Professional Documents
Culture Documents
English For It
English For It
Introduction
Unit 1: Living in the digital age
Unit 2: Computer essentials
Unit 3: Type, click and talk
Unit 4: The operating system (OS)
Unit 5: Spreadsheets and databases
Unit 6: The Internet and email
Unit 7: The Web + Web design
Unit 8: Internet security
Unit 9: Graphics and design
Unit 10: Multimedia
Unit 11: Program design and computer languages
Unit 12: Jobs in ICT
Unit 13: Communication systems
Unit 14: New technologies
Mục tiêu
Cung cấp kiến thức và kỹ năng cần thiết để đọc
hiểu các tài liệu chuyên ngành Công nghệ thông tin
Bổ trợ ngữ pháp và trang bị vốn từ vựng về một số
chủ đề cơ bản thuộc lĩnh vực CNTT
https://sites.google.com/site/phuongnh20589
Phân bố thời gian và đánh giá
Tổng số: 45 tiết lý thuyết chia thành 15 bài học.
Mỗi bài học gồm 3 phần: củng cố ngữ pháp; từ mới; đọc
dịch chuyên ngành.
Điểm quá trình: điểm bài tập lớn + điểm kiểm tra giữa
kz + điểm chuyên cần
Điểm học phần: 40% điểm quá trình + 60% điểm thi hết
môn
Vì sao dân IT cần học Tiếng Anh?
Ngôn ngữ lập trình phát triển dựa trên tiếng Anh
Cập nhật công nghệ mới nhất một cách nhanh nhất
Đọc tài liệu, bản hướng dẫn bằng tiếng Anh
Tham gia các khoá học, tập huấn bởi các chuyên gia nước
ngoài/ ở nước ngoài
Cơ hội du học/ việc làm ở nước ngoài
Lesson 1
Living in a digital age
Match the captions (1- 4) with the pictures (a-d).
1. In education, computers can make all the difference_____
2. Using a cashpoint, or ATM..........
3. The Internet in your pocket..........
4. Controlling air traffic______
1. Khẩu quyết trong đọc dịch tài liệu Tiếng Anh
Để dịch đúng, nhất thiết phải nhận dạng được cấu
trúc câu và phân tích chính xác vai trò ngữ pháp
của từng chữ, từ, dấu hiệu ngữ pháp
Kỹ năng tra từ điển: chú { từ loại, phiên âm
Tra từ thế nào?
Từ điển:
Bản cứng
Bản mềm
Vdict, Laban, …
http://tratu.soha.vn/
https://www.wikipedia.org/
https://dictionary.cambridge.org/
https://translate.google.com/
2. Từ loại
Danh từ (noun):
từ gọi tên người, đồ vật, sự việc hay nơi chốn
Làm chủ ngữ, tân ngữ
Đứng sau tính từ, động từ, mạo từ , giới từ
thường kết thúc bằng: -tion/-ation, -ment, -er, -or, -ant, -ing,
-age, -ship, -ism, -ity, -ness
Động từ (verb):
từ diễn tả một hành động, một tình trạng hay một cảm xúc
Làm vị ngữ, đứng sau chủ ngữ
chia theo thì
2. Từ loại
Tính từ (adj):
bổ nghĩa cho danh từ
Đứng trước N, sau động từ liên kết seem/feel/look/keep/get
thường kết thúc bằng: -ful, -less, -ly, -al, -ble, -ive, -ous, -ish, -y, -
-like, -ic, -ed, -ing
Trạng từ (adv):
Bổ nghĩa cho động từ & tính từ
Trước động từ thường (often, always, usually, seldom....)
Giữa trợ động từ và động từ thường hoặc đầu/cuối câu
thường được thành lập bằng cách thêm đuôi “ly” vào tính từ
Giới từ (Preposition): đứng trước danh từ và đại từ
3. Các thành phần trong câu
• Chủ ngữ
• Vị ngữ
• Tân ngữ
• Trạng ngữ
Chủ ngữ (S)
chủ thể của hành động trong câu
thường là một danh từ (noun) hoặc cụm danh từ (noun
phrase)
Thường đứng đầu câu
quyết định việc chia động từ
Đôi khi câu không có chủ ngữ thật sự, It hoặc There
đóng vai trò chủ ngữ giả.
She saw John at the movie last night. (Where did she see
John? When did she see him?)
She drives very fast. (How does she drive?)
4. Câu
Câu đơn: S + V (+ O).
Câu phức: Mệnh đề chính + liên từ + mệnh đề phụ
(S1+V1) (S2+V2)
Câu điều kiện: If S1 + V1, then S2 + V2.
Xác định động từ chính
Kate is doing her homework.
He can run very fast.
The bridge was built in one year.
Alice practices swimming every day.
Nam learned to swim 3 years ago.
The man that I saw yesterday was Helen’s father.
Tom said that he liked icecream.
I broke my leg when I played football yesterday.
Các cụm từ - Collocations
Collocation là một cụm gồm 2 hay nhiều từ thường
hay đi cùng với nhau theo trật tự.
Collocation không có quy tắc hay công thức cụ thể
ghi nhớ.
Các cụm từ - Collocations
Một số collocations thường gặp có cấu trúc verb + noun:
access the Internet: truy cập internet
perform operations: thực hiện phép tính
do research tìm kiếm
make calls gọi điện thoại
send texts gửi tin nhắn
display data hiển thị dữ liệu
write letters viết thư
store information lưu trữ thông tin
complete exercises hoàn thành bài tập
carry out transactions thực hiện giao dịch
The digital age
1 We are now living in what some people call the digital age, meaning that
computers have become an essential part of our lives. Young people who have grown
up with PCs and mobile phones are often called the digital generation. Computers help
students to perform mathematical operations and improve their maths skills. They
5 are used to access the Internet, to do basic research and to communicate with other
students around the world. Teachers use projectors and interactive whiteboards to
give presentations and teach sciences, history or language courses. PCs are also
used for administrative purposes - schools use word processors to write letters, and
databases to keep records of students and teachers. A school website allows
10 teachers to publish exercises for students to complete online. Students can also
enroll for courses via the website and parents can download official reports.
Mobiles let you make voice calls, send texts, email people and download
logos, ringtones or games. With a built-in camera you can send pictures and make
video calls in face-to-face mode. New smartphones combine a telephone with web
15 access, video, a games console, an MP3 player, a personal digital assistant (PDA) and
a GPS navigation system, all in one.
The digital age (2)
17 In banks, computers store information about the money held by each
customer and enable staff to access large databases and to carry out financial
transactions at high speed. They also control the cashpoints, or ATMs (automatic
teller machines), which dispense money to customers by the use of a PIN-protected
21 card. People use a Chip and PIN card to pay for goods and services. Instead of using
a signature to verify payments, customers are asked to enter a four-digit personal
identification number (PIN), the same number used at cashpoints; this system
makes transactions more secure. With online banking, clients can easily pay bills and
transfer money from the comfort of their homes.
26 Airline pilots use computers to help them control the plane. For example,
monitors display data about fuel consumption and weather conditions. In airport
control towers, computers are used to manage radar systems and regulate air traffic.
On the ground, airlines are connected to travel agencies by computer. Travel agents
use computers to find out about the availability of flights, prices, times, stopovers and
31 many other details.
1 Find the words (1-10)in the text above. Can you guess the meaning from
context? Are they nouns, verbs, adjectives or adverbs? Write n, v, adj or adv next
to each
COMPUTER ESSENTIALS
1 CPU 6 Mouse
2 DVD drive 7 CD/DVD
3 USB port 8 Printer
4 Modem/Router 9 Monitor/Screen
5 Keyboard 10 Webcam
1. Mouse 2. Screen 3. Hard drive 4. CPU 5. Printer
What is a computer?
A computer is an electronic machine which can accept data in a certain
form, process the data, and give the results of the processing in a specified
format as information.
First, data is fed into the computer's memory. Then, when the program is run,
the computer performs a set of instructions and processes the data. Finally, we
can see the results (the output) on the screen or in printed form (see Fig.
1below).
A computer system consists of two parts: hardware and software. Hardware is
any electronic or mechanical part you can see or touch. Software is a set of
instructions, called a program, which tells the computer what to do. There are
three basic hardware sections: the central processing unit (CPU), main memory
and peripherals.
Perhaps the most influential component is the central processing unit. Its
function is to execute program instructions and coordinate the activities of all the
other units. In a way, it is the 'brain' of the computer. The main memory (a
collection of RAM chips) holds the instructions and data which are being
processed by the CPU. Peripherals are the physical units attached to the
computer. They include storage devices and input/output devices.
What is a computer?
Storage devices (hard drives, DVD drives or flash drives)
provide a permanent storage of both data and programs. Disk
drives are used to read and write data on disks. Input devices
enable data to go into the computer's memory. The most common
input devices are the mouse and the keyboard. Output devices
enable us to extract the finished product from the system. For
example, the computer shows the output on the monitor or prints
the results onto paper by means of a printer.
On the rear panel of the computer, there are several ports
into which we can plug a wide range of peripherals - a modem, a
digital camera, a scanner, etc. They allow communication between
the computer and the devices. Modern desktop PCs have USB
ports and memory card readers on the front panel.
B Listen again and decide whether these sentences
are true or false. Correct the false ones.
used to
have for
for controlling
features
can
works by
allows to
Describing functions and features
for + gerund
This is a device for controlling the cursor and selecting items on the screen.
FUNCTIONS
used + to + infinitive
It's used to control
relative pronoun + verb
This is a device which controls ...
relative pronoun + used + to + infinitive
This is a device which/that is used to control
work by + gerund
It works by detecting light from the computer screen.
An optical mouse has an optical sensor instead of a ball underneath.
FEATURES
• Danh từ đếm được là người hoặc • Danh từ không đếm được là vật mà ta
vật mà chúng ta có thể đếm được. không thể đếm được; không có dạng số
Chúng có dạng số ít và số nhiều (ví nhiều (ví dụ software, music, robotics,
dụ file, program, system, multimedia, networking, storage)
application) A lot of software these days is open-source.
• Danh từ đếm được bắt buộc phải Not: A lot of softwares these days are open-
có mạo từ đi kèm (a, an, the, my, source.
this…) ở thể số ít, không bắt buộc • a/an không được sử dụng với những danh
ở thế số nhiều. từ không đếm được.
• Một số danh từ đếm được trong tiếng Việt nhưng lại không đếm được trong
tiếng Anh, và được sử dụng với động từ số ít (ví dụ: advice, damage, equipment,
furniture, research, news, progress, homework)
• Không sử dụng the với danh từ không đếm được hoặc số nhiều của danh từ
đếm được
I like music (Not: I like the music)
Computer programs are expensive (NOT: The computer programs are expensive)
• Many, few, a few chỉ đi với những danh từ đếm được. Much, little, a little, a
great deal of chỉ đi với danh từ không đếm được.
B. Complete this text with a, an, the or nothing.
an
Linux is (1)______operating a hobby
system and it was initially created as (2)______
by a young student, Linus Torvalds, at the University of Helsinki in Finland. Version
The
1.0 of the Linux Kernel* was released in 1994. (3)_______Kernel, at the heart of
all Linux systems, is developed and released under GNU General Public License,
and its source code is freely available to everyone.
Apart from the fact that it’s freely distributed, (4)______ Linux’s functionality,
adaptability and robustness has made it the main alternative for proprietary Unix
and Microsoft operating systems. IBM, Hewlett-Packard and other giants of the
computing world have embraced Linux and support its ongoing development.
a
More than (5 )_______ decade after its initial release, Linux is being adopted
a
worldwide, primarily as (6)_______ server platform. Its use as a home and office
desktop operating system is also on the rise. The operating system can also be
incorporated directly into (7)_______ microchips in a process called (8)________
embedding, and it is increasingly being used this way in appliances and devices.
*The Kernel provides a way for software and other parts of the OS to
communicate with hardware.
UNIT 5
row
True 1. The value of the cell C12 is the result of applying the formula C5 – C10.
False B2,and
2. The value of cell B5 is the result of adding the value in cells B2 B3 B3.
and B4.
True 3. If you type the value 800 in C3, the value in cells C5 and C12 will be
recalculated.
Company
VAT
Grand total
Dear Ms Atkinson
I am writing to
I am enclosing
We would be grateful if you could
Please contact us
Yours sincerely
DATABASES
The Web
Look at the screenshot of a typical web page. How many of
the features (a-k) can you say in English?
internet auction
1. Occasionally I also buy things on ................................. sites such as
eBay, where people offer and sell things to the highest bidder.
browse
2. First you enter a site dedicated to e-commerce and...............................
their products.
shopping cart
3. Then you put the items you want to buy into a virtual ............................
- a program that lets you select the products and buy with a credit card.
log in
4. You may have to.............................with a username and a password ...
5. ... for some transactions, you will be required to use a TAN, a
authorization number.
transaction ..........................
6. Be aware of phishing - you may receive……………………. fake emails claiming to
be from your bank and asking for personal information or account details
steal
in an attempt to..........................your identity.
Tiền tố e- và cyber-
Tiền tố e- xuất phát từ electronic, thêm vào trước hành động
diễn ra trong máy tính/online
Ví dụ
e-business/e-commerce : kinh doanh qua Internet
e-card, e-learning, e-zine, e-voting, e-signature, e-assessment, e-
cash, e-book, e-pal, …
Có thể có hoặc không có dấu nối –
Internet security
Cybercrimes
• Piracy - the illegal copy and distribution of copyrighted software, games or
music files
• Plagiarism and theft of intellectual property - pretending that someone else's
work is your own
• Spreading of malicious software
• Phishing (password harvesting fishing) - getting passwords for online bank
accounts or credit card numbers by using emails that look like they are from real
organizations, but are in fact fake; people believe the message is from their bank
and send their security details
• IP spoofing - making one computer look like another in order to gain
unauthorized access
• Cyberstalking - online harassment or abuse, mainly in chat rooms or
newsgroups
• Distribution of indecent or offensive material
Hacker /ˈhækɚ/ n
Some one who invades a network’s privacy. Originally, all computer enthusiasts and
skilled programmers were known as hackers, but during the 1990s, the term hacker
became synonymous with cracker , a person who breaks security on computers.
Today, people often use the word hacker to mean both things. In the computer
industry, hackers are known as white hats and crackers are called black hats
or darkside hackers.
Virus /ˈvaɪrəs/ n
A piece of software which attaches itself to a file. Once you run an infected
program, the virus quickly spreads to the system files and other software. Some
viruses can destroy the contents of hard disk.
В Match the captions (1 -4)with the pictures(a-d).
a b
c d
Security and privacy on the Internet
There are many benefits from an open system like the Internet, but one of the risks is that we are
often exposed to hackers, who break into computer systems just for fun, to steal information, or to
spread viruses (see note below). So how do we go about making our online transactions secure?
Security on the Web
Security is crucial when you send confidential information online. Consider, for example, the
process of buying a book on the Web. You have to type your credit card number into an order
form which passes from computer to computer on its way to the online bookstore. If one of the
intermediary computers is infiltrated by hackers, your data can be copied.
To avoid risks, you should set all security alerts to high on your web browser. Mozilla Firefox
displays a lock when the website is secure and allows you to disable or delete cookies - small files
placed on your hard drive by web servers so that they can recognize your PC when you return to
their site.
If you use online banking services, make sure they use digital certificates - files that are like digital
identification cards and that identify users and web servers. Also be sure to use a browser that is
compliant with SSL (Secure Sockets Layer), a protocol which provides secure transactions.
Email privacy
Similarly, as your email travels across the Net, it is copied temporarily onto many computers in
between.This means that it can be read by people who illegally enter computer systems.
The only way to protect a message is to put it in a sort of virtual envelope - that is, to encode it
with some form of encryption. A system designed to send email privately is Pretty Good Privacy, a
freeware program written by Phil Zimmerman.
Security and privacy on the Internet
Network security
Private networks can be attacked by intruders who attempt to obtain information such as Social Security
numbers, bank accounts or research and business reports. To protect crucial data, companies hire security
consultants who analyse the risks and provide solutions. The most common methods of protection are
passwords for access control, firewalls, and encryption and decryption systems. Encryption changes data
into a secret code so that only someone with a key can read it. Decryption converts encrypted data back
into its original form.
Malware protection
Malware (malicious software) are programs designed to infiltrate or damage your computer, for example
viruses, worms, Trojans and spyware. A virus can enter a PC via a disc drive – if you insert an infected disc -
or via the Internet. A worm is a self-copying program that spreads through email attachments; it replicates
itself and sends a copy to everyone in an address book. ATrojan horse is disguised as a useful program; it
may affect data security. Spyware collects information from your PC without your consent. Most spyware
and adware (software that allows pop-ups - that is, advertisements that suddenly appear on your screen) is
included with'free'downloads.
If you want to protect your PC, don't open email attachments from strangers and take care when
downloading files from the Web. Remember to update your anti-virussoftware as often as possible, since
new viruses are being created all the time.
Note: Originally, all computer enthusiasts and skilled programmers were known ashackers, but during the 1990s, the
term hacker became synonymous withcracker - a person who uses technology for criminal aims. Nowadays, people
often use the word hacker to mean both things. In the computer industry, hackers are known as white hats and
crackers are called black hats or darkside hackers.
В Read the text more carefully and answer these questions.
1. Why is security so important on the Internet?
• Because the Internet is an open system and we are exposed to hackers who break into
computer systems to steal or destroy data. Security is crucial when we send confidential
information such as credit card numbers.
2. What security features are offered by Mozilla Firefox?
• Mozilla Firefox displays a lock when the website is secure and allows you to disable or
delete cookies.
3. What security protocol is used by banks to make online transactions secure?
• Bank use SSL (Secure Sockets Layer), a protocol which provides secure transactions.
4. How can we protect our email and keep it private?
• We can encode our email using an encryption program like Pretty Good Privacy.
5. What methods are used by companies to make internal networks secure?
• The most common methods to protect private networks are passwords for access
control, firewalls, and encryption & decryption systems
6. In what ways can a virus enter a computer system?
• A virus can enter a PC via an infected disc or via the Internet.
7. How does a worm spread itself?
• A worm spreads through email attachments; it replicates itself and sends a copy to
everyone in an email address book.
С Solve the clues and complete the puzzle.
1. Users have to enter a ............... to gain access to a network.
2. A……………. protects a company intranet from outside attacks.
3. A ................. is a person who uses their computer skills to enter
computers and networks illegally.
4. ................ can infect your files and corrupt your hard drive.
5. You can download................ from the Net; this type of software
is available free of charge but protected by copyright.
6. Encoding data so that unauthorized users can't read it is known
as......................
7. This company uses....................techniques to decode (or
decipher) secret data.
8. Most................... is designed to obtain personal information
without the user's permission.
4 The history of hacking
The past simple
Quá khứ đơn: để nói về một hành động hoàn chỉnh hoặc sự kiện đã xảy ra
vào một thời điểm cụ thể trong quá khứ.
Động từ thường chia thì quá khứ đơn = infinitive + -(e)d
John Draper discovered that a whistle...
Câu hỏi và phủ định sử dụng did/didn’t
When did Captain Zap hack into the Pentagon?
He didn't expect that his most famous exploit...
Động từ bất quy tắc
Kevin Mitnick began hacking into...
When did Kevin Mitnick begin hacking into ...?
He didn't begin hacking until 1974.
Quá khứ bị động = quá khứ đơn của be + quá khứ phân từ.
IBM international network was paralysed by hackers.
He wasn't sent to prison.
Why was Nicholas Whitely arrested in 1998?
Complete Part 2 of the text with the past simple form
of the verbs in the box.
show spread steal launch attempt overwrite be infect affect
was
showed
attempted
launched
spread
overwrote
infected
stole
affected
В Read these landmarks in the history of the Internet
Multimedia
E-books
computer-
encyclopedia
based
and
training dictionary
courses
How many
products can you
virtual think of that slide
reality
incorporate presentation
systems
multimedia? Make
a list.
3G mobile
web page
phones
computer
games
Listen to a sales assistant in a computer shop explaining to a
customer the system requirements needed to run multimedia
software. Which answers (a or b) best describe what she says?
Listen again and complete this diagram of a multimedia
system.
Fast
Interactive
High-quality Sound
Speakers Animation
Headphones
Rippers
Microphone
Multimedia magic!
The potential of multimedia
a ______________________________
Multimedia applications are used in all sorts of fields. For example, museums, banks and estate
agents often have information kiosks that use multimedia; companies produce training
programs on optical discs; businesspeople use Microsoft PowerPoint to create slideshows; and
teachers use multimedia to make video projects or to teach subjects like art and music. They
have all found that moving images and sound can involve viewers emotionally as well as inform
them, helping make their message more memorable.
The power of multimedia software resides in hypertext, hypermedia and interactivity (meaning
the user is involved in the programme). If you click on a hypertext link, you can jump to another
screen with more information about a particular subject. Hypermedia is similar, but also uses
graphics, audio and video as hypertext elements.
Sound, Music, MIDI
b _______________________________
As long as your computer has a sound card, you can use it to capture sounds in digital format
and play them back. Sound cards offer two important capabilities: a built-in stereo synthesizer
and a system called MIDI, or Musical Instrument Digital Interface, which allows electronic
musical instruments to communicate with computers. A Digital Audio Workstation (DAW) lets
you mix and record several tracks of digital audio.
You can also listen to music on your PC, or transfer it to a portable MP3 player. MP3 is short for
MPEG audio player 3, a standard format that compresses audio files. If you want to create your
own MP3 files from CDs, you must have a CD ripper, a program that extracts music tracks and
saves them on disk as MP3s.
Multimedia magic!
Audio is becoming a key element of the Web. Many radio stations broadcast live over the
Internet using streaming audio technology, which lets you listen to audio in a continuous
stream while it is being transmitted. The broadcast of an event over the Web, for example a
concert, is called a webcast. Be aware that you won't be able to play audio and video on the
Web unless you have a plug-in like RealPlayer or QuickTime.
Creating and editing movies
c _________________________
Video is another important part of multimedia. Video computing refers to recording,
manipulating and storing video in digital format. If you wanted to make a movie on your
computer, first you would need to capture images with a digital video camera and then transfer
them to your computer. Next, you would need a video editing program like iMovie to cut your
favourite segments, re-sequence the clips and add transitions and other effects. Finally, you
could save your movie on a DVD or post it on websites like YouTube and Google Video.
Products full of pictures, action and sound
d ________________________
Multimedia is used to produce dictionaries and encyclopedias. They often come on DVDs, but
some are also available on the Web. A good example is the Grolier Online Encyclopedia, which
contains thousands of articles, animations, sounds, dynamic maps and hyperlinks. Similarly, the
Encyclopedia Britannica is now available online, and a concise version is available for iPods,
PDAs and mobile phones. Educational courses on history, science and foreign languages are
also available on DVD. Finally, if you like entertainment, you'll love the latest multimedia video
games with surround sound, music soundtracks, and even film extracts.
B Correct the technical mistakes in these sentences.
2
4
5
Computer languages
Unfortunately for us, computers can't understand spoken English or any other natural
language. The only language they can understand directly is machine code, which consists of 1s
and 0s (binary code).
Machine code is too difficult to write. For this reason, we use symbolic languages to
communicate instructions to the computer. For example, assembly languages use abbreviations
such as ADD, SUB, MPY to represent instructions. The program is then translated into machine
code by a piece of software called an assembler. Machine code and assembly languages are
called low-level languages because they are closer to the hardware. They are quite complex and
restricted to particular machines. To make the programs easier to write, and to overcome the
problem of intercommunication between different types of computer, software developers
designed high-level languages, which are closer to the English language. Here are some
examples:
■FORTRAN was developed by IBM in 1954 and is still used for scientific and engineering
applications.
■COBOL (Common Business Oriented Language) was developed in 1959 and is mainly used for
business applications.
■BASIC was developed in the 1960s and was widely used in microcomputer programming
because it was easy to learn. Visual BASIC is a modern version of the old BASIC language, used
to build graphical elements such as buttons and windows in Windows programs.
■PASCAL was created in 1971. It is used in universities to teach the fundamentals of
programming.
Computer languages
■С was developed in the 1980s at AT&T. It is used to write system software, graphics and
commercial applications. C++ is a version of С which incorporates object-oriented
programming: the programmer concentrates on particular things (a piece of text, a graphic or a
table, etc.) and gives each object functions which can be altered without changing the entire
program. For example, to add a new graphics format, the programmer needs to rework just the
graphics object. This makes programs easier to modify.
■ Java was designed by Sun in 1995 to run on the Web. Java applets provide animation and
interactive features on web pages. Programs written in high-level languages must be translated
into machine code by a compiler or an interpreter. A compiler translates the source code into
object code - that is, it converts the entire program into machine code in one go. On the other
hand, an interpreter translates the source code line by line as the program is running.
It is important not to confuse programming languages with markup languages, used to create
web documents. Markup languages use instructions, known as markup tags, to format and link
text files. Some examples include:
■ HTML, which allows us to describe how information will be displayed on web pages.
■ XML, which stands for Extensible Markup Language. While HTML uses pre-defined tags, XML
enables us to define our own tags; it is not limited by a fixed set of tags.
■ VoiceXML, which makes Web content accessible via voice and phone. VoiceXML is used to
create voice applications that run on the phone, whereas HTML is used to create visual
applications (for example, web pages).
В Read the text again and answer these questions.
1. __________
XML allows us to create our own tags to describe our data
better. We aren't constrained by a pre-defined set of tags the way we
are with HTML.
2. IBM developed _____________
FORTRAN in the 1950s. It was the first high-
levellanguage in data processing.
3. Java
___________ applets are small programs that run automatically on
web pages and let you watch animated characters, play games, etc.
4. ____________
VoiceXML is the HTML of the voice web. Instead of using a web
browser and a keyboard, you interact with a voice browser by listening
to pre-recordedaudio output and sending audio input through a
telephone.
5. This language is widely used in the business community. For example,
the statement ADD VAT to NET-PRICE could be used in a __________
COBOL
program.
Are the words in the boxes nouns, verbs or adjectives? Write n, v or adj
next to each word. Complete the sentences with words from the boxes.
n or v n n adj
Programming
program
programmer
programmable
v n n
compilation
compiler
compile
n or v v n n
bug
debugger debug
debugging
Động từ nguyên thể
Để thể hiện mục đích:
We use symbolic languages to communicate instructions to the computer.
(= in order to communicate...)
Sau tính từ
BASIC was widely used in the past because it was easy to learn.
Machine code is too difficult to write. (= not easy enough to write)
Sau một số động từ (ví dụ afford, demand, plan, agree, expect, promise, appear,
hope, refuse, arrange, learn, try, decide, manage)
A lot of companies are now trying to develop voice applications for web access.
Sau đối tượng của một số động từ nhất định (ví dụ advise, encourage, allow,
expect, tell, ask, invite, want, enable, order, warn)
HTML allows us to describe how information will be displayed on web pages.
Sau động từ khuyết thiếu (can, could, may, might, will, would, must, should)
Unfortunately, computers can't understand spoken English.
High-level languages must be translated into machine code.
Sau đối tượng của các động từ make, let
Programs make computers perform specific tasks.
A Look at the HELP box and then make sentences using
these prompts.
1. not easy / write instructions in COBOL
It's not easy to write instructions in COBOL
2. expensive / set up a data-processing area
3. advisable / test the programs under different conditions
4. unusual / write a program that works correctly the first time it's
tested
5. important/use a good debugger to fix errors
6. easy/learn Visual BASIC
В Choose the correct words (a-c) to complete these sentences
1. We use high-level languages because machine code is too difficult ___________,
understand and debug.
a. read b. reading c. to read
2. I went on the course ___________ how to be a better programmer.
a learn b to learn с for to learn
3. I'm not interested in __________ that computer language.
a learn b learning с to learn
4. He refuses ________ the project with me.
a do b doing с to do
5. The engineers warned the employees not _________ the cables.
a touch b touching с to touch
6. They may not ________ to the conference.
a come b coming с to come
7. Spyware can make your PC __________ more slowly.
a perform b performing с to perform
8. This program is too slow __________ the simulation.
a do b to do с for doing
A Work in pairs. Student A reads about Visual BASIC, Student B reads
about VoiceXML. Try not to look at your partner’s text. Complete
your part of the table.
Visual BASIC VoiceXML
Jobs in ICT
hardware engineer
software engineer
blog administrator
DTP operator
network administrator
webmaster
computer security specialist
help desk technician
Webmaster Task
Advise internal groups on all issues relating to the web site.
Own site releases, QA signoff, and documentation.
Ensure site is optimized and is cross-platform and cross-browser compatible.
Design, develop, and execute site architecture and navigation including
redesigns and upgrades.
Collaborate with creative staff on design and layout issues to facilitate web
publishing.
Webmaster Salary
The average salary for a Webmaster is $51,533 per year. Most people with this
job move on to other positions after 20 years in this career. Pay for this job
rises steadily for more
Hardware Engineer Tasks
Define and coordinate corrective action changes.
Write documentation and test specifications.
Research, design, develop, and test computer or computer-related
equipment.
Provide technical support to team members.
Analyst programmer
Communication systems
People
Data
Call centre
Digital radio
Digital TV
Fax
GPS
Teletext
Wearable computer
С Complete these sentences with words and phrases from В
Cú pháp:
be + past participle + (by)…
Ringtone
Changeable faceplate
Keypad
SIM card
(Subscriber Identity Module)
In pairs, discuss these questions.
1. How much money do you spend on your mobile?
2. Can you send MMS (multimedia messages) from your mobile?
3. Do you access the Internet from your mobile? Which sites do you
visit?
4. Can you listen to music and watch TV on your mobile?
5. Do you use your mobile phone for business? Do you think it is
secure to carry out financial transactions via mobile phones?
6. Have you ever had to use your phone in an emergency?
7. Do you think that prolonged use of mobile phones can affect our
health (for example cause fatigue and headaches, emit radiation,
excite brain cells, etc.)?
Artificial
Nanotechnology Smart home
Intelligence (AI)
Facial
Data mining
recognition
What it is?
How does it work?
Benefits/Challenges?
Application?
UNIT 14
New technologies
Future trends
1 2
By all accounts, nanotechnology - the science of Artificial Intelligence (Al) is the
making devices from single atoms and molecules - science of making intelligent machines
is going to have a huge impact on both business and programs. The term originated in
and our daily lives. Nano devices are measured in the 1940s, when Alan Turing said: “A
nanometres (one billionth of a metre) and are machine has artificial intelligence
expected to be used in the following areas. when there is no discernible
difference between the conversation
• Nanocomputers: Chip makers will make tiny
generated by the machine and that of
microprocessors with nanotransistors, ranging
an intelligent person.” A typical Al
from 60 to 5 nanometres in size.
application is robotics. One example is
• Nanomedicine: By 2020, scientists believe that ASIMO, Honda's intelligent humanoid
nano-sized robots, or nanobots, will be injected robot. Soon, engineers will have built
into the body's bloodstream to treat diseases at the different types of android, with the
cellular level. form and capabilities of humans.
• Nanomaterials: New materials will be made from Another Al application is expert
carbon atoms in the form of nanotubes, which are systems - programs containing
more flexible, resistant and durable than steel or everything that an 'expert' knows
aluminium. They will be incorporated into all kinds about a subject. In a few years,
of products, for example stain-resistant coatings for doctors will be using expert systems to
clothes and scratch-resistant paints for cars. diagnose illnesses.
Future trends
3 4
Imagine you are about to take a holiday in Europe. Ubiquitous computing, also known
You walk out to the garage and talk to your car. as pervasive computing, is a new
Recognizing your voice, the car's doors unlock. On approach in which computer
the way to the airport, you stop at an ATM. A functions are integrated into
camera mounted on the bank machine looks you everyday life, often in an invisible
in the eye, recognizes the pattern of your iris and way. Ubiquitous devices can be
allows you to withdraw cash from your account. anything from smartphones to tiny
When you enter the airport, a hidden camera sensors in homes, offices and cars,
compares the digitized image of your face to that connected to networks, which
of suspected criminals. At the immigration allow information to be accessed
checkpoint, you swipe a card and place your hand anytime and anywhere - in other
on a small metal surface. The geometry of your words, ubiquitously. In the future
hand matches the code on the card, and the gate people will interact naturally with
opens. You're on your way. hundreds of these smart
Does it sound futuristic? Well, the future is devices (objects containing a
here. Biometrics uses computer technology to microchip and memory) every day,
identify people based on physical characteristics each invisibly embedded in our
such as fingerprints, facial features, voice, iris and environment and communicating
retina patterns. with each other without cables.
Ubiquitous: present, appearing, or found everywhere.
ELECTRONIC DEVICES
С Read the texts again and answer these questions.