ITU IT Computer Science
ITU IT Computer Science
Let’s start with some computer related words in order to improve your English language skills
in the field of CIT (Computer & Information Technology).
The Career Timeline supplies a checklist of helpful actions for assuring greater success during
the 6 phases of your career:
- beginning in college and
- continuing through your retirement.
Make sure to:
- reflect on each phase,
- set your goals, and
- frequently re-evaluate yourself to keep your career plan current.
Computer & information research scientists
Median Salary: $126,830
Minimum Degree Required: Master's
Most Relevant Major(s): - Computer Science
- Computer Engineering
Years of Experience Required: 0
Computer and information research scientists apply computing skills to solve problems in
diverse industries.
They design new algorithms and computing languages.
Computer and information research scientists also conduct experiments on software
systems.
Depending on their specialization, they manage:
- big data,
- machine learning, and
- artificial intelligence projects.
Computer hardware engineers
Median Salary: $119,560
Minimum Degree Required: Bachelor's
Most Relevant Major(s): - Computer Engineering;
- Computer Science;
- Electrical Engineering
Years of Experience Required: 0
Computer hardware engineers design computer components, including:
- circuit boards,
- memory devices, and
- processors.
They research and develop new hardware, working closely with other:
- engineers and
- developers.
Computer hardware engineers then:
- test the hardware and
- oversee (=superviser) the manufacturing of new computer systems.
Computer network architects
Median Salary: $116,780
Minimum Degree Required: Bachelor's
Most Relevant Major(s): - Computer Science;
- Information Systems
Years of Experience Required: 5
Software developers:
- design and
- create
software programs that run networks or perform tasks.
They: - determine how parts of an application will work together,
- supervise programmers writing parts of the code, and
- conduct testing.
Software developers also oversee maintenance and upgrades.
Information security analysts
Median Salary: $103,590
Minimum Degree Required: Bachelor's
Most Relevant Major(s): - Computer Science;
- Information Assurance;
- Information Technology
Years of Experience Required: < 5 years
Computer programmers write the code that tells computers how to run applications or
software programs.
Programmers specialize in a variety of computer languages, including:
- Java,
- C++,
- Python, and
- JavaScript.
They work with software developers to:
- create and
- test code.
Network & computer systems administrators
Median Salary: $84,810
Minimum Degree Required: Bachelor's
Most Relevant Major(s): - Computer Science;
- Information Technology;
- Computer Engineering
Years of Experience Required: 0
Before enrolling in a computer science program or bootcamp* consider learning more about
the field through computer science blogs and podcasts.
People pursuing computer science career paths should also evaluate their:
- strengths and
- professional goals
to find the right role for their unique needs.
*Bootcamps are short term, intense training sessions (=cours intensif accéléré) designed to
prepare students for the practical reality of development.
4
Agreeing With People:
When we're talking in conversation with others, it's useful to have phrases
that you can use to show agreement with what another person has said.
I'm with you on that one.
I couldn't agree more.
(Yes), Absolutely/Exactly
I'd go along with that.
You've got a point there.
Hear, hear! (to show approval for an argument that has just been made or to congratulate its author)
I think so too.
I couldn't have put it better myself.
Great minds think alike.
You took the words right out of my mouth.
I agree with you 100 percent.
I couldn't agree with you more.
That's so true/That's for sure.
Tell me about it! (slang)
You're absolutely right.
That's exactly how I feel.
I'm afraid I agree with James.
I have to side with Dad on this one.
No doubt about it.
Me neither. (agree with negative statement)
I suppose so./I guess so. (weak)
You have a point there.
I was just going to say that.
READING ASSIGNMENT
First, to develop your reading skills, read the text on “IT Terms” that you should know.
Then feel free to use these terms the next time you have a conversation about IT.
Enjoy learning!
Terms Entry-Level IT Professionals Should Know
1. Adaptive Technology is a set of tools or products created to help people with disabilities
in order for them to work efficiently and productively. It is related to assistive technology,
which consists of products and services that would allow people with disabilities to use
existing technology to accomplish tasks.
Technology should help everyone do his or her own work and be more independent.
Disabilities should not hinder people from being a contributing member of the workforce.
What's more, the law states that employers should not discriminate against people with
disabilities and that they should make reasonable adjustments to accommodate these
people.
2. Agile Development is a set of processes for creating software that includes being creative
and flexible in software development. This means that the code is kept simple, is tested
often, and, instead of waiting for everything to be finished, incremental but functional parts
of the software are released as soon as they are ready. These modules are functional and
will be able to help users do some work.
Businesses today have different needs, and because of the ever-changing demands coming
from new technologies and customers, you need to be very flexible in addressing these
needs and demands. Agile development allows you to bring a quality and functional product
more quickly. And because agile development puts more focus on individuals and their ideas
rather than tools and processes, it creates a better understanding between IT and business
leaders.
3. Big Data describes the phenomenal growth, use, and accessibility of information. This
comes from a lot of sources such as social media updates, search data, multimedia content,
and even climate information, among others. As such, it could be structured or
unstructured. Big data could also mean the rise of new tools to analyze all the data available
to you.
Because of the size and complexity of big data, it is not possible to understand it using old
data processing applications and other traditional tools. But to ignore big data is a mistake
for organizations. For one, it allows you to have all the information you need in order to
know where you should take your business next, as well as which innovations you should
look out for. It can also assist businesses in mass personalization: the ability to tailor services
and information being presented to each customer or user.
4. Business Intelligence (BI) refers to an array of software and tools that businesses can use
to analyze raw data. It includes data mining, analysis, and reporting.
Business intelligence allows you to cut costs, make better business decisions, and even come
up with new opportunities for your business. For IT professionals, these tools and software
free them up from having to do all the work in pulling up data and information for business
managers.
5. BYOD (Bring Your Own Device) describes company policy or strategy that allows employees
to use their personally owned devices, such as smartphones, tablets, and laptops to access
work-related information, software, and applications, while still getting IT support for these
devices.
BYOD brings about a lot of benefits to businesses that implement it. For one, it allows their
employees to be more flexible and responsive. Plus, employees using a device that they are
already familiar with can also free up IT resources and cut IT costs. But there is still a need to
effectively manage personal devices used in business to mitigate security risks.
6. Cloud Computing is an umbrella term that includes products, services, and platforms that
allow businesses and other users to access computing resources that are delivered to them
over the Internet or other networks.
Businesses stand to gain a lot from cloud computing. It allows businesses to save on costs,
bring projects to the market in a lot less time, and enables them to effectively manage
resources by allowing them to scale according to their needs. For IT personnel, cloud
computing could free you from having to manage and administer these systems yourself,
leaving you more time to focus on things that matter. You will also be working with experts
from the cloud service provider. As more and more businesses are looking to the cloud, IT
personnel should acquire the skills to properly implement these systems.
7. Content Management is a collection of tools, software, and processes that allow you to
collect, manage, and publish information on any medium. Content management also
ensures that whatever content you have is indexable or searchable, making it easy for users
to find that information. It also encompasses deletion of content.
Content management can make or break an organization's success. You get to control the
information that other people get to access. As such, being an IT professional, you would be
expected to know effective content management strategies as well as the tools and software
to implement these.
9. Crowdsourcing means the outsourcing of your tasks to, well, a crowd of people. That is,
you will have a loosely defined group, which will do the work for you.
Crowdsourcing takes away the task that you have to do in-house or by using an employee
and letting a bigger group of people do it. In IT, crowdsourcing usually involves the general
public. Crowdsourcing is a good way to gain a bigger work force or gain specific skill sets to
make your product or service even better. An example where crowdsourcing works perfectly
is in your website's content. In an age where unique content is vital, you could use
crowdsourcing to come up with great content for your site. You can ask people to rate or
review your products, or they could write posts for you. Another example would be its utility
with a new software or service. When Google first came out with Chrome, they invited
users to check out a beta version of the product and asked them to report errors and
suggest more functionality.
12.Disaster Recovery is your business' ability to continue working after a catastrophe has
occurred. The catastrophe could be in the form of a computer virus or a hacker attack, a
fire, or even natural disasters such as earthquakes and floods. This is closely related to
business continuity, which allows your business to continue operating even during such
catastrophes. Just think about this: IT downtime is the reason why businesses lose on
average $300,000 for only one hour of downtime. So can you just imagine how much money
a business would lose in the event a natural calamity strikes or your system gets attacked by
cybercriminals? IT fuels much of today's business operations and, as such, a big part of any
disaster recovery plan that involves or is even more focused on IT and its resources.
13.Disaster Recovery as a Service (DRaaS) is implementing your disaster recovery policies
and procedures with the help of the cloud. DRaaS is not just merely backing up your data on
the cloud, but you can also tap computing power from your cloud provider so that you could
more or less have a virtual machine where you could continue to operate from. Merely
backing up your data would mean that you can just download the latest backup when
disaster strikes. If you have lost your computers and network during the disaster, you will
need to buy before you could continue to operate. DRaaS takes care of that, which reduces
the delay in getting back on your feet. As more and more go to the cloud, more and more
businesses are also realizing the benefits of doing so. With disaster recovery and business
continuity becoming a vital part of every business, IT professionals would need to learn how
to leverage DRaaS and still keep it cost-effective for the company. Tech professionals would
need to ensure that data put on the cloud is secured, and accessible whenever it is needed.
But they also have to balance these with the costs.
15.Enterprise Architecture is basically a function that helps businesses find out how to
implement the best strategies for its development. Think of it as a business' blueprint for
success. IT is one of the resources that is managed in enterprise architecture. People,
operations, and information are the other three.
22.Biometrics is an important IT term that refers to the physical characteristics that are unique
to the user. This can include facial recognition, fingerprints, and voice recognition. These are
individual characteristics of the user that are used as account or user verification, typically in
line with traditional passwords.
Biometrics are being used in both the workplace as well as in consumer electronics as an
additional step in account protection and verification. IT professionals who are able to
integrate biometrics are in high demand.
23.Wearables is an IT term that refers to wearable technology. This includes devices like
smartwatches and fitness bands. These devices are usually paired with a smartphone or
other device that has access to the internet, but there are some devices that do not require
a parent device to function.
Wearables are a growing trend that make modern technology accessible and fashionable.
The development of these products poses a few hurdles for IT professionals. If you are
based in security and protection of information, it is important to see the security risks that
wearables pose so you can best guard the information you are paid to protect.
If you are dealing with product creation and development, wearables are a growing trend.
Being able to include technology in accessible and stylish ways is in high demand.
24.GUI is a common IT terminology that stands for Graphical User Interface, or “gooey.” It is an
interface that is based in graphic design and audio indicators. This is different than a text-
based interface. For most web-based designs and applications, GUI is the king. Knowing
how to make and manage a functioning GUI is essential for many fields.
25.Open Source programs include access to their source code, which allows for customization
in a collaborative public manner.
Open-source programs and products are valuable tools to IT professionals because they give
you direct access to other professionals’ experience and expertise. These programs are more
motivated by accessibility and productivity rather than monetization. Often they are created
by communities that are banding together to get the product developed that they all need,
rather than a single individual producing and coding a product alone.
26.Machine Learning is the ability of a program to develop and progress in a specific task
without using explicit instructions, allowing the program to rely on patterns and inference
instead. Machine learning allows for a machine or program to develop and create a solution
on its own once limitations and standards are set, rather than simply following programing.
Machine learning takes some development and problem-solving away from the
programming team and instead puts it on the machine to produce the desired results. This
means that IT professionals need to understand algorithms and automation when dealing
with machine learning to best facilitate what the machine is trying to accomplish.
Machine learning is also an important key to AI. IT is one thing to have a programmable AI
that responds the same way in every circumstance, but with machine learning, the AI is able
to assess and develop new solutions to become something more than it was originally
developed for without human intervention. [plural sight]