Professional Documents
Culture Documents
Science-And-Technology Vocabulary Development - Information Technology
Science-And-Technology Vocabulary Development - Information Technology
1) _______________
2) _______________
3) _______________
4) _______________
5) _______________
6) _______________
7) _______________
8) _______________
9) _______________
10) _______________
(Source: https://en.wikipedia.org/wiki/File:Personal_computer,_exploded_5.svg )
Task 2. Complete the following crossword puzzle using the clues given on the next page.
1
LCH1067 Academic English (Science and Technology) II
Across
4. a collection of data stored in a computer in an organized way so that you can find individual
pieces of information easily
6. a computer program used for displaying and manipulating rows of figures
8. a security system that prevents unauthorized access to a computer while it is connected to
the Internet
9. a small movable arrow or line on a computer screen that marks the position where, for
example, a character will be entered in a line of text
10. when a computer suddenly stops working
12. a way of marking an internet website so that you can find it again easily
Down
Task 3. Many IT terms are formed by joining two words together. Combine one word from
Column A and one word from Column B to make an IT term and then match the term with its
definition in Column C.
A B C*
word engine an optical input device that uses the reflection of a light
beam to read barcode labels
systems bus the set of conductors that carry the control signals between
the Control Unit and other parts of a computer
2
LCH1067 Academic English (Science and Technology) II
*Note: Definitions in Column C are taken from Glendinning, E. H. & McEwan, J. (2006). Oxford English for
information technology (2nd ed.). Oxford University Press.
Task 4a. Look at the following prefixes and their use in some IT words. Work out the meaning of
each prefix.
intra- intranet
syn- synchronous
up- upload
Task 4b. Complete the words in the following sentences using prefixes in the table above.
1) System _____time can make a company lose thousands of dollars in lost production.
2) After you complete the online registration process, your data will be _____mitted via a
secure link.
3) Many companies distribute internal documents on their own _____net.
3
LCH1067 Academic English (Science and Technology) II
Even worse, adversaries are starting to play the long game; they are hacking into a
network and staying there without being detected. Once a weak entry point into a
system is found, it is used to gain access. So it went with a 2013 hack of Target
stores across the country. Attackers used login credentials for an HVAC company to
access Target’s network, and from there they could access cash machines and
install software to poach credit card information. Losses to the store were
estimated at $420 million.
Protect Yourself
Cyberattacks succeed when people don’t take basic precautions. Here are some
ways you can protect your digital self.
5a. Refer back to Paragraph 1. Put down the definition of each of the following words.
1) ransomware: ______________________________________________________________
2) vulnerability: ______________________________________________________________
3) bitcoin: ___________________________________________________________________
5b. Identify the parts of speech of the underlined words in Paragraph 2. Write your answers in the
space provided below.
(hack)
1) ________They are hacking into a network and staying there without being detected.
2) ______So it went with a 2013 hack of Target stores across the country.
(access)
1) ________ Once a weak entry point into a system is found, it is used to gain access.
2) ________ Attackers used login credentials for an HVAC company to access Target’s
network,
3) ________ and from there they could access cash machines and install software to poach
credit card information.
5c. Complete the section “Protect Yourself” using the appropriate forms of the following
computing verbs:
Computing verbs