0% found this document useful (0 votes)
4 views93 pages

English For IT

The document outlines a course titled 'English for IT,' which includes various units covering topics such as digital living, computer essentials, and internet security. It aims to equip learners with the necessary skills to understand IT-related materials in English, emphasizing the importance of English in the IT field. The course consists of 45 theoretical lessons, with assessments based on continuous evaluation and a final exam.

Uploaded by

nvantai999p
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views93 pages

English For IT

The document outlines a course titled 'English for IT,' which includes various units covering topics such as digital living, computer essentials, and internet security. It aims to equip learners with the necessary skills to understand IT-related materials in English, emphasizing the importance of English in the IT field. The course consists of 45 theoretical lessons, with assessments based on continuous evaluation and a final exam.

Uploaded by

nvantai999p
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 93

27/01/2022

English for IT
Introduction

 Unit 1: Living in the digital age


 Unit 2: Computer essentials
 Unit 3: Type, click and talk
 Unit 4: The operating system (OS)
 Unit 5: Spreadsheets and databases
 Unit 6: The Internet and email
 Unit 7: The Web + Web design
 Unit 8: Internet security
 Unit 9: Graphics and design
 Unit 10: Multimedia
 Unit 11: Program design and computer languages
 Unit 12: Jobs in ICT
 Unit 13: Communication systems
 Unit 14: New technologies

2
27/01/2022

Mục tiêu
 Cung cấp kiến thức và kỹ năng cần thiết để đọc
hiểu các tài liệu chuyên ngành Công nghệ thông tin
 Bổ trợ ngữ pháp và trang bị vốn từ vựng về một số
chủ đề cơ bản thuộc lĩnh vực CNTT

Phân bố thời gian và đánh giá


 Tổng số: 45 tiết lý thuyết chia thành 15 bài học.
 Mỗi bài học gồm 3 phần: củng cố ngữ pháp; từ mới; đọc
dịch chuyên ngành.
 Điểm quá trình: điểm bài tập lớn + điểm kiểm tra giữa
kỳ + điểm chuyên cần
 Điểm học phần: 50% điểm quá trình + 50% điểm thi hết
môn

4
27/01/2022

Vì sao dân IT cần học Tiếng Anh?


 Ngôn ngữ lập trình phát triển dựa trên tiếng Anh
 Cập nhật công nghệ mới nhất một cách nhanh nhất
 Đọc tài liệu, bản hướng dẫn bằng tiếng Anh
 Tham gia các khoá học, tập huấn bởi các chuyên gia nước
ngoài/ ở nước ngoài
 Cơ hội du học/ việc làm ở nước ngoài

Lesson 1
Living in a digital age

6
27/01/2022

Match the captions (1- 4) with the pictures (a-d).


1. In education, computers can make all the difference_____
2. Using a cashpoint, or ATM..........
3. The Internet in your pocket..........
4. Controlling air traffic______

Các cụm từ - Collocations


 Collocation là một cụm gồm 2 hay nhiều từ thường
hay đi cùng với nhau theo trật tự.
 Collocation không có quy tắc hay công thức cụ thể
 ghi nhớ.

8
27/01/2022

Các cụm từ - Collocations


 Một số collocations thường gặp có cấu trúc verb + noun:
access the Internet: truy cập internet
perform operations: thực hiện phép tính
do research tìm kiếm
make calls gọi điện thoại
send texts gửi tin nhắn
display data hiển thị dữ liệu
write letters viết thư
store information lưu trữ thông tin
complete exercises hoàn thành bài tập
carry out transactions thực hiện giao dịch

The digital age


1 We are now living in what some people call the digital age, meaning that
computers have become an essential part of our lives. Young people who have grown
up with PCs and mobile phones are often called the digital generation. Computers help
students to perform mathematical operations and improve their maths skills. They
5 are used to access the Internet, to do basic research and to communicate with other
students around the world. Teachers use projectors and interactive whiteboards to
give presentations and teach sciences, history or language courses. PCs are also
used for administrative purposes - schools use word processors to write letters, and
databases to keep records of students and teachers. A school website allows
10 teachers to publish exercises for students to complete online. Students can also
enroll for courses via the website and parents can download official reports.

Mobiles let you make voice calls, send texts, email people and download
logos, ringtones or games. With a built-in camera you can send pictures and make
video calls in face-to-face mode. New smartphones combine a telephone with web
15 access, video, a games console, an MP3 player, a personal digital assistant (PDA) and
a GPS navigation system, all in one.

10
27/01/2022

The digital age (2)


17 In banks, computers store information about the money held by each
customer and enable staff to access large databases and to carry out financial
transactions at high speed. They also control the cashpoints, or ATMs (automatic
teller machines), which dispense money to customers by the use of a PIN-protected
21 card. People use a Chip and PIN card to pay for goods and services. Instead of using
a signature to verify payments, customers are asked to enter a four-digit personal
identification number (PIN), the same number used at cashpoints; this system
makes transactions more secure. With online banking, clients can easily pay bills and
transfer money from the comfort of their homes.

26 Airline pilots use computers to help them control the plane. For example,
monitors display data about fuel consumption and weather conditions. In airport
control towers, computers are used to manage radar systems and regulate air traffic.
On the ground, airlines are connected to travel agencies by computer. Travel agents
use computers to find out about the availability of flights, prices, times, stopovers and
31 many other details.

11

1 Find the words (1-10)in the text above. Can you guess the meaning from
context? Are they nouns, verbs, adjectives or adverbs? Write n, v, adj or adv next
to each
1 perform (line 4)........ 5 digital (line 15)..........
2 word processor (line 8).......... 7 store (line 17)..........
3 online (line 10).......... 8 financial (line 18)..........
4 download (line 11).......... 9 monitor (line 27)..........
6 built-in (line 13).......... 10 data (line 27)..........

2 Match the words in D (1-10) with the correct meanings (a-j).


a keep, save.......... g collection of facts or figures..........
b execute, do.......... h describes information that is recorded or
с monetary.......... broadcast using computers..........
d screen.......... i program used for text manipulation..........
e integrated.......... j copy files from a server to your PC or
f connected to the Internet.... mobile…..

12
27/01/2022

Match the verbs (1-5) with the nouns (a-e) to


make collocations
1. give a. money
2. keep b. a PIN
3. access c. database
4. enter d. presentations
5. transfer e. records

13

Use collocations to complete these sentences:


1. Thanks to Wi-Fi, it’s now easy to …………………………..…………………….... from cafes,
hotels, parks and many other public places.
2. Online banking lets you ………………………………………… between your accounts
easily and securely.
3. Skype is a technology that enable users to ……………………….… over the
Internet for free.
4. In many universities, students are encouraged to …………………………………………..
using PowerPoint in order to make their talks more visually attractive.
5. The Web has revolutionized the way people ………………………….... – with sites
such as Google and Wikipedia, you can find the information you need
in seconds.
6. Cookies allow a website to ……………………………………….... on a user’s machine
and later retrieve it; when you visit the website again, it remembers
your preferences.
7. With the latest mobile phones, you can ………………………... with multimedia
attachments – pictures, audio, even video.

14
27/01/2022

LESSON 2

COMPUTER ESSENTIALS

2
27/01/2022

What is a computer?
A computer is an electronic machine which can accept data in a certain
form, process the data, and give the results of the processing in a specified
format as information.
First, data is fed into the computer's memory. Then, when the program is run,
the computer performs a set of instructions and processes the data. Finally, we
can see the results (the output) on the screen or in printed form (see Fig.
1below).
A computer system consists of two parts: hardware and software. Hardware is
any electronic or mechanical part you can see or touch. Software is a set of
instructions, called a program, which tells the computer what to do. There are
three basic hardware sections: the central processing unit (CPU), main memory
and peripherals.
Perhaps the most influential component is the central processing unit. Its
function is to execute program instructions and coordinate the activities of all the
other units. In a way, it is the 'brain' of the computer. The main memory (a
collection of RAM chips) holds the instructions and data which are being
processed by the CPU. Peripherals are the physical units attached to the
computer. They include storage devices and input/output devices.

4
27/01/2022

What is a computer?
Storage devices (hard drives, DVD drives or flash drives)
provide a permanent storage of both data and programs. Disk
drives are used to read and write data on disks. Input devices
enable data to go into the computer's memory. The most common
input devices are the mouse and the keyboard. Output devices
enable us to extract the finished product from the system. For
example, the computer shows the output on the monitor or prints
the results onto paper by means of a printer.
On the rear panel of the computer, there are several ports
into which we can plug a wide range of peripherals - a modem, a
digital camera, a scanner, etc. They allow communication between
the computer and the devices. Modern desktop PCs have USB
ports and memory card readers on the front panel.

6
27/01/2022

B Listen again and decide whether these sentences


are true or false. Correct the false ones.
1. A mainframe computer is less powerful than a PC.
2. A mainframe is used by large organizations that need to
process enormous amounts of data.
3. The most suitable computers for home use are desktop PCs.
4. A laptop is not portable.
5. Laptops are not as powerful as desktop PCs.
6. Using a stylus, you can write directly onto the screen of a
tablet PC.
7. A Personal Digital Assistant is small enough to fit into the
palm of your hand.
8. A PDA does not allow you to surf the Web.

8
27/01/2022

Classifying
 Some typical expressions for classifying are:
... are classified into X types/categories
... are classified by ...
... can be divided into X types/categories
Digital computers can be divided into five main types: mainframes,
desktop PCs, laptops, tablet PCs and handheld PDAs.
... include(s)...
... consist(s) of...
The basic configuration of a mainframe consists of a centraI system
which processes immense amounts of data very quickly.
There are X types/classes of...
X is a type of...
A tablet PC is a type of notebook computer.

Use suitable classifying expressions to complete


these sentences.
1. A computer ................... hardware and software.
2. Peripherals ................. three types: input, output and
storage devices.
3. A word processing program ………… software which lets
the user create and edit text.
4. …………. of network architecture, peer-to-peer, where all
computers have the same capabilities, and client-server
(e.g. the Internet), where servers store and distribute
data, and clients access this data.

10
27/01/2022

Unit 3
Type, click and talk

Read the description of input devices and then label the pictures
(1- 8) with words from the text.
Input devices are the pieces of hardware which allow us to enter information
into the computer. The most common are the keyboard and the mouse. We
can also interact with a computer by using one of these: a light pen, a
scanner, a trackball, a graphics tablet, a game controller or a microphone.

2
27/01/2022

Describing functions and features


 for + gerund
This is a device for controlling the cursor and selecting items on the screen.
FUNCTIONS

 used + to + infinitive
It's used to control
 relative pronoun + verb
This is a device which controls ...
 relative pronoun + used + to + infinitive
This is a device which/that is used to control
 work by + gerund
 It works by detecting light from the computer screen.
An optical mouse has an optical sensor instead of a ball underneath.
FEATURES

It usually features two buttons and a wheel.


You can connect it to a USB port.
A wireless mouse works/operates without cables.
It allows the user to answer multiple-choice questions and...

4
27/01/2022

Use the notes to write a


description of the Sony
PlayStation 3 controller

 This is a device for Ving…


 It's used to V…
 It has …
 It features …
 It works/operates …
 It allows the user to V

6
27/01/2022

MOUSE ACTIONS
control the cursor and move around the screen
A mouse allows you to (1)………………….
very quickly. Making the same movements with the arrow keys on the keyboard
would take much longer. As you (2) ………………
move the mouse on your desk, the pointer
on the screen moves in the same direction.The pointer usually looks like an l-bar,an
arrow, or a pointing hand, depending on what you are doing.
A mouse has one or more buttons to communicate with the computer. For
example, if you want to place the insertion point or choose a menu option, you just
click (press and release) on the mouse button, and the option is chosen.
(3) …………..
select text and items on the screen. You can
The mouse is also used to (4) ……………..
highlight text to be deleted, copied or edited in some way.
The mouse is widely used in graphics and design. When you want to move an
image, you position the pointer on the object you want to move, press the mouse
button, and (5) ……………..
drag the image to a new location on the screen. Similarly, the
mouse is used to change the shape of a graphic object. For example, if you want to
convert a square into a rectangle, you (6) grab
……………. one corner of the square and
stretch it into a rectangle.
The mouse is alsoused to start a program or open a document: you put the
double-click on the name - that is, you rapidly
pointer on the file name and (7) …………………………
press and release the mouse button twice.

8
27/01/2022

6/ Speech recognition systems


A Listen to an interview with Anne Simpson, an expert in voice input
technologies and tick () the features she mentions.
Speech recognition systems:
 need a good sound card and a microphone.
 can take dictation with accuracy.
 allow you to create and compile a computer program.
 allow you to execute programs and navigate around menus using
voice commands.
 allow you to surf the Web by speaking.
 allow you to design graphics.

6/ Speech recognition systems


B Listen again and answer these questions.
1. What do people usually use to communicate with a computer?
2. How do you get the best results from speech recognition software?
3. What rate of accuracy is possible with the software?
4. How can you train the software to be more accurate?
5. What kinds of words aren't in the software's dictionary?

10
27/01/2022

UNIT 4

The operating system (OS)

Read the text below and complete it with the phrases in the Box
applications software operating system
software system software

The set of program instructions that tell the computer what to do is


known as (1)__________. It can be classified into two basic categories:
• The (2)_________________, which includes all the programs that
control the basic functions of a computer (e.g. operating systems,
programming software, device drivers and utilities).
• the (3)__________________, which comprises programs that let you do
specific tasks. Typical applications include word processing, databases,
educational programs, email and video games.
The (4)________________ is a set of programs that control the hardware
and software resources of a computer system. Typical functions include
handling input/output operations, running programs and organizing files
on disks.

2
27/01/2022

GUI operating systems (1)


The term user interface refers to the standard procedures that the user follows in
order to interact with a computer. In the late 1970s and early 80s, the way users accessed
computer systems was very complex. They had to memorize and type a lot of commands
just to see the contents of a disk, to copy files or to respond to a single prompt. In fact, it
was only experts who used computers, so there was no need for a user-friendly interface.
In 1984, Apple produced the Macintosh, the first computer with a mouse and a
graphical user interface (GUI). Macs were designed with one clear aim: to facilitate
interaction with the computer. A few years later, Microsoft launched Windows, another
operating system based on graphics and intuitive tools. Nowadays, computers are used by
all kinds of people, and as a result there is a growing emphasis on accessibility and user-
friendly systems.
A GUI makes use of a WIMP environment: windows, icons, menus and pointer. The
background of the screen is called the desktop, which contains labeled pictures called
icons. These icons represent files or folders. Double-clicking a folder opens a window
which contains programs, documents, or more nested folders. When you are in a folder,
you can launch a program or document by double-clicking the icon or you can drag it to
another location. When you run a program, your PC opens a window that lets you work
with different tools. All the programs have a high level of consistency, with similar
toolbars, menu bars, buttons and dialog boxes. A modern OS also provides access to
networks and allows multitasking, which means you can run several programs - and do
various tasks - at the same time.

GUI operating systems (2)


The most popular operating systems are:
■The Windows family - designed by Microsoft and used on most PCs. The most recent
version is Windows Vista.
■Mac OS - created by Apple and used on Macintosh computers.
■Unix - a multi-user system, found on mainframes and workstations in corporate
installations.
■Linux - open-source software developed under the GNU General Public License. This
means anybody can copy its source code, change it and distribute it. It is used in
computers, appliances and small devices.
■Windows Mobile - used on most PDAs and smartphones (PDAs incorporating mobile
so phones).
■Palm OS - used on Palm handheld devices.
■RIM - used on BlackBerry communication devices. Developed by Research In Motion.
■The Symbian OS - used by some phone makers, including Nokia and Siemens.
These computer platforms differ in areas such as device installation, network
connectivity or compatibility with application software.

4
27/01/2022

D Translate these terms and expressions into your own


language. Use a dictionary or the Internet to help you.
1. user interface (line 1) ........................... • Prompt (7)
2. procedures (line 2) ........................... • Launch (14)
3. commands (line 6) ........................... • Graphics (15)
• Accessibility (18)
4. tools (line 16) ........................... ..............
• Multitasking (32)
5. desktop (line 21) ........................... .........
• Appliance (46)
6. nested folders (line 25) ........................
• Platform (56)
7. launch a program (line 26) ...................
8. source code (line 45) ............................

Read the text on page 64 and decide which adjectives


in the box best describe a GUI

user-friendly slow accessible text-based


intuitive complex graphics-based

6
27/01/2022

Answer the questions:


1. What kinds of OS was used in the early 80s: text-based or
graphic-based?
2. What is the contribution of Macintosh computers to the
development of graphic environments?
3. What does the acronym WIMP stand for?
4. How do you run a program on a computer with a graphical
interface?
5. What is multitasking?
6. Which multi-user OS is used on large, powerful computers?
7. What is the benefit of using open-source software, for
example Linux?
8. Which Microsoft platform is used for pocket PCs, mobiles
and portable media centres?

Label the interface features (a-j) on the screenshot of Apple's Mac


OS X operating system with words in bold from this list.

8
27/01/2022

Listen and complete this fact file


Windows Vista
Other features Internet Security Windows program
editions
(1) …………is designed The user interface Internet Explorer is
The most popular is
for users with basic has been redesigned more reliable and still (8) …………. a
needs, such as email with new icons and a secure. suite that includes
and internet access. new (4) …………. The Security Centre the (9) …………. ,
Home Premium is for It offers support for includes an Word; an email
advanced home the latest (6)………..…. program program; the Excel
computing and (2) technologies from called Windows spreadsheet
………….. DVD creation to Defender, and a program; and the

The Business Edition (5)..…………. firewall that protects (10)…….…. program,


is ideal for (3) …………. your computer from PowerPoint.
(7) ………….
The Ultimate Edition
is the most complete.

10
27/01/2022

COUNTABLE NOUNS UNCOUNTABLE NOUNS

• Danh từ đếm được là người hoặc • Danh từ không đếm được là vật mà ta
vật mà chúng ta có thể đếm được. không thể đếm được; không có dạng số
Chúng có dạng số ít và số nhiều (ví nhiều (ví dụ software, music, robotics,
dụ file, program, system, multimedia, networking, storage)
application) A lot of software these days is open-source.
• Danh từ đếm được bắt buộc phải Not: A lot of softwares these days are open-
có mạo từ đi kèm (a, an, the, my, source.
this…) ở thể số ít, không bắt buộc • a/an không được sử dụng với những danh
ở thế số nhiều. từ không đếm được.

• Một số danh từ đếm được trong tiếng Việt nhưng lại không đếm được trong
tiếng Anh, và được sử dụng với động từ số ít (ví dụ: advice, damage, equipment,
furniture, research, news, progress, homework)
• Không sử dụng the với danh từ không đếm được hoặc số nhiều của danh từ
đếm được
I like music (Not: I like the music)
Computer programs are expensive (NOT: The computer programs are expensive)
• Many, few, a few chỉ đi với những danh từ đếm được. Much, little, a little, a
great deal of chỉ đi với danh từ không đếm được.

11

B. Complete this text with a, an, the or nothing.


Linux is (1)______operating system and it was initially created as (2)______ hobby
by a young student, Linus Torvalds, at the University of Helsinki in Finland. Version
1.0 of the Linux Kernel* was released in 1994. (3)_______Kernel, at the heart of
all Linux systems, is developed and released under GNU General Public License,
and its source code is freely available to everyone.
Apart from the fact that it’s freely distributed, (4)______ Linux’s functionality,
adaptability and robustness has made it the main alternative for proprietary Unix
and Microsoft operating systems. IBM, Hewlett-Packard and other giants of the
computing world have embraced Linux and support its ongoing development.
More than (5 )_______ decade after its initial release, Linux is being adopted
worldwide, primarily as (6)_______ server platform. Its use as a home and office
desktop operating system is also on the rise. The operating system can also be
incorporated directly into (7)_______ microchips in a process called (8)________
embedding, and it is increasingly being used this way in appliances and devices.

*The Kernel provides a way for software and other parts of the OS to
communicate with hardware.

12
27/01/2022

UNIT 5

Spreadsheets and databases

B - Look at the worksheet and label a, b and с with column, row and
cell.

This worksheet shows the income and


expenses of a company. Amounts are
given in $ millions. The terms worksheet
and spreadsheet are often used
interchangeably. However, technically, a
worksheet is a collection of cells
grouped on a single layer of the file. A
spreadsheet refers to both the computer
program that displays data in rows and
columns, and to the table which displays
numbers in rows and columns.

2
27/01/2022

D - Listen again and decide whether these sentences are true or false.
Correct the false ones.
1. A spreadsheet displays information in the form of a table with
a lot of columns and rows.
2. In a spreadsheet you can only enter numbers and formulae.
3. You cannot change the width of columns.
4. Spreadsheet programs can generate a variety of charts and
graphs.
5. Spreadsheets cannot be used as databases.

2. In a spreadsheet you can enter text, numbers and formulae.


3. You can change the width of columns.
4. Spreadsheet can be used at database.

E - Look at the worksheet


and decide whether these
sentences are true or false.
Correct the false ones.

1. The value of the cell C12 is the result of applying the formula C5 – C10.

2. The value of cell B5 is the result of adding the value in cells B2 and B3.

3. If you type the value 800 in C3, the value in cells C5 and C12 will be
recalculated.

4
27/01/2022

DATABASES

A database is a collection of related data, and the software used in


databases to store, organize and retrieve the data is called the database
management system, or DBMS. However, we often use the word database to
cover both meanings. A database can manage any type of data, including text,
numbers, images, sound, video and hyperlinks (links to websites).
Information is entered into the database via fields. Each field holds a
separate piece of information, and the fields are grouped together in records.
Therefore, a record about an employee might consist of several fields which
give their name, address, phone number, date of birth, salary and length of
employment with the company.
Records are grouped together into files which hold large amounts of
information. Files can easily be updated - you can always change fields, add
new records or delete old ones. An electronic database is much faster to
consult and update than a card index system and occupies a lot less space.
With the right software, you can keep track of stock, sales, market trends,
orders and other information that can help your company stay successful.

6
27/01/2022

DATABASES
A database program lets you create an index - a list of records ordered
according to the content of certain fields. This helps you to search the database
and sort records into numerical or alphabetical order very guickly. Modern
databases are relational - that is, they are made up of related files: customers and
orders, vendors and purchases, students and tutors, etc.Two database files can be
related as long as they have a common field. A file of students, for example, could
include a field called Tutor ID and another file with details of the tutors could
include the same field. This key field can be used to relate the two files. Databases
like Oracle, DB2 and MySQL can manage these relationships.
A database query function allows you to extract information according to
certain conditions or criteria. For example, if a managing director wanted to know
all the customers that spend more than €8,000 per month, the program would
search on the name field and the money field simultaneously.
The best database packages also include network facilities, which can make
businesses more productive. For example, managers of different departments can
have direct access to a common database. Most aspects of the program can be
protected by user-defined passwords and other security devices. For example, if
you wanted to share an employee's personal details but not their commission,
you could protect the commission field.

D. Complete these statements about databases using


information from the text.

1. A database management system is used to……

2. Information is entered into a database via ...

3. Each field holds ...

4. Updating a file means ...

5. Some advantages of a database program over a manual filing system


are: ...

6. Access to a common database over a network can be protected by


using....

8
27/01/2022

E - Solve the clues and complete the puzzle.


1. A collection of data stored in a PC
in a systematic way.
2. A unit of a database file made up
of related fields.
3. A single piece of information in a
record.
4. A _____ database maintains
separate, related files, but combines
data elements from the files for
queries and reports.
5. Some companies have several
computers sharing a database over a
_______.
6. To look for specific information, for
example the name of an employee.
7. To classify records into numerical or alphabetical order.
8. A tool that allows you to extract information that meets certain criteria.

Plurals – số nhiều
 Danh từ số nhiều trong tiếng Anh  Từ kết thúc bằng: phụ âm + y, thì у
thường kết thúc bằng -s chuyển thành i và thêm -es
record  records company  companies
 Từ kết thúc bằng -s, -sh, -x, -ch, thì facility  facilities
thêm đuôi -es  Từ kết thúc bằng: nguyên âm + y,
address  addresses thì chỉ thêm -s
index  indexes birthday  birthdays

 Có nhiều dạng số nhiều bất quy tắc:


man/woman  men/women child  children
analysis  analyses formula  formulae (formulas)
criterion  criteria mouse  mice
 Đuôi -s được phát âm :
/s/ sau một trong các âm: /р/, /t/, /k/, /f/, /θ/ (VD: amounts, hyperlinks)
/iz/ sau một trong các âm: /s/, /z/, /∫ /, /t∫ /, /d3/(VD: devices, images)
/z/ trong hầu hết các trường hợp (VD: files, fields, customers, columns)

10
27/01/2022

11
27/01/2022

UNIT 6

The Internet and email

Wh- question
GRAMMAR  Người
Who created the Internet?
 Vật
Yes-No question What does TCP/IP mean? Which email program is the best?
 Nơi chốn
 Câu hỏi có thể bắt đầu bằng trợ Where can you find newsgroups?
động từ
 Thời gian
Are there other ways of accessing When was it created? How often are web pages updated?
the Internet?
How long has broadband existed?
 Hoặc do/does (hiện tại đơn)  Lý do
hoặc did (quá khứ đơn)
Why do you need a modem?
Did the Internet become popular  Số lượng
quickly?
How much does broadband access cost?
How many newsgroups are there?
 Manner
How do you get online?
 Khác
How fast are today's internet connections?
How old is the Internet?

2
27/01/2022

Make a question about Sue Clarke for each of her


answers.

1. I'm 23 years old.

2. I'm an online researcher.

3. I use the Internet to find information requested by clients.

4. I've been doing this job for six months.

5. I graduated from university in 2006.

4
27/01/2022

Listen and complete the customer’s notes


To connect to the Internet from home, I need:
(1) a ______________ and (2) a _______________.
Also need an account with an (3) _______________________________
(a company that offers connection for a monthly fee).
If you want to connect lots of computers without using cables,
you can use a (4) __________________ router.
Wi-Fi uses (5) ______________________ waves to send data over
medium-range distances.
Things you can do on the Internet:
(6)___________________________________________________________
_______________________________________________________________
‘Web’ or ‘Internet’? The Web: huge collection of (7) ___________
stored on computers all over the world. The Internet: the
network which connects all the computers.

Internet FAQs: Part 1 (2)


How long has broadband existed?
Since the late 1990s.
How much does broadband access cost?
It depends on which company you choose. Nowadays, some companies even offer free
broadband.
Why do you need a modem?
A modem (modulator/demodulator) converts digital signals into analogue signals so that data
can be transmitted across the phone or cable network.
What does TCP/IP mean?
The language used for data transfer on the Internet is known as TCP/IP (transmission control
protocol/ Internet protocol). This is like the internet operating system. Every computer
connected to the Net is identified by a unique IP address.
Are there other ways of accessing the Internet?
Other methods of internet access include Wi-Fi, satellite, mobile phones and TV sets equipped
with a modem. Wi-Fi-enabled laptops or PDAs allow you to connect to the Net if you are near a
wireless access point, in locations called hotspots (for example, a Wi-Fi cafe, park or campus).
Satellite services are used in places where terrestrial access is not available (for example, on
ships at sea).High-end mobile phones provide access through the phone network.

6
27/01/2022

Read Part 1 of the Internet FAQs and choose the


correct answers
1. The Internet was
a invented in the mid-90s. b popular in the 1960s. с probably created in the USA.
2. Which term describes any fast, high-bandwidth connection?
a broadband b dial-up connection с Wi-Fi connection
3. The power-line Internet provides broadband access through
a telephone lines. b satellites. с electrical power lines.
4. Which device converts computer data into a form that can be transmitted over
phone lines?
a ADSL b a mobile phone с a modem
5. The standard protocol that allows computers to communicate over the Internet is
called
a an IP address. b TCP/IP. с HTTP.
6. The geographical region covered by one or several access points is called a
a wireless access point. b hotspot. с wireless network device.

Internet FAQs: Part 2 (1)


Email
Email lets you exchange messages with people all over the world. Optional attached
files can include text, pictures and even audio and animation. A mailing list uses email
to communicate messages to all its subscribers - that is, everyone that belongs to the
list.
Which email program is the best?
Outlook Express is a popular program, but many users use web-based email accounts
such as Hotmail.
The Web
The Web consists of billions of documents living on web servers that use the HTTP
protocol. You navigate through the Web using a program called a web browser, which
lets you search, view and print web pages.
How often are web pages updated?
It depends entirely on the page. Some are updated thousands of times a day.
Chat and Instant Messaging (IM)
Chat and Instant Messaging technologies allow you to have real-time conversations
online, by typing messages at the keyboard.

8
27/01/2022

Internet FAQs: Part 2 (2)


FTP
FTP, or file transfer protocol, is used to transfer files over a TCP/IP network. Nowadays, this
feature is built into Web browsers. You can download programs, games and music files
from a remote computer to your hard drive.
Telnet
Telnet is a protocol and a program used to log onto remote computer systems. It enables
you to enter commands that will be executed as if you were entering them directly on the
remote server.
Newsgroups
Newsgroups are the public discussion areas which make up a system called Usenet. The
contents are contributed by people who post articles or respond to articles, creating chains
of related postings called message threads. You need a newsreader to subscribe to
newsgroups and to read and post messages. The newsreader may be a stand-alone
program or part of a web browser.
How many newsgroups are there?
There are approximately 30,000 active newsgroups.
Where can you find newsgroups?
Your newsreader may allow you to download the newsgroup addresses that your ISP has
included on its news server. An alternative to using a newsreader is to visit web forums
instead, which perform the same function but without the additional software.
9

In pairs, discuss which of the internet systems (1-6) you


would use to do the tasks (a-f).

10
27/01/2022

С Find words and phrases in Part 2 with the following


meanings.

1. a system used to distribute email to many


different subscribers at once (in Email paragraph)
2. a program used for displaying web pages (in
The Web paragraph)
3.to connect to a computer by typing your
username and password (in Telnet paragraph)
4. a series of interrelated messages on a given
topic (in Newsgroups paragraph)
5. a program for reading Usenet newsgroups (in
Newsgroups paragraph)

11

Email features
When you set up an account with an Internet Service Provider, you are given an email address
and a password. The mail you receive is stored on the mail server of your ISP - in a simulated
mailbox - until you next connect and download it to your hard drive.
There are two ways to get email over the Internet. One is by using a mail program (known as
an email client) installed on your computer, for example Eudora or Outlook Express. The other
way is to use web-based email, accessible from any web browser. Hotmail and Gmail are good
examples.
You can make the message more expressive by including emoticons, also called smileys. For
example, ;-) for wink, :-) for happy, :-o for surprised, :-D for laughing, etc. You may also like to
add a signature file, a pre-written text file appended to the end of the message. The name
given to unsolicited email messages is spam.

The anatomy of an email


The username (a person's name or nickname)
The header
To: name and address of the recipient The @ sign, which means at
From: name and address of the sender The domain name or network address - that is,
Cc: carbon copy sent to another person the mail server where the account is located.
The final part adds information about it, for
Bcc: blind carbon copy example com = company, uk = United Kingdom,
Subject: topic of the message fr = France, etc.
Attachment: files added to the message The body contains the message itself

12
27/01/2022

Read the text and find the following.


1. The place where your ISP stores your emails
2. The type of program used to read and send
email from a computer
3. The part of an email address that identifies
the user of the service
4. The line that describes the content of an
email
5. The computer file which is sent along with
an email message
6. Facial symbols used to indicate an emotion
or attitude
7. The name given to junk mail

13
27/01/2022

UNIT 7

The Web

Look at the screenshot of a typical web page. How many of


the features (a-k) can you say in English?

a. go back one page b. go forward one page c. URL address


d. go to the homepage e. refresh the current page
f. stop the current transfer g. search box h. feed button
i. clickable hypertext link j. clickable image link k. show favorites

2
27/01/2022

A typical web page


At the top of the page is the URL address. URL means Uniform Resource Locator - the
address of a file on the Internet. A typical URL looks like this: http://www.bbc.co.uk/radio/.
In this URL, http:// means Hypertext Transfer Protocol and tells the program to look for a
web page, www means world wide web. bbc.co.uk is the domain name of the server that hosts
the website - a company based in the UK; other top-level domains are .com (commercial site),
.edu (education), .org (organization) or .net (network); radio is the directory path where the web
page is located. The parts of the URL are separated by . (dot), / (slash) and : (colon). Some sites
begin ftp://, a file transfer protocol used to copy files from one computer to another.
The toolbar shows all the navigation icons, which let you go back one page or go
forward one page. You can also go to the home page or stop the current transfer when the
circuits are busy.
Tab buttons let you view different sites at the same time, and the built-in search box
helps you look for information. If the feed button lights up, it means the site offers RSS feeds, so
you can automatically receive updates. When a web page won’t load, you can refresh the
current page, meaning the page reloads (downloads again). If you want to mark a website
address so that you can easily revisit the page at a later time, you can add it to your favourites
(favorites in American English), or bookmark it. When you want to visit it again you simply click
show favourites.
On the web page itself, most sites feature clickable image links and clickable hypertext
links. Together, these are known as hyperlinks and take you to other web pages when clicked.

Tour the Collectives of Cyberspace


The Internet isn’t just about email or the Web anymore. Increasingly, people online
are taking the power of the Internet back into their own hands.They’re posting opinions on
online journals - weblogs, or blogs; they're organizing political rallies on MoveOn.org;
they’re trading songs on illegal file-sharing networks; they’re volunteering articles for the
online encyclopedia Wikipedia; and they’re collaborating with other programmers around
the world. It's the emergence of the 'Power of Us’. Thanks to new technologies such as blog
software,peer-to-peer networks, open-sources oftware, and wikis, people are getting
together to take collective action like never before.
eBay, for instance, wouldn’t exist without the 61 million active members who list,
sell, and buy millions of items a week. But less obvious is that the whole marketplace runs
on the trust created by eBay's unique feedback system, by which buyers and sellers rate
each other on how well they carried out their half of each transaction. Pioneer e-tailer
Amazon encourages all kinds of customer participation in the site - including the ability to
sell items alongside its own books, CDs, DVDs and electronic goods. MySpace and Facebook
are the latest phenomena in social networking, attracting millions of unique visitors a
month. Many are music fans, who can blog, email friends, upload photos, and generally
socialize. There’s even a 3-D virtual world entirely built and owned by its residents, called
Second Life, where real companies have opened shops, and pop stars such as U2 have
performed concerts.

4
27/01/2022

Tour the Collectives of Cyberspace


Some sites are much more specialized, such as the photo-sharing site Flickr. There,
people not only share photos but also take the time to attach tags to their pictures, which help
everyone else find photos of, for example, Florence, Italy. Another successful example of a site
based on user-generated content is YouTube, which allows users to upload, view and share
movie clips and music videos, as well as amateur videoblogs. Another example of the collective
power of the Internet is the Google search engine. Its mathematical formulas surf the
combined judgements of millions of people whose websites link to other sites. When you type
Justin Timberlake into Google’s search box and go to the star’s official website, the site is listed
first because more people are telling you it’s the most relevant Justin Timberlake site - which it
probably is.
Skype on the surface looks like software that lets you make free phone calls over the
Internet - which it does. But the way it works is extremely clever. By using Skype, you’re
automatically contributing some of your PC’s computing power and Internet connection to
route other people's calls. It’s an extension of the peer-to-peernetwork software such as
BitTorrent that allow you to swap songs - at your own risk if those songs are under copyright.
BitTorrent is a protocol for transferring music, films, games and podcasts. A podcast is an audio
recording posted online. Podcasting derives from the words iPod and broadcasting. You can
find podcasts about almost any topic - sports, music, politics, etc. They are distributed through
RSS (Really Simple Syndication) feeds which allow you to receive up-to-date information
without having to check the site for updates. BitTorrent breaks the files into small pieces,
known as chunks, and distributes them among a large number of users; when you download a
torrent, you are also uploading it to another user.

A Read the article and find websites for the following


tasks.
1. to search for information on the Web
2. to buy books and DVDs
3. to participate in political campaigns
4. to view and exchange video clips
5. to manage and share personal photos using tags
6. to buy and sell personal items in online auctions
7. to download music and movies, sometimes illegally

6
27/01/2022

В Read the article again and match the sentence


beginnings (1-5)with the correct endings(a-e).
1. A weblog, or blog, is an a. web pages on a particular
electronic journal subject.
2. A peer-to-peer system allows b. for downloading files over the
3. You can use a search engine Internet.
to find c. users to share files on their
4. BitTorrent is a peer-to-peer computers.
protocol used d. about fresh, new content on
5. RSS keeps you constantly your favourite websites.
informed e. that displays in chronological
order the postings of one or
more people.

С Find words in the article with the following


meanings.
1. open-source, editable web pages (lines 5-10).....................
2. the same as electronic retailer, or online store (lines 10-15)...................
3. a blog that includes video (lines 25-30) ...................
4. a program that allows you to make voice and video calls from a
computer (lines 30-35).....................
5. an audio broadcast distributed over the Internet (lines 35-40) ..............

8
27/01/2022

Collocation 2
 Collocation là một cụm gồm 2 hay nhiều từ thường hay đi cùng với nhau
theo trật tự.
 Một số dạng Collocation phổ biến:
 Verb + noun
surf the Web download music
 verb + particle
hack into a computer log onto a bank account
 adverb + adjective
highly sensitive information freely available on the Web
 adjective + noun
mathematical formulas up-to-date information
 Online khi kết hợp trong cụm từ có thể đóng vai trò tính từ/trạng từ
Tính từ: They post opinions on online journals.
Trạng từ: A podcast is an audio recording posted online.

A Match the words on the left (1-6) with the words on


the right(a-f) to make collocations.

10
27/01/2022

С Find the collocations in these sentences and say


what type they are.
1. Once you are online, you can browse the Web, visit chat rooms or
send and receive emails.
2. Instant messaging can be a great way to communicate with friends.
3. This software may not be fully compatible with older operating
systems.
4. Most webcams plug into a USB port.
5. This highly addictive game will keep you playing for hours.
6. Companies are starting to use virtual reality on their websites.

11

12
27/01/2022

С Complete the extracts with words from the box


authorization fake internet auction shopping cart browse log in steal

1. Occasionally I also buy things on ................................. sites such as


eBay, where people offer and sell things to the highest bidder.
2. First you enter a site dedicated to e-commerce and...............................
their products.
3. Then you put the items you want to buy into a virtual ............................
- a program that lets you select the products and buy with a credit card.
4. You may have to.............................with a username and a password ...
5. ... for some transactions, you will be required to use a TAN, a
transaction .......................... number.
6. Be aware of phishing - you may receive……………………. emails claiming to
be from your bank and asking for personal information or account details
in an attempt to..........................your identity.

13

Tiền tố e- và cyber-
 Tiền tố e- xuất phát từ electronic, thêm vào trước hành động
diễn ra trong máy tính/online
 Ví dụ
e-business/e-commerce : kinh doanh qua Internet
e-card, e-learning, e-zine, e-voting, e-signature, e-assessment, e-
cash, e-book, e-pal, …
 Có thể có hoặc không có dấu nối –

 Tiền tố cyber- xuất phát từ cybernetics, mô tả những gì liên


quan đến mạng máy tính
cybercafe : quán cafe internet
cybercrime, cyberculture, cyberslacker, cyberspace, …

14
27/01/2022

Look at the HELP box and then complete these


sentences.
1. A .............................. is an employee who uses his company's internet
connection during work hours to chat with friends, play games, etc.
2. An................................ is a postcard sent via the Internet.
3. An...............................is a small magazine or newsletter published
online.
4. In a ................................ you can use computers with internet access
for a fee.
5. Examples of................................ include internet fraud, digital piracy,
theft of confidential information, etc.
6. In the future, all elections will be carried out using...............................
7. You can now sign legal documents online using an...............................
8. …………………………...will revolutionise the way we take exams.
9. …………………………. can be used on some websites instead of real
money to make purchases. It reduces the risk of fraud.
10. An............................... is like the paper version, but in digital form.

15
27/01/2022

UNIT 8

Internet security

Cybercrimes
• Piracy - the illegal copy and distribution of copyrighted software, games or
music files
• Plagiarism and theft of intellectual property - pretending that someone else's
work is your own
• Spreading of malicious software
• Phishing (password harvesting fishing) - getting passwords for online bank
accounts or credit card numbers by using emails that look like they are from real
organizations, but are in fact fake; people believe the message is from their bank
and send their security details
• IP spoofing - making one computer look like another in order to gain
unauthorized access
• Cyberstalking - online harassment or abuse, mainly in chat rooms or
newsgroups
• Distribution of indecent or offensive material

2
27/01/2022

Hacker /ˈhækɚ/ n
Some one who invades a network’s privacy. Originally, all computer enthusiasts and
skilled programmers were known as hackers, but during the 1990s, the term hacker
became synonymous with cracker , a person who breaks security on computers.
Today, people often use the word hacker to mean both things. In the computer
industry, hackers are known as white hats and crackers are called black hats
or darkside hackers.

Virus /ˈvaɪrəs/ n
A piece of software which attaches itself to a file. Once you run an infected
program, the virus quickly spreads to the system files and other software. Some
viruses can destroy the contents of hard disk.

В Match the captions (1 -4)with the pictures(a-d).

a b

c d

4
27/01/2022

Security and privacy on the Internet


There are many benefits from an open system like the Internet, but one of the risks is that we are
often exposed to hackers, who break into computer systems just for fun, to steal information, or to
spread viruses (see note below). So how do we go about making our online transactions secure?
Security on the Web
Security is crucial when you send confidential information online. Consider, for example, the
process of buying a book on the Web. You have to type your credit card number into an order
form which passes from computer to computer on its way to the online bookstore. If one of the
intermediary computers is infiltrated by hackers, your data can be copied.
To avoid risks, you should set all security alerts to high on your web browser. Mozilla Firefox
displays a lock when the website is secure and allows you to disable or delete cookies - small files
placed on your hard drive by web servers so that they can recognize your PC when you return to
their site.
If you use online banking services, make sure they use digital certificates - files that are like digital
identification cards and that identify users and web servers. Also be sure to use a browser that is
compliant with SSL (Secure Sockets Layer), a protocol which provides secure transactions.
Email privacy
Similarly, as your email travels across the Net, it is copied temporarily onto many computers in
between.This means that it can be read by people who illegally enter computer systems.
The only way to protect a message is to put it in a sort of virtual envelope - that is, to encode it
with some form of encryption. A system designed to send email privately is Pretty Good Privacy, a
freeware program written by Phil Zimmerman.

Security and privacy on the Internet


Network security
Private networks can be attacked by intruders who attempt to obtain information such as Social Security
numbers, bank accounts or research and business reports. To protect crucial data, companies hire security
consultants who analyse the risks and provide solutions. The most common methods of protection are
passwords for access control, firewalls, and encryption and decryption systems. Encryption changes data
into a secret code so that only someone with a key can read it. Decryption converts encrypted data back
into its original form.
Malware protection
Malware (malicious software) are programs designed to infiltrate or damage your computer, for example
viruses, worms, Trojans and spyware. A virus can enter a PC via a disc drive – if you insert an infected disc -
or via the Internet. A worm is a self-copying program that spreads through email attachments; it replicates
itself and sends a copy to everyone in an address book. ATrojan horse is disguised as a useful program; it
may affect data security. Spyware collects information from your PC without your consent. Most spyware
and adware (software that allows pop-ups - that is, advertisements that suddenly appear on your screen) is
included with'free'downloads.
If you want to protect your PC, don't open email attachments from strangers and take care when
downloading files from the Web. Remember to update your anti-virussoftware as often as possible, since
new viruses are being created all the time.
Note: Originally, all computer enthusiasts and skilled programmers were known ashackers, but during the 1990s, the
term hacker became synonymous withcracker - a person who uses technology for criminal aims. Nowadays, people
often use the word hacker to mean both things. In the computer industry, hackers are known as white hats and
crackers are called black hats or darkside hackers.

6
27/01/2022

В Read the text more carefully and answer these questions.


1. Why is security so important on the Internet?

2. What security features are offered by Mozilla Firefox?

3. What security protocol is used by banks to make online transactions secure?

4. How can we protect our email and keep it private?

5. What methods are used by companies to make internal networks secure?

6. In what ways can a virus enter a computer system?

7. How does a worm spread itself?

С Solve the clues and complete the puzzle.


1. Users have to enter a ............... to gain access to a network.
2. A……………. protects a company intranet from outside attacks.
3. A ................. is a person who uses their computer skills to enter
computers and networks illegally.
4. ................ can infect your files and corrupt your hard drive.
5. You can download................ from the Net; this type of software
is available free of charge but protected by copyright.
6. Encoding data so that unauthorized users can't read it is known
as......................
7. This company uses....................techniques to decode (or
decipher) secret data.
8. Most................... is designed to obtain personal information
without the user's permission.

8
27/01/2022

4 The history of hacking

The past simple


 Quá khứ đơn: để nói về một hành động hoàn chỉnh hoặc sự kiện đã xảy ra
vào một thời điểm cụ thể trong quá khứ.
 Động từ thường chia thì quá khứ đơn = infinitive + -(e)d
John Draper discovered that a whistle...
 Câu hỏi và phủ định sử dụng did/didn’t
When did Captain Zap hack into the Pentagon?
He didn't expect that his most famous exploit...
 Động từ bất quy tắc
Kevin Mitnick began hacking into...
When did Kevin Mitnick begin hacking into ...?
He didn't begin hacking until 1974.
 Quá khứ bị động = quá khứ đơn của be + quá khứ phân từ.
IBM international network was paralysed by hackers.
He wasn't sent to prison.
Why was Nicholas Whitely arrested in 1998?

10
27/01/2022

Complete Part 2 of the text with the past simple form


of the verbs in the box.
show spread steal launch attempt overwrite be infect affect

11

В Read these landmarks in the history of the Internet

1969 - The US Defense Department establishes ARPANET, a network connecting


research centres.
1971 - Ray Tomlinson of BBN invents an email program to send messages across a
network. The @ sign is chosen for its at meaning.
1981 - IBM sells the first IBM PC. BITNET provides email and file transfers to universities
1982 - TCP/IP is adopted as the standard language of the Internet.
1988 - Jarkko Oikarinen develops the system known as Internet Relay Chat (IRC).
1991 - CERN (Conseil Europeen pour la Recherche Nucleaire) creates the World Wide
Web
1998 - The Internet 2 network is born. It can handle data and video at high speed but is
not a public network.
1999 - Online banking, e-commerceand MP3 music become popular.
2001 - Napster, whose software allows users to share downloaded music, maintains
that it does not perpetrate or encourage music piracy. However, a judge rules that
Napster's technology is an infringement of music copyright.
2004 - Network Solutions begins offering 100-year domain registration.
2006 - Americans spend over $100 billion shopping online.

12
27/01/2022

UNIT 9

Graphics and design

New words
 Three-dimensional (3D)  Raster graphics
 Scale (v)  Vector graphics
 Handle (v)  Pixel
 compose of  Density
 composite  Resolution
 Simulate
 jagged edge
 Palette
 Primitive  geometric
 Attribute  illustrate (v)/ illustration (n)
 Filter  GIS Geographic Information Systems
 Wireframe  CAD Computer Aided Design
 Texturing
 Render
 Fractal
 Animation

2
27/01/2022

Which of these computer graphics are three-dimensional (3-D)?


Which types of professional might use the computer graphics (a-d)?

Computer graphics
Computer graphics are pictures and drawings produced by computer. There are two main
categories:
Raster graphics, or bitmaps, are stored as a collection of pixels. The sharpness of an image
depends on the density of pixels, or resolution. For example, text or pictures that are scaled up -
that is, made bigger - may show jagged edges. Paint and photo-editing programs like Adobe
Photoshop focus on the manipulation of bitmaps. Popular raster formats are JPEG, GIF and TIFF.
Vector graphics represent images through the use of geometric objects, such as lines, curves
and polygons, based on mathematical equations. They can be changed or scaled without losing
quality. Vector data can be handled by drawing programs like Adobe Illustrator, Corel Draw or
Macromedia Freehand. EPS is the most popular file format for exchanging vector drawings.
Almost all computer users use some form of graphics. Home users and professional artists
use image-editing programs to manipulate images. For example, you can add filters (special
effects) to your favourite photos, or you can composite images. Compositing is combining parts
of different images to create a single image.
Graphic artists and designers use drawing programs to create freehand drawings and
illustrations for books or for the Web. Businesspeople use presentation graphics to make
information more interesting visually - graphs and diagrams can be more effective ways of
communicating with clients than lists of figures. Electrical engineers use graphics to design
circuits in order to present data in a more understandable form. Mechanical engineers use CAD
(Computer Aided Design) software to develop, model and test car designs before the actual
parts are made. This can save a lot of time and money.

4
27/01/2022

Computer graphics
CAD is also used in the aerospace, architecture and industrial sectors to design
everything from aeroplanes and buildings to consumer products. Designers start a
project by making a wireframe, a representation showing the outlines of all edges in a
transparent drawing. They then specify and fill the surfaces to give the appearance of
a 3-D solid object with volume. This is known as solid modeling. Next, they add paint,
colour and filters to achieve the desired 'look and feel': this is called texturing the
object. Finally, they render the object to make it look real. Rendering includes lighting
and shading as well as effects that simulate shadows and reflections.
Computer art, or digital art, is used in adverts and TV programmes. Artists and
scientists use special graphic applets to create amazing fractals. Fractals are geometrical
patterns that are repeated at small scales to generate irregular shapes, some of which
describe objects from nature. Government agencies use GIS (Geographic Information
Systems) to understand geographic data and then plan the use of land or predict
natural disasters. Cartographers use GIS to make detailed maps. Animators use
computer animation software to create animated cartoons or add effects in movies and
video games.

B Read the text and answer these questions.


1. What are the differences between raster graphics and
vector graphics?
2. Which graphics file formats are mentioned?
3. What is compositing?
4. What does CAD stand for?
5. What are the benefits of using graphics in the car industry?
6. What type of graphics software is used to make maps or 3-D
models of the Earth?
7. Who uses computer animation? How?

6
27/01/2022

D Match the words (1-6) with the definitions(a-f).

1 resolution a special effects that can be applied to pictures


2 jagged b a technique that generates realistic reflections, shadows
and highlights
3 filters с geometrical figures with special properties
4 wireframe d irregular or uneven
5 rendering e the number of pixels in an image
6 fractals f the drawing of a model by using features like edges or
contour lines

Dạng -ing
 Ba cách sử dụng dạng -ing :
1. Rendering includes lighting and shading
2. We are designing a new car on computer.
3. They use special applets to create amazing fractals.
 Câu 1: Danh động từ (gerund) – chỉ hành động hoặc quá trình
Rendering : chủ ngữ lighting, shading: tân ngữ
 Câu 2: Phân từ hiện tại – dùng trong thì tiếp diễn hoặc để rút gọn
mệnh đề quan hệ
designing: thì hiện tại tiếp diễn
 Câu 3: Tính từ

8
27/01/2022

Dạng -ing
 Danh động từ (gerund) được dùng làm:
 Chủ thể của hành động
Compositing is combining parts of different images to create a single image.
 Bổ nghĩa cho danh từ
Compositing is combining parts of different images
 Đối tượng của hành động
I enjoy editing pictures.
 Sau giới từ
Designers start a project by making a wireframe.
 Bổ nghĩa cho động từ
This course involves painting and drawing in various media.
 Một số động từ phải đi cùng động từ dạng –ing, không phải động từ
nguyên thể (VD: avoid, fancy, finish, give up, hate, imagine, involve, keep,
look forward to, mind, suggest, enjoy)

A Decide if the -ing forms in these sentences are gerunds,


present participles or adjectives. Write g, pp or a.
1. PCs generate graphics by performing mathematical calculations on
data. …………
2. Businesspeople use graphics to make information more interesting
visually. …………
3. Graphs and diagrams can be more effective waysof communicating
withclients than lists of figures. ………..
4. She is designing a logo for the company. …………
5. If you need to make a presentation, I suggest using PowerPoint.
...........
6. The Internet is a network linking other networks. …………

10
27/01/2022

В Correct the mistakes in these sentences. There are seven


mistakes in total.
1. Computer animation is the process of create objects which move
across the screen.
2. Texturing involves add paint, colour and filters to drawings and
designs.
3. You can open the colour palette by click on the corresponding icon.
4. CAD programs are very fast at to perform drawing functions.
5. A lot of time and money is saved by test a car design before to make
the product.
6. To render refers to the techniques used to make realistic images.

11

3B Listen and complete this extract from the web version of the
tutorial.
Graphics programs usually have a toolbox - a collection of drawing and
(1).................. tools that enable you to type, (2) ..............., draw, paint, edit, move,
and view images on the computer.
The basic shapes which are used to (3) .................. graphical objects are
called primitives. These are usually geometric, such as lines between two points,
arcs, circles, polygons, ellipses and even text. Furthermore, you can specify the
attributes of each primitive, such as its colour, line type, fill area, interior style and
so on.
The various tools in a toolbox usually appear together as pop-up icons in a
menu or palette. To use one, you activate it by (4) .................... on it. For example,
if you want to (5) .................. a rectangle, you activate the rectangle tool, and
the pop-up options give you the possibility of (6) .................... rectangles with
square or rounded corners.
You can transform an object by translating, (7) ................. or scaling
it. Translation means moving an object to a different location. Rotation is
(8).................... the object around an axis. For example, you may need to rotate an
object 90 or 180 degrees to fit the drawing. (9) .................... is making the object
larger or smaller.

12
27/01/2022

13
27/01/2022

UNIT 10

Multimedia

New words
Multimedia  geometric
Hypertext  Sharpness(n)/ sharp (adj)
Interactivity  freehand
sound card  Form vs. Format
audio player
 Equation
CD ripper
 illustrate (v)/ illustration (n)
streaming audio technology
Webcast  Manipulation (n)/ Manipulate (v)
plug-in  Graph/ chart/ diagram/
Video computing  Figure/ picture/ drawing/ image
digital format
video editing
stereo synthesizer
magnetic disks
hypermedia

2
27/01/2022

E-books
computer-
encyclopedia
based
and
training dictionary
courses
How many
products can you
virtual think of that slide
reality
incorporate presentation
systems
multimedia? Make
a list.

3G mobile
web page
phones
computer
games

Listen to a sales assistant in a computer shop explaining to a


customer the system requirements needed to run multimedia
software. Which answers (a or b) best describe what she says?

4
27/01/2022

Listen again and complete this diagram of a multimedia


system.

Multimedia magic!
a ______________________________
Multimedia applications are used in all sorts of fields. For example, museums, banks and estate
agents often have information kiosks that use multimedia; companies produce training
programs on optical discs; businesspeople use Microsoft PowerPoint to create slideshows; and
teachers use multimedia to make video projects or to teach subjects like art and music. They
have all found that moving images and sound can involve viewers emotionally as well as inform
them, helping make their message more memorable.
The power of multimedia software resides in hypertext, hypermedia and interactivity (meaning
the user is involved in the programme). If you click on a hypertext link, you can jump to another
screen with more information about a particular subject. Hypermedia is similar, but also uses
graphics, audio and video as hypertext elements.
b _______________________________
As long as your computer has a sound card, you can use it to capture sounds in digital format
and play them back. Sound cards offer two important capabilities: a built-in stereo synthesizer
and a system called MIDI, or Musical Instrument Digital Interface, which allows electronic
musical instruments to communicate with computers. A Digital Audio Workstation (DAW) lets
you mix and record several tracks of digital audio.
You can also listen to music on your PC, or transfer it to a portable MP3 player. MP3 is short for
MPEG audio player 3, a standard format that compresses audio files. If you want to create your
own MP3 files from CDs, you must have a CD ripper, a program that extracts music tracks and
saves them on disk as MP3s.

6
27/01/2022

Multimedia magic!
Audio is becoming a key element of the Web. Many radio stations broadcast live over the
Internet using streaming audio technology, which lets you listen to audio in a continuous
stream while it is being transmitted. The broadcast of an event over the Web, for example a
concert, is called a webcast. Be aware that you won't be able to play audio and video on the
Web unless you have a plug-in like RealPlayer or QuickTime.
c _________________________
Video is another important part of multimedia. Video computing refers to recording,
manipulating and storing video in digital format. If you wanted to make a movie on your
computer, first you would need to capture images with a digital video camera and then transfer
them to your computer. Next, you would need a video editing program like iMovie to cut your
favourite segments, re-sequence the clips and add transitions and other effects. Finally, you
could save your movie on a DVD or post it on websites like YouTube and Google Video.
d ________________________
Multimedia is used to produce dictionaries and encyclopedias. They often come on DVDs, but
some are also available on the Web. A good example is the Grolier Online Encyclopedia, which
contains thousands of articles, animations, sounds, dynamic maps and hyperlinks. Similarly, the
Encyclopedia Britannica is now available online, and a concise version is available for iPods,
PDAs and mobile phones. Educational courses on history, science and foreign languages are
also available on DVD. Finally, if you like entertainment, you'll love the latest multimedia video
games with surround sound, music soundtracks, and even film extracts.

B Correct the technical mistakes in these sentences.

1. Multimedia training software is distributed on magnetic disks.


2. You need to have MIDI on your computer to hear speech and
music.
3. A stereo synthesizer allows your computer to communicate with
electronic musical instruments.
4. A CD ripper converts CDs to live streams.
5. The Encyclopedia Britannica is only available on DVD.

8
27/01/2022

D Match the words (1-5) with the definitions(a-e).

1 hypertext a the process of manipulating video images


2 hypermedia b text with links which take you to other pages
3 streaming с a technique for playing sound and video files while
they're downloading
4 webcast d a live event broadcast over the Internet
5 video editing e a form of enriched multimedia which allows an
interactive and dynamic linking of visual and audio
elements

Câu điều kiện


 để diễn đạt rằng hành động trong mệnh đề chính chỉ có thể xảy ra nếu một điều kiện
nhất định được thỏa mãn
 Thường có if, unless (=if not), as long as (=provided/providing)
You won't be able to play audio and video on the Web unless you have a plug-in like
RealPlayer or QuickTime. (=if you don't have a plug-in ...)
 Câu điều kiện loại 1 (với trường hợp thực tế hoặc có thể).
If A happens В will happen
(hiện tại đơn) (will + verb)
If you like entertainment, you will love the latest multimedia video games.
 Mệnh đề chính có thể có động từ khuyết thiếu (can, must)
If you want to create your own MP3 files from your CDs, you must have a CD ripper.
 Câu điều kiện loại 2 (cho các tình huống giả thuyết)
If A happened В would happen
(quá khứ đơn) (would + verb)
If you wanted to make a movie on your computer, first you would/you'd need to ....
 Mệnh đề chính, có thể sử dụng các động từ khuyết thiếu khác (could, should, might)
 Nếu be xuất hiện trong mệnh đề if, ta thường sử dụng were thay vì was, ngay cả với
đại từ I, he, she, it
If I were you, I'd get a new MP3 player.

10
27/01/2022

A Complete these sentences with the correct form of


the verbs in brackets.
1. If you (bring) ______________ your digital video camera, we can
make a movie on my PC.
2. You won't be able to play those video files if you (not have)
______________ the correct plug-in.
3. If the marketing manager (have) _____________ PowerPoint, she
could make more effective presentations.
4. If I could afford it, I (buy) __________ ___ a new game console.
5. If I had the money, I (invest) _______________ in some new
multimedia software.

11

12
27/01/2022

UNIT 11

Program design and computer languages

A Match the words (1-5) with the definitions (a-e)


1. flowchart a. Program instructions written in a
particular computer language
2. source code
b. The techniques of detecting and
3. compiler correcting errors (or bugs) which may
4. machine code occur in programs
5. debugging c. A diagram representing the successive
logical steps of the program
d. A special program which converts the
source program into machine code - the
only language understood by the
processor
e. The basic instructions understood by
computers; it consists of 1s and 0s (binary
code)

2
27/01/2022

Computer languages
Unfortunately for us, computers can't understand spoken English or any other natural
language. The only language they can understand directly is machine code, which consists of 1s
and 0s (binary code).
Machine code is too difficult to write. For this reason, we use symbolic languages to
communicate instructions to the computer. For example, assembly languages use abbreviations
such as ADD, SUB, MPY to represent instructions. The program is then translated into machine
code by a piece of software called an assembler. Machine code and assembly languages are
called low-level languages because they are closer to the hardware. They are quite complex and
restricted to particular machines. To make the programs easier to write, and to overcome the
problem of intercommunication between different types of computer, software developers
designed high-level languages, which are closer to the English language. Here are some
examples:
■FORTRAN was developed by IBM in 1954 and is still used for scientific and engineering
applications.
■COBOL (Common Business Oriented Language) was developed in 1959 and is mainly used for
business applications.
■BASIC was developed in the 1960s and was widely used in microcomputer programming
because it was easy to learn. Visual BASIC is a modern version of the old BASIC language, used
to build graphical elements such as buttons and windows in Windows programs.
■PASCAL was created in 1971. It is used in universities to teach the fundamentals of
programming.

4
27/01/2022

Computer languages
■С was developed in the 1980s at AT&T. It is used to write system software, graphics and
commercial applications. C++ is a version of С which incorporates object-oriented
programming: the programmer concentrates on particular things (a piece of text, a graphic or a
table, etc.) and gives each object functions which can be altered without changing the entire
program. For example, to add a new graphics format, the programmer needs to rework just the
graphics object. This makes programs easier to modify.
■ Java was designed by Sun in 1995 to run on the Web. Java applets provide animation and
interactive features on web pages. Programs written in high-level languages must be translated
into machine code by a compiler or an interpreter. A compiler translates the source code into
object code - that is, it converts the entire program into machine code in one go. On the other
hand, an interpreter translates the source code line by line as the program is running.
It is important not to confuse programming languages with markup languages, used to create
web documents. Markup languages use instructions, known as markup tags, to format and link
text files. Some examples include:
■ HTML, which allows us to describe how information will be displayed on web pages.
■ XML, which stands for Extensible Markup Language. While HTML uses pre-defined tags, XML
enables us to define our own tags; it is not limited by a fixed set of tags.
■ VoiceXML, which makes Web content accessible via voice and phone. VoiceXML is used to
create voice applications that run on the phone, whereas HTML is used to create visual
applications (for example, web pages).

В Read the text again and answer these questions.

1. Do computers understand human languages? Why? / Why not?


2. What is the function of an assembler?
3. Why did software developers design high-level languages?
4. Which language is used to teach programming techniques?
5. What is the difference between a compiler and an interpreter?
6. Why are HTML and VoiceXML called markup languages?

6
27/01/2022

С Complete these sentences with a computer language.

1. __________ allows us to create our own tags to describe our data


better. We aren't constrained by a pre-defined set of tags the way we
are with HTML.
2. IBM developed _____________ in the 1950s. It was the first high-
levellanguage in data processing.
3. ___________ applets are small programs that run automatically on
web pages and let you watch animated characters, play games, etc.
4. ____________ is the HTML of the voice web. Instead of using a web
browser and a keyboard, you interact with a voice browser by listening
to pre-recordedaudio output and sending audio input through a
telephone.
5. This language is widely used in the business community. For example,
the statement ADD VAT to NET-PRICE could be used in a __________
program.

Are the words in the boxes nouns, verbs or adjectives? Write n, v or adj
next to each word. Complete the sentences with words from the boxes.

8
27/01/2022

Động từ nguyên thể


 Để thể hiện mục đích:
We use symbolic languages to communicate instructions to the computer.
(= in order to communicate...)
 Sau tính từ
BASIC was widely used in the past because it was easy to learn.
Machine code is too difficult to write. (= not easy enough to write)
 Sau một số động từ (ví dụ afford, demand, plan, agree, expect, promise, appear,
hope, refuse, arrange, learn, try, decide, manage)
A lot of companies are now trying to develop voice applications for web access.
 Sau đối tượng của một số động từ nhất định (ví dụ advise, encourage, allow,
expect, tell, ask, invite, want, enable, order, warn)
HTML allows us to describe how information will be displayed on web pages.
 Sau động từ khuyết thiếu (can, could, may, might, will, would, must, should)
Unfortunately, computers can't understand spoken English.
High-level languages must be translated into machine code.
 Sau đối tượng của các động từ make, let
Programs make computers perform specific tasks.

A Look at the HELP box and then make sentences using


these prompts.
1. not easy / write instructions in COBOL
It's not easy to write instructions in COBOL
2. expensive / set up a data-processing area
3. advisable / test the programs under different conditions
4. unusual / write a program that works correctly the first time it's
tested
5. important/use a good debugger to fix errors
6. easy/learn Visual BASIC

10
27/01/2022

В Choose the correct words (a-c) to complete these sentences


1. We use high-level languages because machine code is too difficult ___________,
understand and debug.
a. read b. reading c. to read
2. I went on the course ___________ how to be a better programmer.
a learn b to learn с for to learn
3. I'm not interested in __________ that computer language.
a learn b learning с to learn
4. He refuses ________ the project with me.
a do b doing с to do
5. The engineers warned the employees not _________ the cables.
a touch b touching с to touch
6. They may not ________ to the conference.
a come b coming с to come
7. Spyware can make your PC __________ more slowly.
a perform b performing с to perform
8. This program is too slow __________ the simulation.
a do b to do с for doing

11

A Work in pairs. Student A reads about Visual BASIC, Student B reads


about VoiceXML. Try not to look at your partner’s text. Complete
your part of the table.
Visual BASIC VoiceXML

What does Visual BASIC / VoiceXML


stand for?

When was it developed?

What are its main features?

What is it used for?

12
27/01/2022

UNIT 12

Jobs in ICT

2
27/01/2022

Enthusiasm
Communication skills
Reliability
Punctuality
Confidence

4
27/01/2022

Senior
programmer
or
DTP operator?

For, since, ago, until


 for để chỉ một khoảng thời gian
I've lived in Liverpool for five years.
 since để chỉ một mốc thời gian
I've been unemployed since May 2005.
 Sử dụng ago với quá khứ đơn để nói về khoảng thời gian mà một việc đã xảy ra.
Ago đặt sau khoảng thời gian.
I got married five years ago.
 until có nghĩa là đến một thời điểm nhất định
I stayed at high school until I was 18.

6
27/01/2022

Complete the letter with for, since, ago or until.


Dear Mr Scott,
I am writing to apply for the position of Senior Programmer; which was advertised on 28th
March in The Times.
I graduated in May 2002 and did a work placement with British Gas as part of my degree.
Before taking my present job I worked for a year with NCR. I stayed in this job (1) ________
March 2004.
(2) _________ the last three years I have been working as a software engineer for Intelligent
Software. I have designed four programs in COBOL for commercial use, and (3) __________
January I have been writing programs in С for use in large retail chains. These have been very
successful and we have won several new contracts in the UK and Europe on the strength of
my team’s success.
Two years (4) _________ I spent three months in Spain testing our programs and also made
several visits to Italy, so I have a basic knowledge of Spanish and Italian. I now feel ready for
more responsibility and more challenging work, and would welcome the opportunity to learn
about a new industry.
I enclose my curriculum vitae. I will be available for an interview at any time.
I look forward to hearing from you.
Yours sincerely,
Sarah Brown

A Read the letter of application and answer these


questions.
1. Which job is Sarah Brown applying for?
2. Where did she see the advertisement?
3. How long has she been working as a software engineer?
4. What type of programs has she written?
5. When did she spend three months in Spain?

8
27/01/2022

10
27/01/2022

11

Applying for a job


Look at the job advertisement for a
Webmaster at eJupiter. Maria Quintana is
interested in applying. Use her curriculum
vitae on page 155 to write a letter of
application. Follow these steps:
Paragraph one: reason for writing
I am writing to apply for the position of ...
Paragraph two: education and training
I graduated in (date). . .
I completed a course in ...
Paragraph three: work experience
For the past X years I have been ...
Since X I have been ...
Paragraph four: personal skills
I spent X months in (country)... , so l have
knowledge of (foreign languages).
I can ...
Paragraph five: reasons why you are applying for this job
I now feel ready to ... and would welcome the opportunity to ...
Paragraph six: closing/ availability for interview
I enclose... I look forward to ... I will be available for an interview . ..

12
27/01/2022

13
27/01/2022

UNIT 13

Communication systems

People

Hardware ICT system Software

Data

2
27/01/2022

New words
 Wearable computer  Transmit/ transmission/ transmitter
 Digital TV  Digital Multimedia Broadcasting DMB
 Digital radio  Digital Video Broadcast-Handheld DVB-H
 Call centre  Digital Audio Broadcasting DAB
 GPS  teletext
 mobile phone  Telecommunication
 pay multimedia  teleworking
 widescreen  telemarketing
 set-top box
 cyborg
 Wireless support
 Ringtone
 Keypad

Call centre
Digital radio
Digital TV
Fax
GPS
Teletext
Wearable computer

4
27/01/2022

С Complete these sentences with words and phrases from В

1. Digital Audio Broadcasting, or DAB, is the technology behind


_______________. DAB is intended to replace FM in the near future.
2. __________________ are designed to be worn on the body or
integrated into the user's clothing.
3. Most existing TV sets can be upgraded to ___________ by connecting
a digital decoder.
4. My grandfather is 75 and he still watches ______________ on TV to
find out share prices, weather forecasts and sports results.
5. I work in a ______________ I receive incoming calls with information
inguiries. I also make outgoing calls for telemarketing.
6. Please complete this form and send it by _____________.
7. I have a _____________ navigation system in my car but I don’t use it
very often. My town is small and I know it well.

Channels of communication
What are telecommunications?
Telecommunications refers to the transmission of signals over a distance for
the purpose of communication. Information is transmitted by devices such as
the telephone, radio, television, satellite, or computer networks. Examples
could be two people speaking on their mobile phone, a sales department
sending a fax to a client, or even someone reading the teletext pages on TV.
But in the modern world, telecommunications mainly means transferring
information across the Internet, via modem, phone lines or wireless networks.
Because of telecommunications, people can now work at home and
communicate with their office by computer and telephone. This is
called teleworking. It has been predicted that about one third of all work could
eventually be performed outside the workplace. In call centres, assistance or
support is given to customers using the telephone, email or online chats. They
are also used for telemarketing, the process of selling goods and services over
the phone.

6
27/01/2022

Channels of communication
Digital TV and radio
In recent years, TV and radio broadcasting has been revolutionized by
developments in satellite and digital transmission. Digital TV is a way of
transmitting pictures by means of digital signals, in contrast to the analogue
signals used by traditional TV. Digital TV offers interactive services and pay
multimedia - that is, it can transmit movies and shows to TV sets or PCs on a
pay-per-view basis. It is also widescreen, meaning programmes are broadcast in
a native 16:9 format instead of the old 4:3 format. Digital TV provides a better
quality of picture and sound and allows broadcasters to deliver more channels.
Digital Terrestrial TV is received via a set-top box, a device that decodes the
signal received through the aerial. New technologies are being devised to allow
you to watch TV on your mobile. For example, DMB (Digital Multimedia
Broadcasting) and DVB-H (Digital Video Broadcast-Handheld) can send
multimedia (radio, TV and data) to mobile devices.
Audio programs (music, news, sports, etc.) are also transmitted in a digital radio
format called DAB (Digital Audio Broadcasting).

Channels of communication
Mobile communications
Thanks to wireless connectivity, mobile phones and BlackBerrys now let you
check your email, browse the Web and connect with home or company
intranets, all without wires.
The use of GPS in cars and PDAs is widespread, so you can easily navigate in a
foreign city or find the nearest petrol station. In the next few years, GPS chips
will be incorporated into most mobile phones.
Another trend is wearable computers. Can you imagine wearing a PC on your
belt and getting email on your sunglasses? Some devices are equipped with a
wireless modem, a keypad and a small screen; others are activated by voice.
The users of wearable technology are sometimes even called cyborgs'. The
term was invented by Manfred Clynes and Nathan Kline in 1960 to describe
cybernetic organisms - beings that are part robot, part human.

8
27/01/2022

D Read the text again and find the following.


1. the device that allows PCs to communicate over telephone lines
2. the practice of working at home and communicating with the
office by phone and computer
3. the term that refers to the transmission of audio signals (radio) or
audiovisual signals (television)
4. five advantages of digital TV over traditional analogue TV
5. two systems that let you receive multimedia on your mobile phone
6. the term that means without wires
7. devices that deliver email and phone services to users on the move
8. the meaning of the term cyborg

BỊ ĐỘNG - PASSIVE

Cú pháp:
be + past participle + (by)…

Present simple passive is/are + P2


Present continuous passive is/are being + P2
Past simple passive was/were + P2
Past continuous passive was/were + being + P2
Present perfect passive has/have + been + P2
Past perfect passive had + been + P2
Future simple passive will + be + P2
Modal verbs in the passive can/could/may/might… + be + P2

10
27/01/2022

Câu bị động
 động từ be + phân từ quá khứ của động từ chính. Đề cập đến tác nhân = by
 Câu bị động thường được sử dụng trong văn viết kỹ thuật để có giọng văn khách quan.
 Bị động hiện tại đơn
Information is transmitted by devices such as the telephone, radio, TV or ...
 Bị động hiện tại tiếp diễn
New technologies are being devised to allow you to watch TV on your mobile.
 Bị động quá khứ đơn
The term cyborg was invented by M Clynes and N Kline in 1960.
 Bị động quá khứ tiếp diễn
My TV was being repaired, so I couldn't watch the match.
 Bị động hiện tại hoàn thành
It has been predicted that about one third of all work could eventually be performed outside
the workplace.
 Bị động quá khứ hoàn thành
The system had been infected by a virus.
 Bị động tương lai đơn
In the next few years, GPS chips will also be incorporated into most mobile phones.
 Động từ khuyết thiếu trong thể bị động
It has been predicted that about one-third of all work could eventually be performed outside
the workplace.

11

В Read the article and underline all the examples of


the passive. What tenses are they?
A HACKER has been sent to jail for fraudulent use of credit card numbers.
Nicholas Cook, 26, was arrested by police officers near a bank cashpoint last
month.
Eight months earlier, he had been caught copying hundreds of computer
programs illegally. After an official inquiry, he was accused of software piracy
and fined £5,000.
It is reported that in the last few years Cook has been sending malware
(malicious software) to phone operators and attacking mobile phones to steal
business and personal information. Cook has now been sentenced to three
years in prison for stealing passwords and obtaining money by credit card
fraud.
Government officials say that new anti-hacking legislation will be introduced
in the EU next year.

12
27/01/2022

С Complete these sentences with the passive form of the verbs


in brackets.
1. Microprocessors (make) ________________ of silicon.
2. Call centres (use) ________________ to deal with telephone enquiries.
3. In recent years, most mobile phones (equip) ______________________
with Bluetooth.
4. GPS (develop) ___________________ in the 1970s as a military
navigation system.
5. Sorry about the mess - the computers (replace) ___________________
at the moment.
6. In the near future, the Internet (access)_________________ more
frequently from PDAs and mobile phones than from desktop computers.
7. Networks (can connect) ___________________ via satellite.
8. I had to use my laptop this morning while my PC (fix) ______________

13

Listen and answer these questions.


1. What exactly is VoIP?
2. Does the recipient need any special equipment?
3. What is an ATA? What is its function?
4. What is the advantage of Wi-Fi phones over mobile phones?
5. Do you need to have a VoIP service provider?
6. What is spit?

14
27/01/2022

15

16
27/01/2022

In pairs, discuss these questions.


1. How much money do you spend on your mobile?
2. Can you send MMS (multimedia messages) from your mobile?
3. Do you access the Internet from your mobile? Which sites do you
visit?
4. Can you listen to music and watch TV on your mobile?
5. Do you use your mobile phone for business? Do you think it is
secure to carry out financial transactions via mobile phones?
6. Have you ever had to use your phone in an emergency?
7. Do you think that prolonged use of mobile phones can affect our
health (for example cause fatigue and headaches, emit radiation,
excite brain cells, etc.)?

17
27/01/2022

UNIT 14

New technologies

New words
 robotics  nanotechnology
 android  nanometre
 expert system  Nanocomputer
 Biometrics
 nanotransistor
 smart devices
 Artificial Intelligence (Al)  Nanomedicine
 Ubiquitous computing  nanobot
 Ubiquitous devices  Nanomaterial
 pervasive computing  nanotube
 embedded
 smart home
 appliance

2
27/01/2022

Future trends
1 2
By all accounts, nanotechnology - the science of Artificial Intelligence (Al) is the
making devices from single atoms and molecules - science of making intelligent machines
is going to have a huge impact on both business and programs. The term originated in
and our daily lives. Nano devices are measured in the 1940s, when Alan Turing said: “A
nanometres (one billionth of a metre) and are machine has artificial intelligence
expected to be used in the following areas. when there is no discernible
difference between the conversation
• Nanocomputers: Chip makers will make tiny
generated by the machine and that of
microprocessors with nanotransistors, ranging
an intelligent person.” A typical Al
from 60 to 5 nanometres in size.
application is robotics. One example is
• Nanomedicine: By 2020, scientists believe that ASIMO, Honda's intelligent humanoid
nano-sized robots, or nanobots, will be injected robot. Soon, engineers will have built
into the body's bloodstream to treat diseases at the different types of android, with the
cellular level. form and capabilities of humans.
• Nanomaterials: New materials will be made from Another Al application is expert
carbon atoms in the form of nanotubes, which are systems - programs containing
more flexible, resistant and durable than steel or everything that an 'expert' knows
aluminium. They will be incorporated into all kinds about a subject. In a few years,
of products, for example stain-resistant coatings for doctors will be using expert systems to
clothes and scratch-resistant paints for cars. diagnose illnesses.

4
27/01/2022

Future trends
3 4
Imagine you are about to take a holiday in Europe. Ubiquitous computing, also known
You walk out to the garage and talk to your car. as pervasive computing, is a new
Recognizing your voice, the car's doors unlock. On approach in which computer
the way to the airport, you stop at an ATM. A functions are integrated into
camera mounted on the bank machine looks you everyday life, often in an invisible
in the eye, recognizes the pattern of your iris and way. Ubiquitous devices can be
allows you to withdraw cash from your account. anything from smartphones to tiny
When you enter the airport, a hidden camera sensors in homes, offices and cars,
compares the digitized image of your face to that connected to networks, which
of suspected criminals. At the immigration allow information to be accessed
checkpoint, you swipe a card and place your hand anytime and anywhere - in other
on a small metal surface. The geometry of your words, ubiquitously. In the future
hand matches the code on the card, and the gate people will interact naturally with
opens. You're on your way. hundreds of these smart
Does it sound futuristic? Well, the future is devices (objects containing a
here. Biometrics uses computer technology to microchip and memory) every day,
identify people based on physical characteristics each invisibly embedded in our
such as fingerprints, facial features, voice, iris and environment and communicating
retina patterns. with each other without cables.

Ubiquitous: present, appearing, or found everywhere.

Pervasive: spreading widely throughout an area or a


group of people.

6
27/01/2022

Future trends
5
In the ideal smart home, appliances and electronic devices work in sync to
keep the house secure. For example, when a regular alarm system senses
that someone is breaking into the house, it usually alerts the alarm
company and then the police. A smart home system would go further,
turning on the lights in the home and then sending a text message to the
owner's phone. Motorola Home sight even sends images captured by
wireless cameras to phones and PCs.
Smart homes can remember your living patterns, so if you like to listen to
some classical music when you come home from work, your house can do
that for you automatically. They will also know when the house is empty
and make sure all appliances are turned off. All home devices will be
interconnected over a home area network where phones, cable services,
home cinemas, touch screens, smart mirrors and even the refrigerator will
cooperate to make our lives more comfortable.

APPLIANCES

ELECTRONIC DEVICES

8
27/01/2022

С Read the texts again and answer these questions.

1. Which unit of measurement is used in nanotechnology?


2. What are the advantages of nanotubes over regular materials?
3. What will doctors use expert systems for?
4. What features are analysed by biometrics?
5. Which trend refers to computers embedded in everyday devices,
communicating with each other over wireless networks?
6. What will the alarm system do if someone breaks into a smart
home?
7. How will devices be interconnected inside the smart home?

D Find words in the texts with the following meanings.

1. a microscopic robot, built with nanotechnology (text 1) ________


2. a robot that resembles a human (text 2) ____________
3. biological identification of a person (text 3) ____________
4. integrated; inserted into (text 4) ______________
5. electrical devices, or machines, used in the home (text 5)
___________

10
27/01/2022

A Which definition best describes RFID?

a. a smart technology worn on the user's body


so that they can email and access the Web
b. a technology that uses radio waves and chip-
equipped tags to automatically identify people
or things
с. a technology that uses microchips and bar
codes to track people or things at a distance

11

В Decide which answers (a or b) are correct


1. RFID stands for
a. Radio Frequency Identification. b. Radio Frequency Identification Download.
2. Radio tags
a. can only be attached to or embedded into products.
b. can be attached to or embedded into products, animals and humans.
3. Active RFID tags
a. have a communication range of several hundred metres,
b. have a communication range of five metres.
4. RFID chips
a. will help us track ordinary objects like car keys or books,
b. won't be able to locate objects when they are lost or stolen.
5. Radio tags may be implanted under the skin
a. to confirm a patient's identity and cure illnesses,
b. to give doctors instant access to a patient's medical history.
6. According to consumer organizations, RFID tags
a. could be used to track consumers or to steal a person's identity,
b. are secure and private; there is no need for concern.
12
27/01/2022

Thì tương lai


 tương lai đơn (will / wILL not + verb) sử dụng:
 Để đưa ra dự đoán khi bạn không có bằng chứng hiện tại cho thấy điều gì đó sẽ xảy ra.
Nanobots will be injected into the body's bloodstream to treat diseases.
 Để nói về hy vọng và lời hứa, đặc biệt với từ expect, think, hope và probably
They hope that people will interact naturally with hundreds of smart devices at a time.
 Để mô tả một quyết định tức thì, thường khi đưa ra một đề xuất
Sure, I'll help you with your homework.
 Nói về sự thật chắc chắn sẽ xảy ra
She'll be 21 in May.
 be going to + verb sử dụng:
 Mô tả các ý định tương lai
She's going to write a book about ubiquitous computing.
 Để đưa ra dự đoán khi bạn có bằng chứng hiện tại rằng một điều gì đó sẽ xảy ra
By all accounts, nanotechnology is going to have a huge impact on business and our daily lives.
 tương lai tiếp diễn (will be + V-ing) để nói về những hành động tiến triển tại một thời điểm cụ thể
trong tương lai
In a few years, doctors will be using expert systems to diagnose illnesses.
 tương lai hoàn thành (will have + past participle) để nói về các hành động hoàn thành tại một thời
điểm cụ thể trong tương lai.
Soon, engineers will have built different types o f android.

13

A Choose the correct words in brackets to complete


these sentences.
1. In the future, I hope we ('II have /'re going to have) robots in the home
to help us with the housework.
2. Hey, Nick, be careful, you ('re going to spill /'II spill) that coffee on the
computer!
3. It's John's birthday next week. We ('II give/'re going to give) him a mobile
phone.
4. - My laptop has crashed!
- Don't worry. I ('II lend /'m going to lend) you mine.
5. The Internet (will probably change / is probably going to change) the
publishing industry in the way that TV changed the movie industry.
6. Futurists predict that smart technology (will be / is going to be)
incorporated into fabrics, so you'll be able to email from your coat!

14
27/01/2022

B Complete these sentences with the correct future form of the verb
in brackets. Use the future continuous or future perfect.
1. Thanks to ICT, by the year 2030 we (find) ______________ cures for
the major diseases of our time.
2. In twenty years' time, some people (live) ______________ in space,
perhaps inside a computerized colony.
3. By this time next week, I (work) _________________ for IBM.
4. By this time next month, I (buy) _________________ that BlackBerry
that I've been wanting to buy for months.
5. Scientists predict that in twenty years' time nearly everyone (live)
_____________ in smart houses.

15

In pairs, discuss these predictions. Do you agree or


disagree? Give reasons for your answers.
1. Some day, we'll be talking to computers naturally, like friends.
2. Microchips implanted in our arms will serve as ID cards and
contain our medical records.
3. Robots will learn to build themselves, without human help.
4. Smart homes will be voice-activated.
5. Computers will be ubiquitous and almost invisible, embedded into
our homes and integrated into our lives.

16

You might also like