Professional Documents
Culture Documents
English For IT
English For IT
Introduction
Unit 1: Living in the digital age
Unit 2: Computer essentials
Unit 3: Type, click and talk
Unit 4: The operating system (OS)
Unit 5: Spreadsheets and databases
Unit 6: The Internet and email
Unit 7: The Web + Web design
Unit 8: Internet security
Unit 9: Graphics and design
Unit 10: Multimedia
Unit 11: Program design and computer languages
Unit 12: Jobs in ICT
Unit 13: Communication systems
Unit 14: New technologies
Mục tiêu
https://sites.google.com/site/
phuongnh20589 Phân bố thời gian và đánh giá
• Chủ ngữ
• Vị ngữ
• Tân ngữ
• Trạng ngữ
Chủ ngữ (S)
chủ thể của hành động trong câu
thường là một danh từ (noun) hoặc cụm danh từ (noun
phrase)
Thường đứng đầu câu
quyết định việc chia động từ
Đôi khi câu không có chủ ngữ thật sự, It hoặc There
đóng vai trò chủ ngữ giả.
She saw John at the movie last night. (Where did she see
John? When did she see him?)
She drives very fast. (How does she drive?)
4. Câu
Câu đơn: S + V (+ O).
Câu phức: Mệnh đề chính + liên từ + mệnh đề phụ
(S1+V1) (S2+V2)
Câu điều kiện: If S1 + V1, then S2 + V2.
Xác định động từ chính
Kate is doing her homework.
He can run very fast.
The bridge was built in one year.
Alice practices swimming every day.
Nam learned to swim 3 years ago.
The man that I saw yesterday was Helen’s father.
Tom said that he liked icecream.
I broke my leg when I played football yesterday.
Các cụm từ - Collocations
Collocation là một cụm gồm 2 hay nhiều từ
thường hay đi cùng với nhau theo trật tự.
Collocation không có quy tắc hay công thức cụ thể
ghi nhớ.
Các cụm từ - Collocations
Một số collocations thường gặp có cấu trúc verb +
noun:
access the Internet: truy cập internet
perform operations: thực hiện phép tính
do research tìm kiếm
make calls gọi điện thoại
send texts gửi tin nhắn
display data hiển thị dữ liệu
write letters viết thư
store information lưu trữ thông tin
complete exercises hoàn thành bài tập
carry out transactions thực hiện giao dịch
give presentations and teach sciences, history or language courses. PCs are also
used for administrative purposes - schools use word processors to write letters, and
databases to keep records of students and teachers. A school website allows 10 teachers
to publish exercises for students to complete online. Students can also enroll for courses
via the website and parents can download official reports.
Mobiles let you make voice calls, send texts, email people and download logos,
ringtones or games. With a built-in camera you can send pictures and make video calls in
face-to-face mode. New smartphones combine a telephone with web 15 access, video, a
games console, an MP3 player, a personal digital assistant (PDA) and a GPS navigation
system, all in one.
26 Airline pilots use computers to help them control the plane. For example, monitors
display data about fuel consumption and weather conditions. In airport
control towers, computers are used to manage radar systems and regulate air traffic.
On the ground, airlines are connected to travel agencies by computer. Travel agents
use computers to find out about the availability of flights, prices, times, stopovers and 31
many other details.
1 Find the words (1-10)in the text above. Can you guess the meaning from
context? Are they nouns, verbs, adjectives or adverbs? Write n, v, adj or adv next
to each
COMPUTER ESSENTIALS
1 CPU 6 Mouse
2 DVD drive 7 CD/DVD
3 USB port 8 Printer
4 Modem/Router 9 Monitor/Screen
5 Keyboard 10 Webcam
1. Mouse 2. Screen 3. Hard drive 4. CPU 5. Printer
What is a computer?
A computer is an electronic machine which can accept data in a certain form,
process the data, and give the results of the processing in a specified format as
information.
First, data is fed into the computer's memory. Then, when the program is run,
the computer performs a set of instructions and processes the data. Finally, we
can see the results (the output) on the screen or in printed form (see Fig.
1below).
A computer system consists of two parts: hardware and software. Hardware is
any electronic or mechanical part you can see or touch. Software is a set of
instructions, called a program, which tells the computer what to do. There are
three basic hardware sections: the central processing unit (CPU), main memory
and peripherals.
Perhaps the most influential component is the central processing unit. Its
function is to execute program instructions and coordinate the activities of all
the other units. In a way, it is the 'brain' of the computer. The main memory (a
collection of RAM chips) holds the instructions and data which are being
processed by the CPU. Peripherals are the physical units attached to the
computer. They include storage devices and input/output devices.
What is a computer?
Storage devices (hard drives, DVD drives or flash drives) provide a
permanent storage of both data and programs. Disk drives are
used to read and write data on disks. Input devices enable data to
go into the computer's memory. The most common input devices
are the mouse and the keyboard. Output devices enable us to
extract the finished product from the system. For example, the
computer shows the output on the monitor or prints the results
onto paper by means of a printer.
On the rear panel of the computer, there are several ports into
which we can plug a wide range of peripherals - a modem, a digital
camera, a scanner, etc. They allow communication between the
computer and the devices. Modern desktop PCs have USB ports
and memory card readers on the front panel.
B Listen again and decide whether these sentences
are true or false. Correct the false ones.
Classifying
Some typical expressions for classifying are:
... are classified into X
types/categories ... are classified by ...
... can be divided into X types/categories
Digital computers can be divided into five main types: mainframes,
desktop PCs, laptops, tablet PCs and handheld PDAs.
... include(s)...
... consist(s) of...
The basic configuration of a mainframe consists of a centraI
system which processes immense amounts of data very quickly.
There are X types/classes of...
X is a type of...
A tablet PC is a type of notebook computer.
Use suitable classifying expressions to complete
these sentences.
used to
have for
for controlling
features
can
works by
allows to
Describing functions and features
for + gerund
This is a device for controlling the cursor and selecting items on the screen.
FUNCTION
used
+ to + infinitive
It's used to control
relative pronoun + verb
This is a device which controls ...
S
a, Alphanumeric keys
b, Function keys c,
Numeric keypad d,
Cursor control keys e,
Dedicated keys
MOUSE ACTIONS
A mouse allows you to (1)…………………control . the cursor and move around the
screen very quickly. Making the same movements with the arrow keys on the
keyboard would take much longer. As you (2) ………………move the mouse on your
desk, the pointer on the screen moves in the same direction.The pointer usually
looks like an l-bar,an arrow, or a pointing hand, depending on what you are doing.
A mouse has one or more buttons to communicate with the computer. For
example, if you want to place the insertion point or choose a menu option, you just
(3) …………click .. (press and release) on the mouse button, and the option is chosen.
The mouse is also used to (4) ……………select .. text and items on the screen. You can
highlight text to be deleted, copied or edited in some way.
The mouse is widely used in graphics and design. When you want to move an
image, you position the pointer on the object you want to move, press the mouse
button, and (5) ……………drag .. the image to a new location on the screen. Similarly,
the mouse is used to change the shape of a graphic object. For example, if you
want to convert a square into a rectangle, you (6) ……………grab . one corner of the
square and stretch it into a rectangle.
The mouse is alsoused to start a program or open a document: you put the pointer
on the file name and (7) …………………………double-click on the name - that is, you
rapidly press and release the mouse button twice.
The set of program instructions that tell the computer what to do is known
as (1)__________software . It can be classified into two basic categories:
• The (2)_________________,system software which includes all the
programs that control the basic functions of a computer (e.g. operating
systems, programming software, device drivers and utilities).
• the (3)__________________,applications software which comprises
programs that let you do specific tasks. Typical applications include
word processing, databases, educational programs, email and video
games.
The (4)________________operating system is a set of programs that
control the hardware and software resources of a computer system.
Typical functions include handling input/output operations, running
programs and organizing files on disks.
• Danh từ đếm được là người hoặc • Danh từ không đếm được là vật mà ta
vật mà chúng ta có thể đếm được. không thể đếm được; không có dạng số
Chúng có dạng số ít và số nhiều (ví nhiều (ví dụ software, music, robotics,
dụ file, program, system, multimedia, networking, storage)
application) A lot of software these days is open-source.
• Danh từ đếm được bắt buộc phải Not: A lot of softwares these days are
có mạo từ đi kèm (a, an, the, my, opensource.
this…) ở thể số ít, không bắt buộc ở • a/an không được sử dụng với những danh
thế số nhiều. từ không đếm được.
• Một số danh từ đếm được trong tiếng Việt nhưng lại không đếm được trong tiếng
Anh, và được sử dụng với động từ số ít (ví dụ: advice, damage, equipment,
furniture, research, news, progress, homework)
• Không sử dụng the với danh từ không đếm được hoặc số nhiều của danh từ đếm
được
I like music (Not: I like the music)
Computer programs are expensive (NOT: The computer programs are expensive)
• Many, few, a few chỉ đi với những danh từ đếm được. Much, little, a little, a
*The Kernel provides a way for software and other parts of the OS to
communicate with hardware.
UNIT 5
Spreadsheets and databases
B - Look at the worksheet and label a, b and с with column, row and
cell.
column cell
row
collection of cells
True 1. The value of the cell C12 is the result of applying the formula C5 – C10.
False 2. The value of cell B5 is the result of adding the value in cells B2 and
B3.B2, B3 and B4. True 3. If you type the value 800 in C3, the value in cells
C5 and C12 will be recalculated.
Dear Ms Atkinson
I am writing to
I am enclosing
We would be grateful if you could
Please contact us
Yours sincerely
DATABASES
DATABASES
A database program lets you create an index - a list of records ordered according
to the content of certain fields. This helps you to search the database and sort
records into numerical or alphabetical order very guickly. Modern databases are
relational - that is, they are made up of related files: customers and orders,
vendors and purchases, students and tutors, etc.Two database files can be related
as long as they have a common field. A file of students, for example, could include
a field called Tutor ID and another file with details of the tutors could include the
same field. This key field can be used to relate the two files. Databases like Oracle,
DB2 and MySQL can manage these relationships.
A database query function allows you to extract information according to certain
conditions or criteria. For example, if a managing director wanted to know all the
customers that spend more than €8,000 per month, the program would search on
the name field and the money field simultaneously.
The best database packages also include network facilities, which can make
businesses more productive. For example, managers of different departments can
have direct access to a common database. Most aspects of the program can be
protected by user-defined passwords and other security devices. For example, if
you wanted to share an employee's personal details but not their commission,
you could protect the commission field.
D. Complete these statements about databases using
information from the text.
Plurals – số nhiều
Danh từ số nhiều trong tiếng Anh Từ kết thúc bằng: phụ âm + y, thì у
thường kết thúc bằng -s chuyển thành i và thêm -es
record records company companies
Từ kết thúc bằng -s, -sh, -x, -ch, thì facility facilities
thêm đuôi -es Từ kết thúc bằng: nguyên âm + y,
address addresses index thì chỉ thêm -s
indexes birthday birthdays
Có nhiều dạng số nhiều bất quy tắc:
man/woman men/women child children
analysis analyses formula formulae (formulas)
criterion criteria mouse mice
Đuôi -s được phát âm :
/s/ sau một trong các âm: /р/, /t/, /k/, /f/, /θ/ (VD: amounts, hyperlinks)
/iz/ sau một trong các âm: /s/, /z/, /∫ /, /t∫ /, /d3/(VD: devices, images)
/z/ trong hầu hết các trường hợp (VD: files, fields, customers, columns)
clients faxes
keys salaries
queries mice
businessmen viruses
laptops databases passwords
graphs switches orders
networks taxes tables
spreadsheets packages systems
UNIT 6
The Internet and email
Người
2. a program used for displaying web pages (in = web browser The
Web paragraph)
3.to connect to a computer by typing your
= log onto
username and password (in Telnet paragraph)
4. a series of interrelated messages on a given
topic (in Newsgroups paragraph) = message thread
5. a program for reading Usenet newsgroups (in
Newsgroups paragraph) = newsreader
Email features
When you set up an account with an Internet Service Provider, you are given an email address
and a password. The mail you receive is stored on the mail server of your ISP - in a simulated
mailbox - until you next connect and download it to your hard drive.
There are two ways to get email over the Internet. One is by using a mail program (known as
an email client) installed on your computer, for example Eudora or Outlook Express. The other
way is to use web-based email, accessible from any web browser. Hotmail and Gmail are good
examples.
You can make the message more expressive by including emoticons, also called smileys. For
example, ;-) for wink, :-) for happy, :-o for surprised, :-D for laughing, etc. You may also like to
add a signature file, a pre-written text file appended to the end of the message. The name
given to unsolicited email messages is spam. Attachment: files added to the message
The username (a person's name or nickname)
The anatomy of an email The @ sign, which means at
The header The domain name or network address - that is,
To: name and address of the recipient the mail server where the account is located.
From: name and address of the sender The final part adds information about it, for
example com = company, uk = United Kingdom,
Cc: carbon copy sent to another person
fr = France, etc.
Bcc: blind carbon copy
The body contains the message itself
Subject: topic of the message
Read the text and find the following.
1. The place where your ISP stores your emails mail server
2. The type of program used to read and send mail program/
email from a computer email client
3. The part of an email address that identifies the Username
user of the service
4. The line that describes the content of an email Subject
5. The computer file which is sent along with an
email message Attachment
6. Facial symbols used to indicate an emotion or
attitude Emoticons /
7. The name given to junk mail smileys
spam
UNIT 7
The Web
Collocation 2
Collocation là một cụm gồm 2 hay nhiều từ thường hay đi cùng với nhau
theo trật tự.
Một số dạng Collocation phổ biến:
Verb + noun
surf the Web download music
verb + particle
hack into a computer log onto a bank account
adverb + adjective highly sensitive information freely available on
the Web
adjective + noun mathematical formulas up-to-date information
Online khi kết hợp trong cụm từ có thể đóng vai trò tính từ/trạng từ
Tính từ: They post opinions on online journals.
Trạng từ: A podcast is an audio recording posted online.
A Match the words on the left (1-6) with the words on
the right(a-f) to make collocations.
С Find the collocations in these sentences and say
what type they are.
1. Once you are online, you can browse the Web, visit chat rooms or
send and receive emails.
2. Instant messaging can be a great way to communicate with friends.
3. This software may not be fully compatible with older operating
systems.
4. Most webcams plug into a USB port.
5. This highly addictive game will keep you playing for hours.
6. Companies are starting to use virtual reality on their websites.
С Complete the extracts with words from the box
authorization fake internet auction shopping cart browse log in
steal
Virus /ˈvaɪrəs/ n
A piece of software which attaches itself to a file. Once you run an infected
program, the virus quickly spreads to the system files and other software. Some
viruses can destroy the contents of hard disk.
В Match the captions (1 -4)with the pictures(a-d).
a b
c d
Security and privacy on the Internet
There are many benefits from an open system like the Internet, but one of the risks is that we are
often exposed to hackers, who break into computer systems just for fun, to steal information, or
to spread viruses (see note below). So how do we go about making our online transactions
secure?
Security on the Web
Security is crucial when you send confidential information online. Consider, for example, the
process of buying a book on the Web. You have to type your credit card number into an order
form which passes from computer to computer on its way to the online bookstore. If one of the
intermediary computers is infiltrated by hackers, your data can be copied.
To avoid risks, you should set all security alerts to high on your web browser. Mozilla Firefox
displays a lock when the website is secure and allows you to disable or delete cookies - small files
placed on your hard drive by web servers so that they can recognize your PC when you return to
their site.
If you use online banking services, make sure they use digital certificates - files that are like digital
identification cards and that identify users and web servers. Also be sure to use a browser that is
compliant with SSL (Secure Sockets Layer), a protocol which provides secure transactions.
Email privacy
Similarly, as your email travels across the Net, it is copied temporarily onto many computers in
between.This means that it can be read by people who illegally enter computer systems.
The only way to protect a message is to put it in a sort of virtual envelope - that is, to encode it
with some form of encryption. A system designed to send email privately is Pretty Good Privacy, a
freeware program written by Phil Zimmerman.
Security and privacy on the Internet
Network security
Private networks can be attacked by intruders who attempt to obtain information such as Social Security
numbers, bank accounts or research and business reports. To protect crucial data, companies hire security
consultants who analyse the risks and provide solutions. The most common methods of protection are
passwords for access control, firewalls, and encryption and decryption systems. Encryption changes data
into a secret code so that only someone with a key can read it. Decryption converts encrypted data back
into its original form.
Malware protection
Malware (malicious software) are programs designed to infiltrate or damage your computer, for example
viruses, worms, Trojans and spyware. A virus can enter a PC via a disc drive – if you insert an infected disc -
or via the Internet. A worm is a self-copying program that spreads through email attachments; it replicates
itself and sends a copy to everyone in an address book. ATrojan horse is disguised as a useful program; it
may affect data security. Spyware collects information from your PC without your consent. Most spyware
and adware (software that allows pop-ups - that is, advertisements that suddenly appear on your screen) is
included with'free'downloads.
If you want to protect your PC, don't open email attachments from strangers and take care when
downloading files from the Web. Remember to update your anti-virussoftware as often as possible, since
new viruses are being created all the time.
Note: Originally, all computer enthusiasts and skilled programmers were known ashackers, but during the 1990s, the
term hacker became synonymous withcracker - a person who uses technology for criminal aims. Nowadays, people
often use the word hacker to mean both things. In the computer industry, hackers are known as white hats and
crackers are called black hats or darkside hackers.
showed
attempted
launched
spread
overwrote
infected
stole
affected
Render
Fractal
Animation
Computer graphics
CAD is also used in the aerospace, architecture and industrial sectors to design
everything from aeroplanes and buildings to consumer products. Designers start a
project by making a wireframe, a representation showing the outlines of all edges in a
transparent drawing. They then specify and fill the surfaces to give the appearance of
a 3-D solid object with volume. This is known as solid modeling. Next, they add paint,
colour and filters to achieve the desired 'look and feel': this is called texturing the
object. Finally, they render the object to make it look real. Rendering includes lighting
and shading as well as effects that simulate shadows and reflections.
Computer art, or digital art, is used in adverts and TV programmes. Artists and scientists
use special graphic applets to create amazing fractals. Fractals are geometrical patterns
that are repeated at small scales to generate irregular shapes, some of which describe
objects from nature. Government agencies use GIS (Geographic Information Systems)
to understand geographic data and then plan the use of land or predict natural
disasters. Cartographers use GIS to make detailed maps. Animators use computer
animation software to create animated cartoons or add effects in movies and video
games.
B Read the text and answer these questions.
1. What are the differences between raster graphics and vector
graphics?
2. Which graphics file formats are mentioned?
3. What is compositing?
4. What does CAD stand for?
5. What are the benefits of using graphics in the car industry?
6. What type of graphics software is used to make maps or 3-D models
of the Earth?
7. Who uses computer animation? How?
D Match the words (1-6) with the definitions(a-f).
1 resolution a special effects that can be applied to pictures
2 jagged b a technique that generates realistic reflections, shadows and
highlights
3 filters с geometrical figures with special properties
4 wireframe d irregular or uneven
5 rendering e the number of pixels in an image
6 fractals f the drawing of a model by using features like edges or
contour lines
Dạng -ing
Ba cách sử dụng dạng -ing :
1. Rendering includes lighting and shading
2. We are designing a new car on computer.
3. They use special applets to create amazing fractals.
Câu 1: Danh động từ (gerund) – chỉ hành động hoặc quá trình
Rendering : chủ ngữ lighting, shading: tân ngữ
Câu 2: Phân từ hiện tại – dùng trong thì tiếp diễn hoặc để rút gọn
mệnh đề quan hệ
designing: thì hiện tại tiếp diễn
Câu 3: Tính từ
Dạng -ing
Danh động từ (gerund) được dùng làm:
Chủ thể của hành động
Compositing is combining parts of different images to create a single image.
Bổ nghĩa cho danh từ
Compositing is combining parts of different images
Đối tượng của hành động I enjoy editing pictures.
Sau giới từ
Designers start a project by making a wireframe.
Bổ nghĩa cho động từ
This course involves painting and drawing in various media.
Một số động từ phải đi cùng động từ dạng –ing, không phải động từ
nguyên thể (VD: avoid, fancy, finish, give up, hate, imagine, involve, keep,
look forward to, mind, suggest, enjoy)
A Decide if the -ing forms in these sentences are gerunds,
present participles or adjectives. Write g, pp or a.
Fast
Interactive
High-quality Sound
Speakers Animation
Headphones
Rippers
Microphone
Multimedia magic!
a ______________________________The potential of multimedia
Multimedia applications are used in all sorts of fields. For example, museums, banks and estate
agents often have information kiosks that use multimedia; companies produce training
programs on optical discs; businesspeople use Microsoft PowerPoint to create slideshows; and
teachers use multimedia to make video projects or to teach subjects like art and music. They
have all found that moving images and sound can involve viewers emotionally as well as inform
them, helping make their message more memorable.
The power of multimedia software resides in hypertext, hypermedia and interactivity
(meaning the user is involved in the programme). If you click on a hypertext link, you can jump
to another screen with more information about a particular subject. Hypermedia is similar, but
also uses graphics, audio and video as hypertext elements.
b _______________________________Sound, Music, MIDI
As long as your computer has a sound card, you can use it to capture sounds in digital format
and play them back. Sound cards offer two important capabilities: a built-in stereo synthesizer
and a system called MIDI, or Musical Instrument Digital Interface, which allows electronic
musical instruments to communicate with computers. A Digital Audio Workstation (DAW) lets
you mix and record several tracks of digital audio.
You can also listen to music on your PC, or transfer it to a portable MP3 player. MP3 is short for
MPEG audio player 3, a standard format that compresses audio files. If you want to create
your own MP3 files from CDs, you must have a CD ripper, a program that extracts music tracks
and saves them on disk as MP3s.
Multimedia magic!
Audio is becoming a key element of the Web. Many radio stations broadcast live over the
Internet using streaming audio technology, which lets you listen to audio in a continuous
stream while it is being transmitted. The broadcast of an event over the Web, for example a
concert, is called a webcast. Be aware that you won't be able to play audio and video on
the Web unless you have a plug-in like RealPlayer or QuickTime. c
_________________________Creating and editing movies
Video is another important part of multimedia. Video computing refers to recording,
manipulating and storing video in digital format. If you wanted to make a movie on your
computer, first you would need to capture images with a digital video camera and then
transfer them to your computer. Next, you would need a video editing program like iMovie to
cut your favourite segments, re-sequence the clips and add transitions and other effects.
Finally, you could save your movie on a DVD or post it on websites like YouTube and Google
Video. d ________________________Products full of pictures, action and sound
Multimedia is used to produce dictionaries and encyclopedias. They often come on DVDs, but
some are also available on the Web. A good example is the Grolier Online Encyclopedia, which
contains thousands of articles, animations, sounds, dynamic maps and hyperlinks. Similarly, the
Encyclopedia Britannica is now available online, and a concise version is available for iPods,
PDAs and mobile phones. Educational courses on history, science and foreign languages are
also available on DVD. Finally, if you like entertainment, you'll love the latest multimedia video
games with surround sound, music soundtracks, and even film extracts.
B Correct the technical mistakes in these sentences.
1. Multimedia training software is distributed on magnetic disks.
2. You need to have MIDI on your computer to hear speech and
music.
3. A stereo synthesizer allows your computer to communicate with
electronic musical instruments.
4. A CD ripper converts CDs to live streams.
5. The Encyclopedia Britannica is only available on DVD.
D Match the words (1-5) with the definitions(a-e).
2
4
5
Computer languages
Unfortunately for us, computers can't understand spoken English or any other natural
language. The only language they can understand directly is machine code, which consists of 1s
and 0s (binary code).
Machine code is too difficult to write. For this reason, we use symbolic languages to
communicate instructions to the computer. For example, assembly languages use
abbreviations such as ADD, SUB, MPY to represent instructions. The program is then translated
into machine code by a piece of software called an assembler. Machine code and assembly
languages are called low-level languages because they are closer to the hardware. They are
quite complex and restricted to particular machines. To make the programs easier to write, and
to overcome the problem of intercommunication between different types of computer,
software developers designed high-level languages, which are closer to the English language.
Here are some examples:
■FORTRAN was developed by IBM in 1954 and is still used for scientific and engineering
applications.
■COBOL (Common Business Oriented Language) was developed in 1959 and is mainly used for
business applications.
■BASIC was developed in the 1960s and was widely used in microcomputer programming
because it was easy to learn. Visual BASIC is a modern version of the old BASIC language, used
to build graphical elements such as buttons and windows in Windows programs.
■PASCAL was created in 1971. It is used in universities to teach the fundamentals of
programming.
Computer languages
■С was developed in the 1980s at AT&T. It is used to write system software, graphics and
commercial applications. C++ is a version of С which incorporates object-oriented
programming: the programmer concentrates on particular things (a piece of text, a graphic or a
table, etc.) and gives each object functions which can be altered without changing the entire
program. For example, to add a new graphics format, the programmer needs to rework just the
graphics object. This makes programs easier to modify.
■ Java was designed by Sun in 1995 to run on the Web. Java applets provide animation and
interactive features on web pages. Programs written in high-level languages must be translated
into machine code by a compiler or an interpreter. A compiler translates the source code into
object code - that is, it converts the entire program into machine code in one go. On the other
hand, an interpreter translates the source code line by line as the program is running.
It is important not to confuse programming languages with markup languages, used to create
web documents. Markup languages use instructions, known as markup tags, to format and link
text files. Some examples include:
■ HTML, which allows us to describe how information will be displayed on web pages.
■ XML, which stands for Extensible Markup Language. While HTML uses pre-defined tags, XML
enables us to define our own tags; it is not limited by a fixed set of tags.
■ VoiceXML, which makes Web content accessible via voice and phone. VoiceXML is used to
create voice applications that run on the phone, whereas HTML is used to create visual
applications (for example, web pages).
UNIT 12
Jobs in ICT
hardware engineer
software engineer
blog administrator
DTP operator
network administrator
webmaster
computer security specialist
help desk technician
Webmaster Task
Advise internal groups on all issues relating to the web site.
Own site releases, QA signoff, and documentation.
Ensure site is optimized and is cross-platform and cross-browser compatible.
Design, develop, and execute site architecture and navigation including
redesigns and upgrades.
Collaborate with creative staff on design and layout issues to facilitate web
publishing.
Webmaster Salary
The average salary for a Webmaster is $51,533 per year. Most people with this
job move on to other positions after 20 years in this career. Pay for this job
rises steadily for more
Hardware Engineer Tasks
Define and coordinate corrective action changes.
Write documentation and test specifications.
Research, design, develop, and test computer or computer-related
equipment.
Provide technical support to team members.
Hardware Engineer Salary
A Hardware Engineer earns an average salary of $83,631 per year.
Most people with this job move on to other positions after 20 years
in this field. A skill in verilog is associated with high pay for this job.
UNIT 13
Communication systems
Call centre
Digital radio
Digital TV
Fax
GPS
Teletext
Wearable computer
Channels of communication
Ringtone
Changeable faceplate
Keypad
SIM card
(Subscriber Identity Module)
In pairs, discuss these questions.
1. How much money do you spend on your mobile?
2. Can you send MMS (multimedia messages) from your mobile?
3. Do you access the Internet from your mobile? Which sites do
you visit?
4. Can you listen to music and watch TV on your mobile?
5. Do you use your mobile phone for business? Do you think it is
secure to carry out financial transactions via mobile phones?
6. Have you ever had to use your phone in an emergency?
7. Do you think that prolonged use of mobile phones can affect our
health (for example cause fatigue and headaches, emit radiation,
excite brain cells, etc.)?
Artificial
Nanotechnology Smart home
Intelligence (AI)
Facial
Data mining
recognition
What it is?
How does it work?
Benefits/Challenges?
Application?
UNIT 14
New technologies
Future trends
1 2
By all accounts, nanotechnology - the science of Artificial Intelligence (Al) is the
making devices from single atoms and molecules - science of making intelligent machines
is going to have a huge impact on both business and programs. The term originated in
and our daily lives. Nano devices are measured in the 1940s, when Alan Turing said: “A
nanometres (one billionth of a metre) and are machine has artificial intelligence
expected to be used in the following areas. when there is no discernible
• Nanocomputers: Chip makers will make tiny difference between the conversation
microprocessors with nanotransistors, ranging generated by the machine and that of
from 60 to 5 nanometres in size. an intelligent person.” A typical Al
application is robotics. One example is
• Nanomedicine: By 2020, scientists believe that
ASIMO, Honda's intelligent humanoid
nano-sized robots, or nanobots, will be injected
robot. Soon, engineers will have built
into the body's bloodstream to treat diseases at
different types of android, with the
the cellular level.
form and capabilities of humans.
• Nanomaterials: New materials will be made Another Al application is expert
from carbon atoms in the form of nanotubes, systems - programs containing
which are more flexible, resistant and durable than everything that an 'expert' knows
steel or aluminium. They will be incorporated into about a subject. In a few years,
all kinds of products, for example stain-resistant doctors will be using expert systems
coatings for clothes and scratch-resistant paints for to diagnose illnesses.
cars.
Future trends
3 4
Imagine you are about to take a holiday in Europe. Ubiquitous computing, also known
You walk out to the garage and talk to your car. as pervasive computing, is a new
Recognizing your voice, the car's doors unlock. On approach in which computer
the way to the airport, you stop at an ATM. A functions are integrated into
camera mounted on the bank machine looks you everyday life, often in an invisible
in the eye, recognizes the pattern of your iris and way. Ubiquitous devices can be
allows you to withdraw cash from your account. anything from smartphones to tiny
When you enter the airport, a hidden camera sensors in homes, offices and cars,
compares the digitized image of your face to that connected to networks, which
of suspected criminals. At the immigration allow information to be accessed
checkpoint, you swipe a card and place your hand anytime and anywhere - in other
on a small metal surface. The geometry of your words, ubiquitously. In the future
hand matches the code on the card, and the gate people will interact naturally with
opens. You're on your way. hundreds of these smart devices
Does it sound futuristic? Well, the future is here. (objects containing a microchip
Biometrics uses computer technology to identify and memory) every day, each
people based on physical characteristics such as invisibly embedded in our
fingerprints, facial features, voice, iris and retina environment and communicating
patterns. with each other without cables.
Ubiquitous: present, appearing, or found everywhere.
B Complete these sentences with the correct future form of the verb
in brackets. Use the future continuous or future perfect.