You are on page 1of 22

ĐỀ CƯƠNG ÔN TẬP TIẾNG ANH CHUYÊN NGÀNH 2

UNIT 1: THE WEB


Main topic: Typical webpage, web phenomena, e-commerce and online banking.
Exercise 1. Match the terms (a-e) with their descriptions (1-5)
Terms Descriptions
a. modem 1. An agreement that covers the procedures used to exchange
b. transmission information between co-operating computers.
c. download 2. To send programs or data from a central computer to a remote PC.
d. online service 3. A public database, for example, that can be accessed over a computer
e. protocol or telephone.
4. A device that converts the computer's digital bit stream into an analog
signal for transmission over a telephone line.
5. The process of sending signals electronically.

Exercise 2 Complete these sentences by circling the best answer A, B, C or D


1 A ___________ designs, writes, and tests programs for performing various tasks on a
computer.
A. programmer B. programming C. program D. programmable
2 A systems _______ studies organizational systems and decides what action needs to be taken
to maximize efficiency.
A. analyze B. analyst C. analyzing D. analyzable
3 The microcomputer we have purchased does not have a FORTRAN ________. It is
programmable in BASIC only.
A. compile B. compiler C. compilation D. compiling
4 We have found that ___________ who have the freedom to take short breaks during the day
greatly improve their performance.
A. operate B. operation C. operators D. operating
5 We decided to _______ the entire plant to give each division more independence.
A. computer B. computerization C. computing D. computerize
6 Turning your office into a paperless environment may be expensive at the beginning but can
________ big savings in the long run.
A. produce B. producer C. producing D. product
7 Software ________ are producing increasingly sophisticated applications for a growing global
market.
A. develop B. developing C. developers D. development

Exercise 3. Match the terms (a-e) with their descriptions (1-9)

Terms Descriptions
a. portal 1.The WWW is also called the information ____________.
b. home 2. A link in a web page.
c. blogger 3. A website that offers a variety of services.
d. index 4. This is the first page of a website.
e. favourite 5. A person who keeps a blog.
f. highway 6. The manager of a web.
g. hyperlink 7. An animal closely linked to the Web.
h. spider 8. Another word for directory.
j. web master 9. Another word for bookmark
Exercise 4. What kind of site is each web extract from? Choose the best answer A, B or C.
1 A. bog B. wiki C. social network
Wednesday 20 February
Happy birthday, Sam!
I’m really excited because it’s Sam’s birthday today, so we’re all meeting up later to go for
something to eat and then see a film. I’ll let you know what we saw in tomorrow’s post.

2 A. bog B. wiki C. search engine


Coen Brothers
Joel and Ethan Coen, known as The Coen Brothers, are internationally known American
filmmakers. For over 20 years, they have written and directed award-winning films such as …

3 A. vlog B. e-tailer C. internet auction


Shopping cart Your account Log in Browse Help
Welcome to storefront.co.uk, Britain’s largest and most reliable online store for …

4 A. search engine B. e-tailer C. internet auction


Buy Sell Search Categories Help
Before you can bid on any item listed on the site, you need to create an account.

5. A. blog B. peer-to –peer system C. social network


Welcome to Connect-O!
Use Connect-O to send messages to friends and family around the world, to share photos and
videos, and much, much more!

Exercise 5. Match the terms (a-e) with their definitions (1-5)

Terms Definitions
a. Cyberspace 1 : a public place where you can pay to use the Internet and also buy
b. E-learning food and drink
c. Cybercafé 2 : buying and selling goods on the Internet
d. E-commerce 3 : a way of describing the Internet
e. E-book 4 : learning using technology, for example the Internet
5 : a book in electronic format

Exercise 6. Internet terms


1. "The website gets a thousand hits a week" means the website has a thousand _________ a
week.
a. sales b. visits c. search engine matches
2. The words, images and other material that make up a website are called __________.
a. the contents b. the content c. the filling
3. Designs and drawings in websites are usually called __________.
a. web pictures b. web graphics c. web illustrations
4. Moving pictures in websites are usually called __________.
a. cartoons b. movies c. animations
5. Websites with sounds and/or video clips and/or animations have __________ content.
a. multimedia b. many-media c. mixed-media
6. A space in a website where you enter information (address, password etc.) is called a
__________.
a. box b. strip c. field
7. A hyperlink is often called just __________.
a. a link b. a hyper c. an HL
8. In real time means __________.
a. during working hours b. instantly c. in British Standard Time
9. A place with computers for public internet use is usually called an internet café or
__________. even if they don't serve coffee.
a. web café b. computer café c. cyber café
10. Internet cafés offer internet __________.
a. connection b. availability c. access
11. A program that adds functions to a browser (eg Shockwave) is called a __________.
a. plug b. plugged-in c. plug-in
12. Temporary internet files are stored in the __________.
a. cash b. cache c. cashe
13. Colours which all browsers can display without problems are called __________ colours.
a. browser safe b. browser acceptable c. browser easy
UNIT 2: INTERNET SECURITY
Main Topics: Security and privacy on the Internet; Safety online for children; The history of
hacking; Computer crimes.
I. VOCABULARY:
Hacker/ white hat Someone who invades a network’s privacy
Cracker/ black hat/ An intruder who breaks into computer systems for fun, to steal
darkside hacker information, or to propagate viruses.
Virus A piece of software which attaches itself to a file. Once you run an infected
program, the virus quickly spreads to the system files and other software.
Some viruses can destroy the contents of hard disks.
Spyware A type of software that collects information from your computer without
your consent
Username The part of an email address that identifies the user of the service./ the
name you use to identify yourself when you log onto a computer system or
network, also called user ID.
Password A secret word which must be entered before access is given to a computer
system or website
Firewall A software and/or hardware device that allows limited access to an internal
network from the Net. This prevents intruders from stealing or destroying
confidential data.
Protocol A set of rules which determine the formats by which information may be
exchanged between different systems.
Worm A self-copying program that spreads through email attachments; it
replicates itself and sends a copy to everyone in a contact list.
Security alert
Cookies Small files used by web servers to know if you have visited their site
before. Cookies can store user information but do not read your hard disk.
Digital certificate Describes a system that performs operations by means of digits,
represented as binary numbers. The opposite of digital if analogue
Encryption The process of saving and transmitting data in encoded form data
encryption and passwords are important for network security, particularly
when sending confidential information such as credit card numbers.
Freeware Software that is available free of charge, used for designing web pages.
Decryption The process of decoding (deciphering) secret data.
Malware Malicious software, created to damage computer data. It includes viruses,
worms, Trojan horses and spyware.
Trojan horse Malicious software disguised as an useful program
Adware Software devised to display advertisement; some may include spyware.
Attachment A file that has been included as part of an email message
Filtering program Software designed to restrict the access to specific aspects of the web.
Piracy The illegal copying and distribution of copyrighted programs and files.
Plagiarism Theft of intellectual property
Phishing Getting passwords of online bank accounts or credit card numbers by using
emails that look like real organizations, but are in fact fake; short for
password harvesting fishing
IP spoofing Making one computer look like another to gain unauthorized access
Cyberstalking Online harassment or abuse, mainly in chat rooms and forums.
II. PRACTICE:
1. Identify the Internet crimes sentences (1-6) refer to. Then match them with the advice
below (a-f):
1. Crackers try to find a way to copy the latest game or computer program.
2. A study has revealed that half a million people will automatically open an email they believe
to be from their bank and happily send off all their security details.
3. This software’s danger is hidden behind an attractive appearance. That’s why it is often
wrapped in attractive packages promising photos of celebrities like Anna Kournikova or Jenifer
Lopez.
4. There is a particular danger in Internet commerce and emails. Many people believe they have
been offered a special gift only to find out later they have been deceived.
5. “Nimda” spreads by sending infected emails and is also able to infect websites, so when a user
visits a compromised website, the browser can infect the computer.
6. Every day, millions of children spend time in Internet chat rooms talking to strangers. But
what many of them don’t realize is that some of the surfers chatting with them may be sexual
predators.
a. People shouldn’t buy cracked software or download music illegally from the Internet.
b. Be suspicious of wonderful offers. Don’t buy if you aren’t sure.
c. It’s dangerous to give personal information to people you contact in chat rooms.
d. Don’t open attachments form people you don’t know even if the subject looks attractive.
e. Scan your email and be careful about which websites you visit.
f. Check with your bank before sending information.
2. Fill in the gaps in these security tips with words from the box.
Digital certificate Malware Virus Scanner Spyware Firewall Antivirus
Malicious software, (1)………can be avoided by following some basic rules.
Internet users who like cybershopping should get a (2)…………….on electronic identity
card.
To prevent crackers from breaking into your internal network and obtaining your data,
install a (3)……. It will protect you from (4)……
If you have been hit by a (5)…….Don’t panic! Download a clean-up utility and always
remember to use an (6) …..program, for example, a virus (7)………..
3. Complete this product description of an internet security program. Write the missing
words using the mixed-up letters in brackets.
EFG
EFG (1) [inta-riuvs]………………… software is the only program you need for complete
protection from online threats.
EFG scans all incoming and outgoing email attachments, helping to protect your PC against (2)
[rivessu] ………………… , (3) [romsw] ………………… , (4) [Torsjan] ………………… and
other types of (5) [lawmare] ………………… . A (6) [lawlrife] …………………shields your
system from attack by (7) [reschak] ………………… , while the program can also detect if a
website’s (8) [igidlat ercteacfiti] ………………… is out-of-date or suspicious, allowing you to
carry out financial transactions online with total security.
In addition to all of the above, the EFG Professional Edition also comes with email (9)
[crynetipon] …………………and the EFG (10) [rawsyep] …………………scanner, helping you
to keep your system free of unwanted advertising and (11) [socoiek] ………………… .
EFG Basic is available to download as (12) [warfeeer] …………………by clicking here.
Alternatively, you can purchase the EFG Professional Edition for only £29.95. Click here to visit
our (13) [rescue witebes] …………………or pay using PayPal by clicking here.
4. Complete these extracts from wikis about cybercrime by write the past simple form of
the verbs in brackets. Then decide what kind of cybercrime each wiki is describing.
1 In July 2001, the online file-sharing network Napster (shut) …………………its website
following legal action from several major record labels.
2 In late 2006, a computer worm (take) …………………control of hundreds of pages on
MySpace and (change) ………………… links to direct surfers to websites designed to steal their
login details.
3 The first well-known worm (be) …………………the Internet Worm of 1988, which (infect)
………………… SunOS and VAX BSD systems.
4 A 2007 study (find) ………………… that 28% of female internet users had experienced online
harassment. In 84% of cases, the incidents (happen) ………………… in a chat room.
5 In 2008, author J K Rowling (say) …………………that a company trying to publish an online
Harry Potter encyclopedia had ‘stolen her words’.
5. Reading: Safety Online for Children
Journalist: The Internet is a great resource for kids, but some parents are concerned about the
presence of “indecent” material. Can the Internet be dangerous for children?
Diana Wilson: Well, the Net obviously brings a lot benefits for education and entertainment, but
it’s not always a friendly place. We’ve all heard of things like the manipulation of children,
invasions of privacy, distribution of indecent or offensive material, violence, and racist
propaganda.
Journalist: And what sort of precautions should parents take?
Diana Wilson: It’s impossible for parents to be with their children at every moment. But there
are plenty of websites aimed at children, and some programs can help parents control
information. But this is no substitute for education. It’s the parents’’ role to make their children
aware of both the benefits and the risks of the Internet.
Journalist: And what else can parents do? I mean, are there any technological solutions?
Diana Wilson: Yes, web software companies have developed filtering programs that let parents
block objectionable websites and restrict access to specific aspects of the Net. Some
organizations have also proposed that websites should rate their content with label, from child-
friendly to over-18 only. Other people argue that internet ratings aren’t good because they limit
free expression on the Net.
Journalist: That’s obviously a very controversial topic. What about internet addiction? What
can parents do if their children spend too much time online?
Diana Wilson: Well, if they’re obsessed with games or spend too much online that their lives
are affected negatively, parents should establish a balance between internet use and other
activities. When there are strong signs of internet addiction, they should consider seeking
professional help.
Answer the questions:
1. What disadvantages can bring for children?
2. What precautions can parents take to avoid them?
Unit 3. Multimedia
Main topics: Multimedia technologies and applications.
Exercise 1. Match the If clauses (1-6) to the main clauses (a -f) to make complete sentences.

If clauses Main clauses


1. If you never read computer magazines… a. ... you would be able to access our bulletin board.
2. If you never back up your hard disk… b. ..it is unlikely that you will have a problem with
3. If you had a modem… computer viruses.
4. If you don't copy pirated software… c. ...we would have a bigger range of typefaces and
5. If I knew more programming languages fonts to choose from.
… d. ...you will miss important new products.
6. If we bought a better printer … e. ...I would get a better job.
f. ...you will probably lose some important files.

Exercise 2. Complete the sentences with the words below.


1. If you …………….. your VDU in direct sunlight, it …………damaged.
2. If yo u … … … … … . . your screen for too long, you …………headache.
3. If you ……………. to link your PCs with a mainframe, you …………….. to install a network.
4. If the market for portable computers …………. , prices …………… even more next year.
5. If we …………. a fax machine and e-mail facility, we …………… many letters each day.

would not post/ leave/ grows/will get/ will be/would


need/wanted/will be reduced/look at/ installed.

Exercise 3. Match the descriptions (1-7) with the suitable terms (a-g).

Descriptions Terms
1. The type of text that contains links to other texts a. gif, jpg, tif
2. The expression that mean “to record music onto a CD” b. pdf, doc, rtf, htm/html
3. A system that combines hypertext and multimedia c. hypertext
4. the most common extensions for graphics files d. burn music
5. the most common text formats e. avi, mov, mpg
6. three popular video formats f. wav, ra, mp3
7. three common file format for storing audio data. g. hypermedia

Exercise 4. Match the descriptions (1-7) with the suitable terms (a-g).

Descriptions Terms
1. A series of still images shown in sequence. a. graphics interchange format.
2. The files are processed by sound software. b. steaming
3. In medicine, doctors use these systems to stimulate c. extension
particular situations d. mpeg
4. The suffix placed after a dot at the end of the filename. e. animation
5. A video format developed by Moving Pictures Experts f. audio
Groups g. virtual reality systems
6. A system of filming, processing and showing moving h. video
pictures.
7. .gif stands for _________
8. The technique which allows you to play music and watch
video before the entire file
has download.
Exercise 5. Choose the right words A, B or C to make collocations connected with
multimedia.
1 animation A. ripper B. software C. kiosk
2 CD/DVD A. ripper B. reality C. speakers
3 interactive A. reality B. media C. kiosk
4 sound A. speakers B. audio C. card
5 stereo A. software B. card C. speakers
6 information A. software B. kiosk C. reality
7 streaming A. audio B. format C. camera
8 digital A. reality B. format C. kiosk
9 video A. speakers B. kiosk C. editing
10 virtual A. software B. speakers C. reality

Exercise 6. Match the terms (a-e) with their definitions (1-5)

Terms Definitions
a. hypertext 1. device which covers each ear and allows you to listen to audio without
b. interactivity other people hearing
c. microphone 2. text with links to other text or other parts of a document or web page
d. headphones 3. allowing two-way communication between a program and the user
e. webcast 4. equipment that allows you to record your voice
5. a concert or other event broadcast over the Internet

Exercise 7. Gap –filling. Fill in the gap with the suitable given words and phrases.
So, what exactly is multimedia? If you look on http://dictionary.cambridge.org, you’ll find the
following definition: using a combination of moving and still pictures, sound, music and words,
especially in computers or entertainment. This definition refers specifically to (1) _____ such as
educational CD-ROMs or digital encyclopedias. It could also be referring to the touch-screen (2)
_______ that you sometimes see in banks and estate agents. This type of multimedia commonly
uses (3) ______ links that take you to other pages of the document or program. However, I think
multimedia can mean anything from using a (4) to burn MP3s, to listening to an online radio
show using (5) ______ (that is, in real time).

As long as you have a fast CPU, a good monitor and a (6) ________ (hardware that allows you
to play digital audio through your computer), you’ll be able to use basic multimedia applications.
If you wanted to go a step further, you could invest in a (7) ______ to record yourself, or a
digital video camera to make videos in (8) _______ . If you wanted to make a whole movie, then
you would also need (9) ______ software such as Apple’s iMovie.
The future of multimedia looks very exciting. If current trends continue, then (10) _______ will
become more and more popular – we could eventually be living most of our lives in these 3-D
worlds, interacting with each other just as we do in real life. Just look at the success of Second
Life ...

streaming audio digital format


interactive media CD/DVD ripper
video editing virtual reality
hypertext information kiosks
microphone sound card
Exercise 8. Match the terms with their descriptions

Terms Descriptions
1. programs which tell the computer what to do.
a. FIREWALL 2. a piece of software which makes a computer do a task (for
b. PROGRAM example, edit an image) .
c. DRIVER 3. any set of instructions for a computer.
d. UPDATE 4. software which operates a peripheral, such as a scanner or
e. BOOTLEG printer.
f. SOFTWARE 5. application which stores and displays digital photos.
g. APPLICATION 6. you enter a security code to prove that you have a _______ to
h. LISCENCE use the software.
i. SECURITY CODE 7. software which prevents unauthorized access to your computer
j. PHOTO ALBUM over the internet.
8. a series of letters and numbers which you have to enter before
installing some programs.
9. download new features for an application.
10. an unauthorised copy of a program.
Exercise 9. Match the descriptions on the left with these famous applications.

Descriptions Applications

1. word processor a. Adobe Photoshop


2. spreadsheet b. Internet Explorer
3. virus protection c. Microsoft Word
4. browser d. Microsoft Excel
5. image editor e. Microsoft PowerPoint
6. media player f. Norton AntiVirus
7. email software g. Outlook Express
8. presentation software h. Adobe PageMaker
9. graphic design software i. RealPlayer
UNIT 4: WEB DESIGN
Main topics: website and blog design
I. VOCABULARY:
Website A collection of web pages, set up by an organization or an individual,
which are usually stored on the same server. The pages are all linked
together; you can move from one page to another by clicking on words
or pictures called hyperlinks
Webpage An individual document on the web, identified by its own unique URL.
Web pages contain different elements, such as text, pictures, video,
links,etc.
Home page The first page on a website, that usually contains kinks to other pages./
the default start-up page on which a web browser starts.
Blog A user-generated website where people express their opinions. The
entries are displayed in a reverse chronological order.
HTML The language used to create hypertext documents, short for hypertext
markup language
HTML Tags The codes used to define text fonts, format paragraphs, add links, etc.
HTML are surrounded by the angle brackets <and>
Web template Available web design where you can just fill in the information you
want
Web editor Software that lets you design web pages without writing HTML codes.
Webcasting Sending audio and video live over the internet
Hyperlink A text, image or button that, when clicked, takes you to other
destinations on the web.
Hypermedia A form of enriched multimedia which supports linking graphics, sounds,
and video elements in addition to text elements.
Hypertext Text that contains links to other documents
RSS feed A web feed format that allows subscribers to receive updates of blogs,
news, podcasts, etc.
Interactive
Animations Images make up of series of independent pictures put together in
sequence to look like moving pictures.
Streaming A technique for transmitting sound and video so that it can be processed
as a continuous stream. The files are played while they are
downloading.
Plug-ins Special programs which extend the capabilities of a web browser so that
it can handle audio, video, 3D and animation elements.
Web designer Someone who design a website
Webmaster Someone responsible for designing, developing, marketing or
maintaining websites.
Clip art Ready-made pictures
Graphics tablet An input device which allows the user to enter drawings and sketches
into a computer

II. PRACTICE:
1. Reading:
Interviewer: Sarah, what’s the first step in building a website?
Sarah: First of all, you should always plan it carefully. Decide what sort of information you’re
going to include and how you’re going to organize it. I like to start with the home page, because
this is the starting point of your site, almost like the table of contents in a book. It’s a good idea
to design the site on paper first, a few diagrams will help you clarify the relationships between
the pages.
Interviewer: That sounds sensible. What editing tool do you recommend?
Sarah: I recommend using a web editor; it’ll make it easier to design your site. You can
download a web editor from the Internet quite easily.
Interviewer: I suppose a big part of the job is writing the text and formatting effects. You can
also apply styles to text and other page elements.
Interviewer: And what about graphics and sounds?
Sarah: Well, that’s the next step. You can insert all sorts of pictures and sounds, but they should
have a clear purpose, some sort of communicative intention. Don’t insert photos or animations
just to make the pages look nice, and avoid having large number of graphics.
Interviewer: Why’s that?
Sarah: Because graphics can take a long time to download, and visitors might give up and leave.
Interviewer: I see. Any advice about the use of colour?
Sarah: It’s fun to experiment with colour. You may like to choose different colours for the
background and the text. But make sure that all the text is easy to read and avoid very bright
colours.
Interviewer: OK. What’s next?
Sarah: Once you’ve created and saved a few pages, it’s time to join them together with
hyperlinks. A good design principle is not to put too many links on one page – people may lose
patient or get distracted. And check that all the links work, since web addresses sometimes
change.
Interviewer: So, be careful with links. What do I do if I then want to publish my website on the
Net?
Sarah: To publish your site, you have to find a web server and then transfer all the files from
your PC to the server. This is called going live.
Interviewer: Tight, sounds easy! Any final comments, Sarah, before we take some calls?
Sarah: Yes, try to keep the pages updated, improving content and design if necessary. And the
final touch always includes the date to show that your site is up-to-date.
Answer the question:
What are the steps to build a website?
2. Find the suitable words to fill in the blanks:
Colour CSS frame Graphics GIF
background Table link JPEG Web
A well-designed website should be neat and orgranized. Words should be surrounded by
sufficient white space. Use dark (1)……………on a light (2) ……………, preferably white. You
can divide the page into columns with a (3) ……………or use (4) ……………to create the page
layout. Usually the navigation bar appears on the left side of the page. You can display it on all
the pages of your website by using a (5) ……………It is a good idea to put a (6) ……………to
the top of the page at the bottom of a long text.
The graphical element of a web page is crucial. (7) ……………load slowly, so use them
sparingly and for good reason. There are two common picture formats: (8) ……………, for
pictures with lots of colour and (9) ……………, which is ideal for buttons and banners.
UNIT 5: PROGRAMMING DESIGN AND COMPUTER LANGUAGES
Main topics: Steps in programming, computer languages.
Exercise 1. Match the terms (a-d) with their definitions (1-4)

Terms Definition
a. Application program 1. A program written in one of the high-level languages.
b. object program, object module 2. A program designed to perform a specific task.
c. A source program 3. The program produced when the original program has
d. compiler been converted into machine code.
4. A program that converts a high-level language into
machine code.

Exercise 2. Read the text carefully then answer the questions


Programs and programming languages
Computers can deal with different kinds of problems if they are given the right instructions for what
to do. Instructions are first written in one of the high-level languages, e.g. FORTRAN, COBOL,
ALGOL, PL/I, PASCAL, BASIC, or C, depending on the type of problem to be solved. A program
written in one of these languages is often called a source program, and it cannot be directly
processed by the computer until it has been compiled, which means interpreted into machine code.
Usually a single instruction written in a high-level language, when transformed into machine code,
results in several instructions. Here is a brief description of some of the many high-level
languages:
FORTRAN acronym for FORmula TRANslation. This language
is used for solving scientific and mathematical problems. It consists of algebraic formulae and English
phrases. It was first introduced in the United States in 1954.
COBOL acronym for COmmon Business-Oriented Language. This language is used for
commercial purposes. COBOL, which is written using English statements, deals with problems that
do not involve a lot of mathematical calculations. It was first introduced in 1959.
ALGOL acronym for ALGOrithmic Language. Originally called IAL which means International
Algebraic Language. It is used for mathematical and scientific purposes. ALGOL was first introduced
in Europe in 1960.
PL/I Programming Language I. Developed in 1964 to combine features of COBOL and ALGOL.
Consequently, it is used for data processing as well as scientific applications.
BASIC acronym for Beginner's All-purpose Symbolic Instruction Code. Developed in 1965 at
Dartmouth College in the United States for use by students who require a simple language to begin
programming.
C developed in the 1970s to support the UNIX operating system. C is a highly portable general-
purpose language.
Other such languages are APL (developed in 1962), PASCAL (named after Blaise Pascal and
developed in 1971), and LISP and PROLOG, both of which are used for work in artificial
intelligence. LOGO is a development of LISP which has been used to develop computer-based
training (CBT) packages.
When a program written in one of these high-level languages is designed to do a specific type of
work such as calculate a company's payroll or calculate the stress factor on a roof, it is called an
applications program. Institutions either purchase these programs as packages or commission their
own programmers to write them to meet the specifications of the users.
The program produced after the source program has been converted into machine code is referred to
as an object program or object module. This is done by a computer program called the compiler,
which is unique for each computer. Consequently, a computer needs its own compiler for the
various high-level languages if it is expected to accept programs written in those languages. For

41
example, in order that an IBM RS/6000 may process a program in FORTRAN, it needs to have a
compiler that would understand that particular model and the FORTRAN language as well.
The compiler is a systems program which may be written in any language, but the computer's
operating system is a true systems program which controls the central processing unit (CPU), the
input, the output, and the secondary memory devices. Another systems program is the linkage
editor, which fetches required systems routines and links them to the object module (the source
program in machine code). The resulting program is then called the load module, which is the
program directly executable by the computer. Although systems programs are part of the software,
they are usually provided by the manufacturer of the machine.
Unlike systems programs, software packages are sold by various vendors and not necessarily by
the computer manufacturer. They are a set of programs designed to perform certain applications
which conform to the particular specifications of the user. Payroll is an example of such a package
which allows the user to input data — hours worked, pay rates, special deductions, names of
employees — and get salary calculations as output. These packages are coded in machine language
(Os and 1s) on magnetic tapes or disks which can be purchased, leased, or rented by users who
choose the package that most closely corresponds to their needs.

Read the text then answer the questions:


1. Is COLBOL used scientific purposes?
2. Why was C developed in the 1970s?
3. What do you call a program written in a high-level language designed to perform a specific task?
4. Which part of the systems software converts the source code into machine code?
5. What does the linkage editor do?
6. Are software packages only sold by the hardware manufacturer?

Exercise 3. Choose the best answer A, B, C or D to complete each sentence.


1. A. instruction B. instruct C. instructed D. instructor
a. Our Maths …………… explained to us the principles of binary arithmetic.
b. We were ………….. to document programs very carefully
c. Both ……………… and data have to be changed to machine before the computer can operate on
them.
2. A. compilation B. compiler C. compiles D. compiled
a Our university computer does not have a PASCAL _____________.
b Usually, a programmer ___________ his program before he puts in the data.
c A source program cannot be directly processed by the computer until it has been _______.
3. A. result B. results C. resulting
a The linkage editor links systems routines to the object module. The _________ program,
referred to as the load module, is directly executable by the computer.
b The _________ of these mathematical operations were obtained from the university mainframe
and not from my micro.
4 . A. specification B. specify C. specific D. specifically
a Our company bought three packages with very ________ applications: payroll, accounts
receivable, and accounts payable.
b An applications program is designed to do a ________ type of work, such as calculating the
stress factor of a roof.
c Did the analyst give the new programmer the _________ necessary to start on the project?

Exercise 4.
Exercise 5. Decide if the following words collocate with code or language. Choose the
correct answer A or B.
1 low-level A. code B. language
2 machine A. code B. language
3 object A. code B. language
4 high-level A. code B. language
5 programming A. code B. language
6 markup A. code B. language
7 source A. code B. language
8 assembly A. code B. language

Exercise 6. Match the terms (a-h) with their definitions (1-8)

Terms Definitions
a. assembly language 1 : general term for a formal language used to write instructions
b. low-level language that can be translated into machine language and then executed
c. object code by a computer.
d. markup language 2 : a set of instructions that a computer can understand directly;
e. programming language it is expressed in binary code and is very difficult to write.
f. machine code 3 : a type of low-level language that uses abbreviations such as
g. high-level language ADD, SUB and MPY to represent instructions; then translated
h. source code into machine code using an assembler.
4 : a language such as an assembly language, which does not
need a compiler or interpreter.
5 : developed to make programs easier to write; for example,
FORTRAN, BASIC, C and Java.
6 : the original work of a programmer, which must be translated
by a compiler.
7 : instructions that a compiler generates from source code
written in a higher-level language, for example C++.
8 : a language for creating web documents.

Exercise 7. Reorder the steps in the writing of a program.


1. Compile the program – that is, turn it into machine code.
2. Test for errors and the debug program.
3. Make a flowchart, which shows the steps of the program.
4. Write instructions in a programming language.
5. Prepare documentation, for example the instruction manual.
6. Understand the problem and plan a solution.
UNIT 6: JAVA
Main topics: the Java language, computer history
I. VOCABULARY:
Applet A small Java application, usually designed to run automatically within a
web page
Java The programming language from Sun Microsystems for building
internet applications, Java programs (called applets) let you watch
animated characters and moving text, play music, etc.
Platform-independent Refers to software that can run on any computer system
Object-oriented A technique that allows the creation of objects that interact with each
programming other and can be used as the foundation of others. Used to develop
graphical user interfaces.
Java ME The Java platform, Micro Edition, used to create applications that run on
mobile phones, PDAs, TV set-top boxes, and printers. For example,
many phones are configured to use Java games.
Multi-threaded Refers to a computer program that has multiple threads (parts), i.e many
different things processing independently and continuously. This
enables the program to make the best use of available CPU power.
II. PRACTICE:
1. Find the followings:
1 If a piece of software can run on any OS, it is independent.
2 A competitor to Java, developed by Adobe.
3 Java and C++ are both examples of -oriented languages.
4 The name of a Java application which runs automatically on a web page.
5 Java is used to create objects (barcharts, diagrams, etc.) which are more interactive than the
standard versions.
6 Java is multi- , which means that a Java program can have multiple parts operating at the same
time; this saves on CPU power.
7 Java was created for use on mobile devices.
8 When Java source code is compiled, it is converted into bytecode, with a file extension . .
2 Two of your classmates, Paula and Antonio, are discussing their experience with computers.
Complete this part of their conversation by choosing the correct words to fill in the blanks.
Paula: So, Antonio, let’s look at the first question. When did you first (1) ……………. a
computer game?
Antonio: Wow, it’s so long ago! I think I probably (2) …………….my first game when I (3)
…………….8 or 9. I can’t remember what it was (4) ……………. , though. OK, a question for
you now, Paula. How old were you when you (5) ……………. your first computer lesson at
school?
Paula: Mmm ... Well, I (6) ……………. learning about computers properly three years ago. But
I’ve (7) ……………. computers nearly all my life – for as long as I can remember! I didn’t use
the Internet until I was about 12, though. My parents wouldn’t allow it. They were (8)
…………….about safety, that kind of thing.
Antonio: Mine, too. I didn’t (9) ……………. my first chat online until I was about 13, I think.
And even then my parents (10) …………….everything I did! I (11) ……………. them to let me
have my privacy after a few months, though.
3. Reading
The idea for Java started in 1990, when a team of software engineers at Sun Microsystems
decided to create a language for a handheld device that could control and interact with various
kinds of electronic appliances, ranging from developed an object-oriented programming
language that one of the engineers, James Gostling, called Oak, after the tree outside his window.
The device even had an animated character named Duke, who would go on to become Java’s
mascot.
With the advent of the Web in 1993, the company made a web browser based on the Oak
language. Later on, this language was adapted to the Internet and renamed Java. The 1.0 version
of Java was officially introduced by Sun in May 1995.
At that time, web pages could only display text, picture and hyperlinks. With the arrival of Java,
web designers were able to include animation and interactive program on web pages. The first
major application created with Java was the HotJava browser. The Java language began to attract
serious attention from the internet community and was soon supported by Netscape Navigator
and MS Internet Explorer. Today, Java is a hot technology that runs on multiple platforms,
including smart cards, embedded devices, mobile phones and computers.

Answer the questions:


1. Who started the idea for Java?
2. When was the first version of Java officially introduced?
3. What can Java run on today?
UNIT 7. COMPUTER NETWORKS
Main topic: Networking basics, types of network, wired network versus wireless network.
Exercise 1. Read the text and fill in the gaps using the list of words below.
Computer networks link computers locally or by external communication lines and software 1
__________ allowing data to be exchanged rapidly and reliably. The 2 ________ between
local area and wide area networks is, however, becoming unclear. Networks are being used to
perform increasingly diverse tasks, such as carrying e-mail, providing access to public databases,
and for 3 ______. Networks also allow users in one locality to share resources.
Distributed systems use networked computers. PCs or 4_______ provide the user 5 _________ .
Mainframes process 6 _________ and return the results to the users. A user at his PC might
make a query against a central database. The PC passes the query, written in a special language,
to the mainframe, which then parses the query, returning to the user only the data requested. This
allows both the network and the individual PC to operate efficiently.
In the 1980s, at least 100,000 7_________ were set up world-wide. As 8 __________ orbit
satellites have lowered the price of long-distance telephone calls, data can be transmitted more
cheaply. In addition, 9 ___________ cable has been installed on a large scale, enabling vast
amounts of data to be transmitted at a very high speed using light signals. This will considerably
reduce the price of network access, making global networks more and more a part of our
professional and personal lives. Networks should also improve our work 10 ________ and
technical abilities.

distinction fibre-optic protocols synchronous


distributed systems LANs queries workstations
environments screen handling

Exercise 2. Read the text and fill in the gaps using the list of words below.
When you're installing a LAN, you may be 1 _____ your computers for as much as a day or so.
A lot depends on how 2 ______ the installation proceeds, and that depends on your own 3
________ . Professional installers can have each of your machines 4 _______ of 5 ________ for
only a few minutes at a time. If you can't live without your computers for a while, you might
want to 6 _____ doing it yourself.

Installing a LAN involves running cable to several 7 _______ . This may require you to install
junction boxes in walls, do the wiring, and maybe install electrical 8 _______ as well. If you
aren't 9 ______ with these skills, and if you aren't a 10 _______ electrician, you will need to hire
someone for this part, at least. Of course, if you're installing your LAN in one room, then you
might not need to hire anyone.
experience Power Without
avoid offices Operation
qualified. well familiar
out

Exercise 3. What do the following abbreviations stand for? Choose the correct answer.

1 LAN A. local area network B. large area network


2 PAN A. private area network B. personal area network
3 MAN A. managed area network B. metropolitan area network
4 WAN A. wide area network B. wireless area network
Exercise 4. Which criteria is the writer using to classify the networks he’s describing?
Choose the correct answer A, B, C or D.
1 The most common examples of networks are LANs, PANs, MANs and WANs.
A. geographical area B. network protocol C. architecture D. topology
2 There are several languages that the computers on a network can use to communicate with each
other. For example, the Internet uses TCP/IP.
A. geographical area B. network protocol C. architecture D. topology
3 A client-server network differs from a peer-to-peer network in several ways, the most
important being that on a peer-to-peer network, there is no need for a separate computer to act as
a server.
A. geographical area B. network protocol C. architecture D. topology
4 The most common layouts for networks are bus, star and ring.
A. geographical area B. network protocol C. architecture D. topology

PHRASAL VERBS
1. turn down
You should turn down the television if
a. it's too light
b. it's too loud
c. it's too soft
2. turn off
We should turn off all our appliances when we aren't using them in order to
a. waste energy
b. save energy
c. use energy

3. turn on
You can turn your mobile phone on again after you have
a. bought your ticket
b. entered the cinema
c. left the cinema
4. turn out
Make sure you remember to turn out
a. the computer
b. the air conditioner
c. the lights

5. look after
My friend has asked me to look after his dog because
a. he can't find it
b. he's going away for a few days
c. his dog can be dangerous
6. look at (1)
When you're doing an exam, you shouldn't look at
a. your exam booklet
b. your teacher
c. somebody else's answers

7. look at (2)
Now that she's graduated from secondary school, Nicole is looking at
a. studying in university
b. Italian shoes
c. fashion magazines

8. look for
Mustafa is looking for his brother because
a. his brother is very busy now
b. he doesn't want to see him
c. he needs to talk to him

9. look up (1)
In which book could you look up the names and dates of all the dynasties in Chinese history?
a. a Chinese business directory
b. a Chinese phone book
c. an encyclopedia
10. set up (1)
When he was still a young man, Henry Ford decided to set up
a. a new car
b. a car engine
c. a car company

11. set up (2)


Before interviewing people for his film about learning English, Daniel had to set up
a. some questions
b. his equipment
c. the students
12. take up (1)
The kitchen takes up too much room in the apartment. I think it should
a. be bigger
b. be smaller
c. be better

13. take up (2)


When he retired from work, my uncle took up
a. ballroom dancing
b. sleeping late
c. having nothing to do
14. take apart
Ben took apart the electric fan in order to
a. break it
b. steal it
c. fix it

15. take back (1)


I took my new phone back to the store because
a. I really liked it
b. it didn't work properly
c. I'd lost it
UNIT 8: NEW TECHNOLOGIES
Main topics: New trends in technologies
I. Vocabulary:
Nanotechnology The science of making small devices from single atoms and
molecules.
Atom An, extremely small part, quantity or amount
Molecule A small particle./ a tiny bit
Nanocomputer A molecule-sized computer, the size of a grain of sand, e.g. a
quantum computer, a DNA computer, etc.
Nanobot A microscopic robot, built by means of nanotechnology
Nanotube Extremely small tube made from pure carbon. Nanotubes are
expected to be used in the development of materials for buildings,
cars, airplanes, clothes, etc.
Artificial intelligence The study of methods by which a computer can stimulate aspects of
human intelligence.
Robotics The branch of engineering devoted to the creation and training of
robots.
Android A robot that resembles a human
Biometrics The science that uses computer technology to identify people based
on physical features, such as fingerprints or voice scans. From the
ancient Greek: bios=life, metron=measure
iPhone A device from Apple that combines three products in one: an iPod,
a mobile phone and an internet communicator.
iPod A family of portable media players from Apple. Popular models
include the iPod Nano, the iPod Shuffle and the full-sized iPod that
can also be used as a portable hard disk.
iTunes A program from Apple that lets you play and organize music and
video files, on computer or on an iPod. With an internet connection,
iTunes can also connect to the iTunes Store in order to download
purchased music, videos and podcasts.
sensor A mechanical device sensitive to light, temperature, radiation level,
or the like, that transmits a signal to a measuring or control
instrument
Smart device An object containing a microchip and memory
Smart home A home where all the systems (security, lights, appliances, sensors,
audio-video devices, etc.) are interconnected to allow the automatic
and remote control of the home
Smart phone A mobile phone with advanced functions, providing voice service
as well as any combination of email, text messaging, web access,
voice recorder, camera, MP3, TV or video player and organizer.
Embedded Inserted into; fixed into the surface of something.
Chip A tiny piece of silicon containing complex electronic circuits. Chips
are used to make the hardware components of a computer.
Chip and Pin A secure method of paying with credit cards. Instead of using a
signature to verify payments, customers are asked to enter a four-
digit PIN.
II. PRACTICE:
1. Reading
Robots and androids
Engineers are trying to make computers think and behave like humans. By combining
Artificial Intelligence and engineering techniques, they are building many different types of
robot and android.
Robots are devices that move and react sensory input. They usually contain software that
runs automatically, without the intervention of a person. Today, robots are used in a wide variety
of contexts, from factories to space exploration. We drive cars that have been welded by
industrial robots; we buy products that have been made and packaged by robots in an assembly
line; we use machines that have been built by robots.
Our life is affected by robotics in many other ways. Just think about medicine and the
health system. Tiny computers are used to monitor the heart rate and blood pressure; micro-
machines, and insect-sized robots help doctors in heart operations and other complicated surgery.
In the future, tiny robotic creatures, called nanobots, will be injected into the human body and
move through the arteries, curing illnesses. Robots are also used in dangerous situations – for
example, in repairing nuclear plants, cleaning toxic waste and defusing bombs. Robotics has also
been incorporated into the first smart homes, where there are gadgets that regulate the central
heating, sensors that control the solar panels, robot maids that do the housework, etc.
Some research centres are even building androids – robots that have the shape and
capabilities of a human being. In the near future, androids will be available for sale. They will
have access to the Internet, be a guide for the blind, assist elderly people at home; they could
even be a 24-hour security guard for your home, sounding the alarm in case of fire and phoning
the police if there is a burglary.
Find words in the text with the following meanings:
1. the stage of mass production in which parts of a product move along for progressive assembly.
2. the study and use of robots
3. microscopic cell sized robots
4. buildings where the systems are interconnected to allow automatic and remote control
5. devices that receive and respond to a signal or stimulus
6. robots that look like human beings

2. Then and Beth are discussing a magazine article about new technologies. Complete their
conversation by choosing the correct verb forms to fill in the blanks (a–l). decide what type of
new technology they are discussing in each part of the conversation (1–4).
(1) …………………………………………….
Anthony: Have you seen this article in the New Scientist? It’s all about new technologies. It’s
fascinating.
Beth: Go on, then. How (a) …………………………?
Anthony: It’s predicting that pretty soon scientists (b) ………………………… to be able to
make devices like computers and robots using single cells and atoms.
Beth: Wow. To do what?
Anthony: Well, they’re talking about being able to treat diseases at a cellular level by injecting
one of these miniature robots, or using the technology to make new, more flexible materials from
carbon atoms.
Beth: What (c) ………………………… next?
(2) …………………………………………….
Anthony: Well, it’s funny you should ask. The article goes on to talk about things like robotics
and androids.
Beth: Androids?
Anthony: Yeah. It says that by 2050, scientists (d) …………………………androids that look
like humans and have the capacity to interact like humans.
Beth: I don’t think I like that idea. I think it (e) …………………………more trouble than it’s
worth. Imagine everything that could go wrong!
(3) …………………………………………….
Anthony: OK, I think you (f ) …………………………this next one more. How about having a
computer that controlled all of the appliances and electronic equipment in our house? It would
save money because the house would know when you weren’t home, and it’d make sure
everything was turned off.
Beth: It (g) ………………………… expensive, though, I imagine.
Anthony: Who knows how much things (h) ………………………… in future! Perhaps (i) on
the Moon by then!
(4) …………………………………………….
Beth: What does that last bit of the article say? The bit with the photo of that small microchip?
Anthony: Hang on a minute, I (j) ………………………… look. Umm ... it’s talking about a
type of technology that uses radio waves and these things called ‘tags’ to identify people.
Beth: People? So they could embed one of these tags in me?
Anthony: Well, in theory, yes. But they’re mainly used on animals – so you can track your pet if
they vanish – and on products in shops – so that they can stop people stealing.
Beth: Mmm. It still sounds suspicious to me.
Anthony: Well, it does say here that some organizations are worried about privacy issues.
Beth: I do worry that in the future, governments and big corporations (k)
…………………………all of these new types of technology to keep us under control.
Anthony: You worry too much. Here, you finish the article. I (l) …………………………us a
nice cup of tea.
Technologies
Smart homes Artificial intelligence
RFID Nanotechnology
Verbs
a. our lives/ change
b. go
c. they/think
d. build
e. be
f. probably be
g. cost
h. we/ live
i. will
j. will
k. use
l. make

You might also like