Professional Documents
Culture Documents
Chargé du Cours
The Internet connects computers in three \Mays. First, one individual can exchange
a message with another individualby computer; this is called electronic mail 1e-
group. By far the most common use of the Internet is e-mail, both for individuals
Second, an individual can entei the files of a computer at a remote site to access
individual finds important information in a file, he may transfer that file back to his
As a result of his electronic communication, the world is shrinking. V/e are creating
an information age. People who never meet face-to-face are communicating daily,
For example, the internet is changing how scientists do their work. It is cheaper and
quicker to display the results of research on the Net than to publish an article in
The networks are also influencing business practices in marketing, advertising, and
hiring. Consumers are reporting their needs directly to companies, and they are
42
.1
turning to electronic employment services, which listjob requirements andbenefîts
In addition, the electronic discussion groups are creating a ne\M style of social
relations. People of similar interests are talking to each other using only text on a
screen. Physical features such as age, appearance, and social class are hidden
behind the screen. From their homes, e-mail users are finding new friends to discuss
movies, hobbies, family life, health problems, fashion, travel, and politics. These
discussions can be private 1if the message is sent to an individual e-mail address;
groups, because the Intemet is a good place to learn which issues really interest the
voters. In some cases, politicians are changing their positions in response to the
1. N{ention fiom the text o groups of people whose life is influencedby the
intemet.
z. The author says that the world is becoming smaller because of electronic
communication.
43
F Vocabulary
Which words or expressions in the text are similar in meaning to the
fbllowing definitionsi
d. Far away
message.
F Put the right article (a an, they or Owhere no article is needed. Do not copy
the se,ntences. Write only the number and the article or 0 Example: ro. an
Many Syrians ur. ,ro* emigrating to. . ..+. . ..Europe in .. ..s . . ..great numbers.
44
A- SayinFrench
1. The processing of data is carried out by a computer, controlled by a program
settled by a programmer.
2. IJS computer manufacturers earn about half of their income from selling
spare pafts.
B- Say in English
1. Les disquettes, clé USB ne sont pas autorisées.
z. Les TIC sont des instruments de communication, de recherche et de gestion
administrative.
45
TEXT 2:
Front pockets and purses are slowly being emptied of civilization's most basic and
enduring tools: the key. It is being swallowed by the cellphone. New technology
lets smartphones unlock hotels, office and house doors and open garages and even
car doors. It is a not-too-distant cousin of the technology that allows key fobs to
unlock automobiles remotely and key cards to be waved beside electronic pads at
office entrances. V/hat is new is that it is on the device more people are using as the
Swiss army knife of electronics- in equal parts phone, memo pad, stereo, rlâp, GPS,
camera and game machine. The phone simply sends a signal through the Internet
and a converter box to a deadbolt or doorknob. Other systems use internal company
and carmakers are betting on broad acceptance ofthe technology. Schlage, a major
lock maker, markets a system that lets homeowners use their mobile phones to
unlock their doors from miles away and manage their home heating and air-
conditioning, lights and securiÿ cameras. Customers buy locks that are controlled
1. Choose the letter (a, b or cl that corresponds to the axrswer. Do not copythe
sentence. Just write the nr:mber and the letter. Ex. : t.D
46
a- Carmakers and lock companies are sure of the popularity of the new
technology.
b- With the new technology users can lock and unlock their premises a clistance
away.
) Vocabulary
z. Almostsimilar 3.
47
z. our boss would have attended the meeting if he (\Mere, had been, was;
present.
3. The sales manager has to give up, he has (any, no, none) choice.
*Put the verbs in brackets into correct tense. Do not copy the sentence. Er: zo.
Tü[ill go
s. Before he repaired the computers the technician 1to identiÿy the breakdown.
6. The manager will have his new car 1to overhaul; next week.
) Translation
In October, General Motors introduced an app that lets owners of most zor r G.M.
models lock and unlock the doors and start the engine remotely. It allows car
owners to warm up the engine on a frigid day or start the air-conditioning on a hot
one.
téléphone mobile est devenu une véritable pacotille. I1 est devenu un compagnon
des jeunes qui ne peuvent plus s'en débarrasser un instant. Outil très utile, il a aussi
48
Text 3:
With Facebook's membership approaching 600 million and more features and
applications continually being added to the site, it sometimes seems that it is the
only social network around. But it is not the only one, even if it is dominant.
Specialized networks are catching on, with users who say they prefer a more
focused way to share photos, videos or music or who simply do not want everyone
huge audience of Facebook or Twitter to let their members reach the mlximum
number of friends. But if you are woried about Facebook's potential privacy holes
and want to steer clear of them, there is a network for that, too.
Instagram, a photo-sharing network built around a free application for the iPhone,
is the breakout hit of specialty social networks. The service says that more than one
Instagram's secret weapon is its building photo filters, which modifÿ yourpictures
before you upload them. Some effects are comy, but some work wonders at
removing the often harsh lighting and jarring colors of cellphone photos. With the
help of the f-rlters, the images may look better than those uploaded to other social
To find friends to share your photos with, start the application and tap the profile
option at the bottom right of its screen. Instagram offers several \Mays to find
people: log in to Facebook or Twitter to see lists of yours friends who are already
49
up; searchlnstagram'sdatabaseofusersandusernilres; browsealistofsuggested
users whom the company has deemed worth following for their photos.
) Comprehension questions
1. Say whether the following stateme,nts are True or False. STRICTLY \r,rit€
F Vocabulary
a- apiece of software.
b- a number of computers and other devices that are connected together so that
computer.
50
A. Choose the suitable answer from the brackets. Don't copy the sentences. Ex.
o. About
l. "Please, switch (out, off, of; your computers and look on the board", The
teacher said.
2. The manager the car 1of which, of whom, who) was stolen came to work on
foot.
3. Many students in Togo are good 1in, at, about; computer science.
4. Our boss will accept any misconduct except (come, to come, coming; to
work late.
5. If the business (v/ere, was, had been; expanding they would recruit more
employees.
z. Our boss announced that the ne\M computers would arrive the following day.
> TRA}TSLATION
Path is a network for sËaring photos and videos. But Path limits each user to sharing
with fifty friends at most, rather than with everyone they know. Your friends need
to check their Path applications or Path's Web site to see your images.
"'fhe dramatic rise in Chinese imporls into Europe iurd the IIS is actwrlly good
nerns ftrr our economic prospects".
5l
"\\"c rttust tn' t«r prevettt Clrirra lirrrn rlevelclllirrg its ecorronit' bt' ercctirrg trarlcr
lxulic:rs ;urrl br, blocliing'its exports".
d'ef}èts négatifs que d'effets positifs sur le mode de vie des jeunes. Plusieurs
chercheurs insistent sur cet aspect négatif de ces technologies. Les élèves et les
étudiants ne s'occupent plus de leurs études. Même en ciasse, des élèves souvent
-l-lre
a- ur-iter-'s arlrlressi'letterlrearl.
52
Computer Training Erpert Solution Consults Computer Basics
and.time-consuming calculations, such as those usecl to create lveather
predictions. Large businesses, scientific
institutions, and the rnilitary use thetn. some supercomputers irave
manÿ sets of cpus. These computers break a
task into srnall piecet, each CPU processes a portion of the tasl< to increase overall speed
-1ng and ef,ficiency.
Such computers are called parallel p.o.*snorr. r\s computers have increasecl iu sophistication,
the boundaries
between the various types have become less rigid.
a' A boot scctor virus stores itself at the starl of a clisk and becomes activated by reading, startilg
J or restafting
tl'Lecomputer when that disk is in the boot drive.
b' A filc iufectorvirus attaches itself to program files i.e. flles that give instructions
to a computer. These files
usr:ally havc extensions like exc, coll, or bat. Whcn thc progran-,
À .,,,-,, the virus execlltes.
c' A macro virus affècts data files, especially worcl clocumcnts and Excel r,vorkbooks.
accottnts {br the vast rnajoriÿ of inlectecl files. when the inlèotecl
This vims type
clocument is opened a,cl the rnacro are
rttn' lhe virLrs is triggerecl and catt perlorm systern opcrations
such as creating or cleleting files or rvriting
into already existing files ancltlius have the pcitentialtl car-,se great
a
lvorrn or an email virus (for the purpose of this guide) is not really a of
deal clamage.
d' virus at all (in tlat it is not selÊ
replicating) but a chain letter phenoutenon sent through email.'fhe
rressage rvill, lor sorne reason or other,
tell yor-r to pâss this message oll to as many people ris possible. Iloax
viir-rs alefts are typical examples of
chain cntails"fhcsc are distinct 1i'otl vit'uscs iir that thcy clo not
have host file like 6ost othcrviruses but are
carried on the internet aud catl spreacl from ouc .or.,1rut"t. to another
by thernselves u,ithor:t the need for a
Ltscr to ltssist thc plocess by giving sorneor)e an irrlèctccl
Illc or clisk.i'hey are usually spreacl through the
16159, Nov - 2010 ...Learn to Know Why and IIow!
adebisij eleel@yahoo.com o r aclebisij eleel@gmail.com
Computer Trainir,g Expert Solution Consults Computer Basics
internet as an attachment,
e. Tro.ian horses are progralns that llilr,e sornr.l hiclilen, ireuerally nralicious functionali§, that
the computer
tiocs ltot r:>lpect. T'1ie1' 6;1.;t., to br, a i.liin1r (r:.a. nu arulir; Ibr r::;aurple). r.,,hen thev are actrrally
another (e.g.
coclcthrtivill overtvt'it.e ltpoiiit,'l-ioï'1'çrç,'irrirrliiirii).'lhcvrJonotiirii theirorurlikeavirusdôesbutrelyon
computer viruses r,vork in trvo phases: infection phasc ancl the attaok phase.
Infection phase: in order to infect a computer, a virus has to possess the chance to get
execrrted before it can
infect the computer system and spread to others. Events that can trigger the execution
of virus are included
a Dove.
Attack phase: viruses do destructive things such as deleting files, erasing data on
a hard disk. sending random
emails or slowing down the processor by sending millions of looped instùctions.
Silce most users will try their
best to delete the virus once it launches the attack, most virus dâay revealing
their pïesence by launching their
attack only after they have had ample opportunity to spread. This rneans thJattacl<
may be clelayecl ibr a long
tirre alter the infèction.
Compr:ter users can prepare lbr a viral infection by creating backups of legitimate
original software and
clatafiles regr"rlarly so that tlle computer system can be restored if iecessary. Horvire., the
bestprcvention may
be the instzillation o['cttrrent and rvell-clesignecl antiviral softlvare. Such software
can prevent a viral infection
and thereby help stop its spread.
OI obtain a virus checlcer for your owtt machitre thcn register thc program rvith tl-re rnanufacturers. .I.hey
will
regLrlarly scnd you updated versiotts of tlic soltware r.vhile your agreement
is curent. New viruses keep
appearing, so ot'tt of date virus software will not protcct you ancl the cirecker
is essential. hrstall the available
secr"rrity patches, particr-rlarly for Microsolt products. I(eep your Iloppy
clisl< r,vrite-protected whenever possible.
lf'yoLr are really catttiotts, change the set-up option in your computer's BIOS so
that it rvill always boot from the
hard clisl<, not Ii'orn floppies.
Writc protcct MS Word's Norntal teuplatc to gct linritecl protection against nlacro viruses,
Ttris te,rplate will
bc a [j le callccl Norrrr al.clot. Se lect th c l{eacl On ly bod. Notc that th is will not
clisinlèct existi,g i,fectecl files.
Il159, Nov - 2010 ...Learn to I(norv Why rrncl I_Iorv!
a cl ebis i.j clcc l@,ya hoo.cr) nl o r a cl c bis i.j clcel@gmail.c om
Cor)rput(r't'r.aining Ilxpert l$*lution Consultg ComputerBasics
I, \\/o.tl' lrtrrl on litr-: l\4;1t''n \iinrs P.otcclio' option
in 'I'o.ols.,
N4acro liecLrrilr, button, trl,setting the level ol.securit,r,
1h-cn optiori:;. then secur.ity Tab a,d finally
1;or, .lesir,, ftr tlà r1o.ior. This u,ill walr you if files
mav lta*e cre'ate,i tj,o. ,rrr.ro^s f,ir so,re regitin:are purpose but they courd
:i,'|.iTliïîï,,,ï:1.:l:.'l "olt*{'rsrrc
,,r,,,,,rïi::lll:(Tii:iil;liïl"il:,T:,îii;il,,.îîî;,ilîï,;;;ff,X:.lll;:r11ï.,1:ïffi.o..d,..
*,iii.,i,,,,,o,,
1,-inis Ilrter liotr
vahte lrs :iLrc111 115,1'or-t briilc it hontc and il r,.:rlrrir-!::l lrrqrlial nuiintelanr:c tc li-ee1l ii runrti.g.*o""ttrtf.
To proll(ll'h'cleal ri'ith repairablc:tvstrrlls,
u'c reecl to iirst unclcrstantl how r:ompoleirts
aro restored (i.e . thc tnaiutenartce actions tirat the conrponents uridelgo).
these systems i,
In general, rlainte,a,ce is clefined as
an,v actiott that restores {àiled units to an operational condition or
retains non-failecl units
For repairable systems, maintenance plays a vital role in the life of a syskrm.
an operational state. i,
lt affects the system,s overall
re liabili§, availability, dorvntime, costof operation, etc. Generaily,
rnàintenance actions can be di'ided into
three types: corrective uaintenance, preventive rnaintenance ancl inspectiols.
Preventivc Maintenance
Disk Defragmenter
Dcl)'rX
z\t titiles. it l;lir:ht lic diillcLrlt 1{i c\/tn :;cit:ct thc clrivc to be ci,.:liagrrir:nicrJ;hencr;
the use olcon-rrnand line.
Locates ancl consolidrtcs lragmcntecl boot files. ciatt 1iles, ancl lblders on local
volumes.
Syntax
' A volutne mttst havc itt lcast l5% Ii'ee space lbr dcfrag to completely ancl adequateiy
defragment it. Dcfiag
uses this space as a sortittg aren fbr file [r"agurents. If a volume has less
than 1 Si/o fte'e.pu".] clefrag rvill
only partially del'ragrlcnt it. To inct'easc the free space on a volume, delete unneeded
files ormove them to
anollrcr cJisli.
' You cannot defi'agment volttures that thc Iile system has markecl as clirty, which indicates possible
corntption' You ntust rutt chkclsl< on a dirly volutle before yolr can ded.agpent yo,
it. can determine if a
volume is dirty by using the Ilsutil clirty qucry cominancl.
' whilc delrag is analyzirrg ancl cleli'agmenting a vohrrne, it clisplays a blinl<ing cursor. when clefrag has
lln ished analyzing ancl clcfi"agmcnting thc voiume it clisplays ihc-analysis
, ..pîrt, the defragr.entation reporl,
or both ropot'ts, and thctr cxits to thc cotnrrrand prornpt.
' Ily tls[trLIlt, dcli'ag clisplays a stlnunarv ol'both the analysis ancl cleli'agmentation reports if 1.ou clo.rot
spcci11, tlrc /1 or /v pat'ameters.
o Yotr catr scttcl tltc rcports to a tcxt lilc by typing >.filename.txt,wherefilenatne.txtis
a file name you specify.
For cxitrlple : clcl'r.ng t,olutne lv >.filaname.tx/
' '['o intcrrr-rpt thc deli'agrncntation proccss. at thc commerncl line, press CTRL+C.
21159, Nov - 20 10
..Learn to Knorv Why and Horv!
ru d cbis i j clcc I@1,a hoo.co m o r arl cbis
i.j cl ccl@gmail.com
Computer Training Expert Solution Consults Computer Basics
' Running the defrag command and Disl< I)cfi'ag,nrenlor
arc rnuhuLrly exclusive. If you are usi,g Disk
Defiagrlenter to defragment a Vtlltttnc ancl
1'cxr r,ru thc dcfreg comrnand at a cornmand-line, the clefrag
command fails' conversely. if you run the defrag cornrnancl
and open Disk Defi.agmenter. the
defragmentation options in Disk Defi'agrnenter are unavailabre.
Fo rmatting lcgcnd
Format Meaning
Italic hrfomation tltat the user must supply
Bold Elemenls that ihe user must trpe exactly as shor,vn
Ellipsis (...) Parar,etcr lirat can l;e repeatecr severar times iu a c.mmancr
ri,e
Betr,veen bracl<ets (fl) Optional itr:ms
B.etween brace s ({} ); choices separatecl bv
Exarlple:'ievenlodd)
pipe (l). Sct olcltcice:: f i-'m u'lticir ihe user rnust ciroose o1[y one
Courier font Code clr program orrlput
Co rrective Maintenance
Always keep detailed records o{'all crrors ancl steps tal<en to correct these
erors. Eror numbers and
oodes are irnportant to log. They tell tccluricians/netrvàrt aclrninistrators
specific information about the
problcms yoll are having' To clocument errors, press the "Details"
button o. simply rvrite down the first couple
o1'lines of information given in the error scrt:crl.
Chcck alI cablcs first' "l"he nlost fi'cqttent 1;r'oblcm rvith cornpr-rtors is a loose ordisconnected
cable. Do,,t
bc aliaid to mahe rnistakes. Don't let tho rnachinc intinticlate,),,r,,. Ilefbre calling
an expert for technical
supllol't, always shut your oolllputer clown totally aud reboot: wait untiItl,e
CpU is not making any souncls and
22159.Nov - 2010
...Learn to Know'Why and l{ow!
adebisijeleel@ya hoo.co m or adebisijeleel@gmail.com
Computer "l't'aining Expert §olutiorr Consults Computer Basics
then trrrn il on ag-.ain, by' pressing tlrt: pon er brrtton.
1. Booting Problcr;rs
b'
,rigrrr bc rirnc rJ üillïTii:::jl*tl
Mynrouscrvott'trightclicl<,o'';;;'tclouble
doesn,t rettre probrern, it
clicrr: prcssctrr-Art-nsca,c1
usethearrowr<ey,ptogetto
24l59,Nov-20t0
r rrcbisi.i crc.r(r)va to Know \vhy and How!
hor.co,) o r a rr c bis i.icrccr@o;;;,ï.:,ïr
Computer Training Expert Solution Consults Computer Basics
and then choosc reboot. fhis shoulcl fix rhe problem, if not a technician should look at the
*Ïl,f,::'
B. I(eyboarcl probiems
a' I am recei'ing a ke1'§32rcl error i'hc'n bootirlg mv conrputer:
This is usually caused by a key being p,shed
dorvn *'hile the comottter st.r'rts. N4alle sirre ,ottrirrl3
is ân top oi'tirc kel,boar.d during boot time.
coulc1 be cattsed by thr: I<e,bo"t'cl beco*ti,g Also this
riisconllected fio,r thc baci< of the computer.
are the probl:rn. contact If ,either ofthese
.
b' lrour techirician.
À{1'Iic,i'bolrd 'rvon't responcl at all: If'1'ouI Colrpulçf
iriis "ll.ozen,, and the keyboard lvill not
the tr^t ttrri,g to cio is to cltcc'l< tltc l:e1'$6n1il con,cction respond at all,
to the conrputer and restarl the computer.
keyboarcl stilr rloes not .espon11, If your
,r,sv nray nee (r tcch,icrl a.ssista,ce.
9. Printcr. Pr.oirlclris
a' The pri,ier'\'"o11't Pt'int nl, tioctitrtr:,t: (.lic'cll {iie p'intcr lo nral..r-'r;ure it is pluggc4
Start-ÈsettinglsùPlintels. llthe in a,d turnecl on. click
i:rintr:r'r',,,,,..,"r,t,",,r" is not li:;tej,,;"., Jviirhave to instail thatprinter.
You can ti. tlrir; b1
''-Jicliiirl, "A,i,i l'r'irr1e r" rrnrl I'riicrr,inir_thr: i,staiintiou p,o.*r. tlrrough
to cor,pletion. If
select c.lirtr-: NJcxt, nllll<c :;ttrr': tltat f i,11 lta'c clrose, thc
cor.ccl pri*tel.. you can checl< this by going
intrl thc {ilÊ 1'si1r,t:re tt,in['1o back
ltrittl ani] clic[< on Fil*àprinr. Tlie uarn" ofthe printerrvill appearnearthe
1op' o{'lhat *'ittclot'next to "Nûnle".
I1'the correct pri,te. does 11ot appea.-ir-t6,
arl'o\l/ t, litc .ight o f the uamc ol the pri*ter box, click on the dowr
bci,g *serl. Fi,r,i;,;;; ;;i;;;; ;',r"me ancl
clichi*g tlrc 1el't 1lloLlse button o, it. ortcc highlight it by
)'o., hnî'" e,snr:ecl that the correct printer is chosen and
printer is not ofllinc or pausecl, eusure that the
r"gg",r o,to the ,.t .'ro do
look to sce il5,sul logon name is listecl.thairou aftei,.t_og "r*Ofii tf "ort
this. click start and
back onto the network' To starl this process, ),or,.logon ,n_".i. not there. you need to log
ensule that you have saved your
start)Log off' This rvill bring up u aiutog i"". ôli"r. ;Ve.s,'. 'vork.
Then, click
and password to log back o,to the ,etrvorÈ. fou__rvilib" ;;o,rpted to enter yorrl. name
,,oËi
once you finish this, àr .,Enter.,, open your file
,b' Sgain and try to print it. If you stilr cannot print, "ti"t
prease cail a technician.
Documents come out fadeà or stripecl: rhis
is ,;;"1ry1;" crjfty or crogged print rreads, or the
being out of inl<' Try running a pri,t-heacl lo printer
.l.ur'ri,rg ,.,tiritv to clea, the hJàs. Most printors come
to help rvith dirty or clogged I'r"àdr. Do this with this
by g;;r;-;itartàsetting-r§pîirters,
on the printer in qr-restiot-t' Tryz clea,ing and ttre, right cticking
the heais, n,io irr.,", print a. pui".
it once more' If after tu'o tir,Ls your pages ryo, still get fades or.stripes, try
are stillcoming out faded or str-ipecr,
rcplace thc inlç' [], however, the ink lt,r-ot then you mayneed to
o, irrr", you ,hould contact a professio,al.
c l anr recciving an "ottt of t.netrrory" crror or a spoote'error:
printer is connectecl to runs oltt of mctrroty, This is .u.r..à wlien ttre machine
that the
or hzis nn internal error. This,sually
p.i,t jobs' Il'you get this error I'requcntly you happens because of large
,rrignlruori to.consider upgradi,g the
corÏpLrter with the pri,ter attachecl to it. memory on trre
It can ats"o u" cu,-,re.i by lack oiÀ...
you Itavc enough li'ee spacc. 'fo clo this, Jirk ,pu... check to see if
clouble cli"k on üy computer)Right-click,,c.,
Drivc)Propcrties''I'he liee space sl",o,lcl t",c
listecl or,",lro, ,".""n. ttyo, oniy
or le ss' that cott lcl bc yotr t hur. a couple of,regabÿes
1"oi,1"'",-,. You will neecl to eitrrer clean ,p yo.r. à,"iï. u...plu."
drivc' call a tcch,ician to llelp rvith either it rvith u bigg".
o{'these 1r,o".rr".. If yon irave adequate
trrrinstalling and tltcn rcinstalli,g the pri,rcr. disk space, try
r'o cro'ir,iiôi"r. ià;;Ïffiffin.urrers)Right_click
the prirlter in questiotl anci sclecl "Deiete." you o,
*n,ri tà',.ir-,or" it cornpletely ûom the
"Adcl Printer" allcJ rcirrstall the sat,e s1.stern. Then crick
printer. II'it was,-o"à o..o.r r,.,"*o.t-Luk.
"sharc" with the sarre nârne' This can
be clone uy .igrri"ri"r<ing on tlr" prl;tr;^;nd
rrr. you reestablish the
Prin te r". choosing ,,share This
10. CD-Rorn Issues
a' I havc no ar'tdio artcl/or my cD playcr rvon't cor.Ire on rvhen playing
an audio cD: First, check to
yclt"tl'spcal<crs arc tttrncd on ancl
the volttnrc leve Is arc aclequate. see if
At the Tasr< bar tray is a Iittre spear<er,
25159, Nov - 2010
,crcbisi.ierccr@ynrroo.corn I(no'rv why ancl Horv!
or,.dcbisi.icrec,e;lrrt#t.