure and
allow you to disable or delete
‘cookies’.
If you use online bank services,
make sure your bank uses digital
certificates. A popular security
standard is SET (secure electronic
transactions).
Email privacy
Similarly, as your email message
travels across the net, it is copied
temporarily on many computers
Các file đính kèm theo tài liệu này:
- giao_trinh_anh_van_chuyen_nganh_p2_1744.pdf