Professional Documents
Culture Documents
DEPARTMENT OF LANGUAGES
V. Yermakova
B. Jolamanova
M. Vasquez
TERMINOLOGICAL PRACTICUM
FOR IT STUDENTS
Approved
by Academic-Methodological Council
of the Republic of Kazakhstan
Almaty
2017
УДК
ББК
Reviewers:
Doctor of Pedagogical Sciences, Professor, Rector of Kazakh Ablai Khan University of
International Relations and World Languages Kunanbayeva S.S.
Doctor of Philological Sciences, Professor of Kazakh British Technical University Zagidullin R.Z.
Doctor of Philological Sciences, Professor of IITU Issayev M.K.
Candidate of Economical Sciences, Professor of IITU Berdylulova G.M.
Candidate of Philological Sciences, Associate Professor of IITU Zhanabayeva S.B.
Candidate of Philological Sciences, Associate Professor of IITU Niyazgulova A.A.
Authors:
V.A. Yermakova, Candidate of Philological Sciences, Assistant Professor
B.D. Jolamanova, Candidate of Philological Sciences, Associate Professor
M. Vasquez, Senior Lecturer, Master of Special Education
ISBN
The manual “Terminological Practicum for IT students” is meant to complement English for ICT
textbooks for the students of Pre-Intermediate - Upper Intermediate levels majoring in ICT.
It consists of two parts, each containing several thematically organized modules. Each module
comprises a 40-terms glossary, a set of language and speech activities, aimed at memorizing and
free use of the ICT terms, and a vocabulary test to check the knowledge. Well-structured and
independently organized modules make lesson planning easy and flexible.
The manual is supplemented with the keys for exercises and tests. Alphabetical index provides
quick search of terms.
УДК
ББК
ISBN
©IITU, 2017
2
МИНИСТЕРСТВР ОБРАЗОВАНИЯ И НАКИ РЕСПУБЛИКИ КАЗАХСТАН
МЕЖДУНАРОДНЫЙ УНИВЕРСИТЕТ ИНФОРМАЦИОННЫХ ТЕХНОЛОГИЙ
КАФЕДРА ЯЗЫКОВ
В.А. ЕРМАКОВА
Б.Д. ДЖОЛАМАНОВА
М. ВАСКЕС
ТЕРМИНОЛОГИЧЕСКИЙ
ПРАКТИКУМ ДЛЯ СТУДЕНТОВ
ИКТ СПЕЦИАЛЬНОСТЕЙ
Одобрено
Республиканским учебно-методическим советом
3
Almaty
2017
УДК
ББК
Рецензенты:
Доктор педагогических наук, профессор, ректор КАЗУМОиМЯ Кунанбаева С.С.
Доктор филологических наук, профессор КБТУ Загидуллин Р.З.
Доктор филологических наук, профессор МУИТ Исаев М.К.
Кандидат технических наук, профессор МУИТ Айтмагамбетов А.З.
PhD, сениор-лектор МУИТ Хамитов А.Н.
MSc in International Business, ассистент профессор МУИТ Каржаубаева С.Э.
Авторы:
Ермакова В.А., кандидат филологических наук, ассистент-профессор
Джоламанова Б.Д., кандидат филологических наук, ассоциированный профессор
М. Васкес, магистр педагогики, сениор-лектор
ISBN
Данное пособие предназначено для студентов технических ВУЗов и колледжей, а
также ИКТ факультетов изучающих обязательную дисциплину «Профессиональный
английский язык». Тематически пособие охватывает широкий спектр информационно-
технических специальностей, таких как: Информационные системы, Вычислительная
техника и программное обеспечение, Математическое и компьютерное моделирование,
Радиотехника, электроника и телекоммуникации, Системы информационной безопасности и
Информатика.
Пособие нацелено на введение, расширение и закрепление терминологического
словаря обучающихся, развитие навыков использования английского языка как средства
профессионального общения и является существенным дополнением к основным учебникам
курса, поскольку содержит базовые, широко распространенные термины.
Пособие построено по тематическому принципу и состоит из двух блоков: общего
(содержащего общие ИКТ термины, необходимые каждому обучающемуся в работе с ПК и в
Интернете) и специального (предназначенного для отдельных технических специальностей,
перечисленных выше). Модуль является независимой единицей, что делает удобным и
гибким планирование программы обучения.
Каждый модуль состоит из глоссария, содержащего 40 наиболее частотных и
значимых терминов по указанным специальностям, и снабжен: серией из 15 упражнений
(7 языковых и 8 речевых) на закрепление и выведение в речь отобранных терминов,
контрольным тестом на проверку качества усвоения терминов, состоящим из 20 заданий
4
множественного выбора и ключами к тесту и упражнениям закрытого типа. Алфавитный
индексальный глоссарий обеспечивает легкий поиск терминов.
5
TABLE OF CONTENTS
GENERAL PART p.
Module 1. People in IT 5
Module 2. Devices and gadgets
Module 3. Texting
Module 4. Hardware
Module 5. Software
Module 6. Cyberspace
Module 7. Cyber crime
Module 8. Cyber security
Module 8. Trends in IT
SPECIFIC PART
6
GENERAL PART
Module 1. PEOPLE IN IT
7
5 Blogger an individual or a a popular/famous/notorious ~;
small group regularly blog (v); blog (n): make a post
updating its weblog on/keep/block a ~; blogging (n)
(blog for short) run
in an informal or
conversational style
6 Botmaster (n) an individual who act as/perform the functions
maintains a bot and of/take on the responsibilities of
is responsible for a~
keeping it online,
fixing errors,
ensuring compliance
with the rules of the
channel or server it's
logged into
7 Cryptographer the one engaged in work as/ take on the
(n) protecting sensitive responsibilities of/earn one’s
data and making it living as a ~; occupy/give up
unreadable for /take up the position of a ~;
anyone not meant to decrypt (v), encrypt (v),
see the data cryptography (n), cryptographic
(adj)
8 Consumer (n) a person who uses ~
goods and services demand/culture/spending/goods
/protection/products/durables/el
ectronics/market/boom;
protect/benefit the ~; consume
(v), consumerism (n) syn. end-
user
9 Customer (n) a person who buys ~ service/support; customize
goods or services (v), customized (adj),
from a shop or a customization (n)
business syn. client, clientele
10 Designer (n) the one who is a graphic ~; design (n): make ~
responsible for decisions, computer-
creating solutions aided/creative/ standard ~;
that have a high designed (adj): a specially ~
visual impact feature
11 Developer (n) the one who creates a program/application/web/back-
computer program end/front-end ~; develop (v),
and brings it into development (n),
existence developmental (adj)
12 Engineer (n) a person who computer software/hardware ~;
designs, builds, or engineering (n):
8
maintains engines, software/hardware/power ~
machines, or
structures
13 Expert (n) a person who is very security ~ ; an ~ in sth; expert
knowledgeable about (adj): be ~ at sth; ~ evaluation
or skillful in a of sth;
particular area expertise (n): technical ~; a
field of ~;
syn. proficiency
14 Follower (n) on social media sites, have ~s; become sb’s ~;
someone who follow (v), following (adj)
subscribes to and
receives sb’s updates
15 Geek (n) a knowledgeable and alpha/ugly~; geek (v), geekish
obsessive enthusiast; (adj);
an individual who syn. addict
frequently uses the Cf. a nerd
computer in his or
her free time rather
than participates in
any other activities
16 Freelancer (n) a self-employed earn one’s living as a ~;
person hired to work freelance (n): a ~ programmer,
for different try one’s hand in ~
companies on
particular
assignments
17 Lamer (n) (slang) a stupid, feel like/be a ~; a bunch of ~s
inept, or dull person,
who does not
understand what he
or she is doing
18 Layman (n) a person without a ~ in sth; an
professional or interested/intelligent ~;
specialized syn. amateur; ant. professional
knowledge in a
particular subject
19 Lurker (n) a person who reads be/act as a ~; lurk (v): ~ in a
the postings in an chatroom/on listservs
Internet forum
without actively
contributing to it
20 Manager (n) a person responsible a network/product/program ~;
for controlling or (mis)manage (v),
9
administering sth (mis)management (n),
managerial (adj)
21 Master (n) a person who has Web/bot~ ; gamemaster
complete control of (gamester) (); ~ of the situation;
sth ant. slave
22 Moderator (n) a person who act as/perform the functions
governs, drives, of/take on the responsibilities of
mediates an Internet a ~;
forum or an online (im)moderate (adj); moderation
discussion (n); (im)moderately (adv)
23 Nerd (n) an individual who is a computer ~;
obsessed with nerdy (adj), nerdish (adj),
science, math, or nerdishness (n)
technology, syn. geek, devotee
commonly
possessing little or
no social skills
24 Netizen (n) a user of the Internet, privacy-conscious ~s; the new
especially a habitual generation of ~s; netizenry (n);
or keen one netizenship (n);
Cf. citizen
25 Newbie (n) an inexperienced netizen ~s; a ~ on the computer;
newcomer to a a ~ to Linux
particular activity syn. novice
26 Programmer (n) the ones who write applications/systems/Java/exper
codes to create ienced ~; program (v), program
software programs (n), (re)programmable (adj);
by turning the (re)programming (n)
program designs
made by software
developers and
engineers into
instructions that a
computer can follow
27 Provider (n) a company that a leading/major ~; provide (v):
(ISP) provides ~ sb with sth; ~ for sth;
Internet access to provision (n); provided that…
users or subscribers (conj);
of its service syn. supplier
28 Operator (n) the person machine/equipment ~;
responsible for the operation (n): be (put) in ~;
secure and efficient operate
work of computer (v): ~ upon sb; operational
hardware systems (adj): ~ expenses; be fully ~
10
29 Repairer (n) the one who restores work as/use the services of a ~;
sth damaged or repair (n): be in a state of ~;
faulty to a normal need ~; ~ damage; be beyond
working condition ~;
syn. fix (up), mend
30 Savvy (adj) shrewd and a computer-~ person; a ~
knowledgeable about player;
sth syn. intelligent, canny
31 Scientist (n) one inventing and computer/information research
designing new ~; science (n); scientific (adj): ~
approaches to the study/knowledge/community;
computing scientifically (adv);
technology and syn. researcher, theorist
finding innovative
uses for the existing
technology
32 Specialist (n) a person highly computer support/network
skilled in a specific support/multimedia/security ~;
and restricted field specialize (v): ~ in sth,
specialty (n), special (adj),
specially (adv)
33 Subscriber (n) the one who has ~ to a magazine/service; a new
arranged for access ~; subscribe (v): ~ to sth online;
to an electronic subscription (n;
mailing list or an ant. unsubscribe
online service
34 Surfer (n) the one who moves Internet ~;
from site to site on surfing (n), surf (v)
the Internet
35 Technician (n) a person employed to a
look after technical software/laboratory/CISCO/skil
equipment, an expert led ~; technique (n), technology
in the practical (n), technical (adj);
application of Cf. techie
science
36 Telecommuter the one working for a telecommute (v);
(n) company from home, telecommuting (n): allow
making use of the for/promote ~
Internet, email, and
the telephone
37 Troubleshooter the one analyzing helpdesk ~;
(n) and solving serious troubleshooting (v): have a
problems for a proven track record in ~;
company or other preventive maintenance and ~
11
organization, or
tracing and
correcting faults in
an electronic system
38 User (n) a person who applies end/power/default ~;
or operates sth, a ~
client, customer, manual/account/base/ID/profile
consumer /policy; useful (adj), usable
(adj), usability (n), user-
friendly (adj): ~-
interface/device/gadget; user-
friendliness (n)
39 Vendor (n) a person or company a street ~;
that provides a vend (v), vending (adj): ~
service or a product machine,
and offers it for sale, vendible (adj);
especially in the syn. seller
street
40 Wizard (n) a person who is very a computer/financial ~;
skilled in a particular syn. genius, master, expert
field or activity
ACTIVITIES
1. geek
2. administrator
3. layman
4. end-user
5. client
6. wizard
12
7. provider
1. backend
2. encrypt
3. layman
4. newbie
5. master
6. vendor
7. client
Activity 3. Word family. Fill in the missing words of the same root where possible:
Activity 4. Complete the tables with words that form strong partnerships with the
target vocabulary units:
administrator
user
13
programmer
manager
Activity 7. State the type of logical relations between the following words:
Activity 8. Decode John Pfeiffer’s saying about computers and people and
comment on it:
http://puzzlemaker.discoveryeducation.com/cryptogramSetupForm.asp
Activity 9. Explain the difference between the following concepts using the Venn
diagram below:
15
Activity 10. Divide the above listed IT professions into 2 groups of “white-collar”
and “blue-collar” jobs.
Activity 12. Name 5 back-end jobs directly related to programming. Give their brief
description.
Activity 13. Name 5 front-end office jobs directly related to programming. Give
their brief description.
Activity 14. Identify 5 computer problems and say who you would ask for help (e.g.
if you need a non-existent application, if your computer is out of order, if you want
to buy a computer, etc.)
Activity 15. Describe your personal experience of working as a…or the computer-
related job, which you would like to do.
TEST
16
a) general and specific b) cause and effect c) contrast d) part and whole
2 What is the logical relationship between the concepts “geek – alpha geek”:
a) general and specific b) cause and effect c) contrast d) part and whole
3 What is the logical relationship between the concepts “subscriber -
follower”: a) equivalence b) cause and effect c) contrast d) part and whole
4 Mark the odd word: a) fix b) mend c) repair d) restore
5 Which of these is a person who governs or mediates an Internet forum or
online discussion: a) gamester b) botmaster c) moderator d) administrator
6 Which of these maintains an autonomous program on a network:
a) gamester b) botmaster c) moderator d) administrator
7 Which of these is a computer-savvy person:
a) layman b) lamer c) wizard d) newbie
8 Which of these has the most theoretical field of expertise:
a) expert b) specialist c) analyst d) scientist
9 You can subscribe ___ the listserv for £3 per annum and receive advance
notice of all events. a) for b) in c) to d) on
10 He is an expert __ project development. a) for b) in c) at d) on
11 Some people just lurk ___ listservs without participating.
a) for b) in c) at d) on
12 A developer is the one who
a) creates a computer program and brings it into existence
b) is responsible for creating solutions that have a high visual impact
c) who writes codes to create software programs
d) designs, builds, or maintains engines, machines, or structures
13 A programmer is the one who
a) creates a computer program and brings it into existence
b) is responsible for creating solutions that have a high visual impact
c) who writes codes to create software programs
d) designs, builds, or maintains engines, machines, or structures
14 Mark the odd word: a) provider b) customer c) client d) consumer
15 A person who uses goods and services is called a(n)___ .
a) consumer b) customer c) client d) vendor
16 A person or company that offers a service or a product for sale, especially in
the street is called a(n)___. a) consumer b) customer c) client d) vendor
17 A repairer is a person
a) employed to look after technical equipment, an expert in the practical
application of a science
b) responsible for the secure and efficient work of computer hardware
systems
c) who restores sth damaged or faulty to a normal working condition
d) tracing and correcting faults in an electronic system or analyzing and
solving serious problems for a company or other organization
18 An operator is a person ___ .
a) employed to look after technical equipment, an expert in the practical
17
application of a science
b) responsible for the secure and efficient work of computer hardware
systems
c) who restores sth damaged or faulty to a normal working condition
d) tracing and correcting faults in an electronic system or analyzing and
solving serious problems for a company or other organization
19 The difference between a nerd and a geek concerns mostly ___ .
a) stylistic coloring b) field of operation c) gender d) attitude to occupation
20 “Процесс поиска неисправностей, диагностики и устранения
неполадок” is best translated as: a) repairing b) mending c) troubleshooting
d) fixing
18
Module 2. TEXTING
ACTIVITIES
1. justify
2. alternative
3. cursive
4. conspicuous
5. delete
6. folder
7. paste
1. bold
2. select
3. movable
4. italicize
5. movable
6. correct
7. upper case
Activity 3. Word family. Fill in the missing words of the same root where possible:
Activity 4. Make up phrases by matching the words in the left column with those in
the right:
1. correct A. left/right/center
2. enter B. database/a list/a report/a book/a program/a profile/a CV/a
portfolio
3. align C. a(n) mistake/error/fault
4. paste D. transactions/data/information into the computer
5. compile E. a word/paragraph/symbol into a document/file/section
6. pending F. a word/text/passage/file/option
7. select G. (a/n) report/file/action/proceedings/patent
Activity 7. State the type of logical relations between the following concepts:
25
Concepts Type of logical relations
1. write – scribble A. general and specific
2. template – model B. cause and effect
3. error – typo C. contrast
4. page – margin D. method and purpose
5. copy – original E. part and whole
6. folder – file
F. equivalence
7. bold type - emphasis
Activity 8. Decode Sherry Turkle’s saying about texting and comment on it:
http://puzzlemaker.discoveryeducation.com/cryptogramSetupForm.asp
Activity 9. Explain the difference between the following concepts using the Venn
diagram below:
proofread – edit
entry – entrance
type - typeface – font
strike – stroke
file-folder
layout – format – template
italic-italics
26
Activity 10. Explain the meaning and use of the prefixes “de-“, “im”, “un-“, “in-“,
“re-“ and give not less than 3 examples of each.
1. template
2. font
3. clipboard
4. folder
5. bullet
6. underscore
7. image
Activity 12. Name 3-5 things/operations you can do for the given purpose; say how
you can do them:
1. To emphasize a word in a text
2. To eliminate mistakes in a text
3. To digitize a text
4. To make your text look better
Activity 13. Name the texting operations most problematic for you/rarely use by
you. Explain why. Think of some new texting operations that may be introduced
and explain why we need them.
Activity 14. Semantic mapping: draw a flow chart reflecting the process of texting.
27
Activity 15. Write an essay on how word-processing has changed our life.
TEST
29
Module 3. DEVICES AND GADGETS
№ Term Definition Usage
1 Assist (v) help sb typically by ~ sb at/in/with sth; assistant
doing a share of the (n), assistance (n); assistive
work, providing money (adj): ~ technology;
or information syn. help, aid, give sb a hand
ant. hinder sth, prevent sb
from doing sth
2 Barcode (n) a set of printed lines on a the ~ reader/system/generator/
product’s label that tells a program/ verifier;
computer information read/type/identify/print/
about it, such as its price encode/scale the ~;
barcode (v): ~ (a/n)
product/item/goods
3 Braille (n) a system of printing and (the) ~
writing for the blind, in equipment/display/embosser/
which characters are system/writer/label/font/alpha
formed by patterns of bet/converter;
raised dots which are felt use/read/touch/create/
with the fingertips learn ~; written/labeled in ~;
brailled (v)
4 BYOD (abbr) the practice of allowing implement/introduce/follow ~;
Bring Your employees or students to the ~ policy/practice
Own Device bring their own
computing devices to
work, college, university
etc. for work/study
purposes
5 Camera (n) a device for recording ~
visual images in the form compartment/user/lens/rig/fil
of photographs, films, or m/ shot/track; a(n)
video signals optical/compact/ the CCTV ~;
(re)furbish/upgrade/recharge a
~; cameraman (n)
6 Charge (v) store electrical energy (in ~ a battery/gadget/device;
a battery or battery- keep the battery ~d; ~ sb with
operated device); sth; be in ~ of sth; impose/levy
formally accuse sb of sth, a ~ on sb; lay/bring a ~ against
especially of an offence sb; pay/increase/reduce the
under law; entrust sb ~s; free of ~; re/chargeable
with a duty or (adj): ~ battery; charger (n);
responsibility; demand syn. control, accusation, fee
(an amount) as a price for
a service rendered or
30
goods supplied
7 Connect (v) join together so as to ~ to a
provide access and device/wire/network/router/
communication printer/computer/gadget;
connection (n):
have/break/sever/establish/fin
d/make/see a ~;
(dis)connected, (adj);
(dis)connectedly (adv);
connective (adj); connectivity
(n)
syn. link
ant. disconnect, disconnection
8 Device (n) a mechanism or a piece ~ contention/driver/node; a(n)
of equipment designed to input/output/MIDI/warning/
serve a purpose or reading/locking/surveillance/
perform a function household/recording ~;
purchase/(dis)connect/upgrade
a ~;
syn. gizmo, gadget
9 Digital (adj) stored as numbers or ~ age/audio/camera/certificate/
electronic signals (about computer/divide/film/signatur
information) e/
detox; digit (n), digitize (v),
digitalize (v), digitizer (n),
digitally (adv);
syn. numeric
ant. analogue
10 Display (n) putting sth in a prominent plasma/panel/processor/case/s
place for it to be readily creen/unit/terminal ~;
seen; the visual a(n) eye-catching/clear/wide
representation of the ~; put on/go on ~;
output of an electronic displayer (n), display (v);
device syn. show
ant. conceal, hide
11 E- (prf) electronic, indicating the ~
involvement of the book/zine/pub/commerce/libra
Internet ry;
purchase/subscribe to a(n) ~
book/zine/publication
12 Fax (facsimile an output device capable send/get/receive sth by ~ ;
machine) (n) of fast and convenient ~ modem/software/card/mode/
transmission of call;
photocopied information fax (v): ~ a(n)
31
through a telephone line document/file/agreement
/memo
13 Flash memory a type of non-volatile a ~ card;
(n) memory which does not compact ~;
need a constant source of read/(re)format the ~
electricity for it to retain
the stored data
14 Gadget (n) a specialized mechanical use/invent/create/buy a ~; a ~
or electronic device, freak
usually small in size a(n) musical/electrical/modern
~; suffer from a ~ fatigue;
syn. gizmo, device
15 Gamepad (n) a handheld device used to a ~ button/cord; a USB ~;
control a computer game (dis)connect/play/operate/keep
or a video game a~
16 Google Glass a computer that is worn a ~ application/frame/pad/rim/
(n) like eyeglasses, which earpiece/lens/nose pad/end
has a tiny display within piece;
the field of vision, protect/upgrade/polish/wear a
responds to voice ~
commands and eye
movements, and has a
touchpad at the side
17 Input (n) information that is put ~ devices/data;
into a computer have/need/get/receive/provide/
process an ~; input (v);
ant. output
18 Headset (n) a device that holds an a high performance/cordless/
earphone and a wireless/radio/Bluetooth ~;
microphone in place on a wear/upgrade/replace/take
person's head off/put on the ~
19 Lens (n) a clear curved piece of magnetic/telescopic/cap/
glass or plastic that is colored/tinted/contact/optical/s
used in eyeglasses, pectacle/ camera ~;
cameras, telescopes, etc., reduce/change/wear/replace/ta
to make things look ke off the ~;lensed (adj);
clearer, smaller, or bigger Cf. glass
20 Monitor (n) a person who observes a color/CCTV/video/computer/s
process or activity to creen/high resolution ~; on
check that it is carried out a/the ~;
fairly or correctly, protect/replace the ~;
especially in an official monitor (v): ~ the
capacity; an output performance/progress//proced
device that displays text ure/ quality/situation;
32
and graphics monitored (adj); monitoring
(n), monitorial (adj);
syn. screen, control
21 MP3 (n) a means of compressing a ~ file/player/format/ringtone/
sound sequence to enable music; convert/download/trans
its digital storage and fer an ~ file
transmission
22 Netbook (n) a small, very light and ~ computer; high/low-end ~;
inexpensive laptop upgrade/replace/repair a ~
computer with limited
memory used primarily
for accessing the Internet
23 Output (n) the amount of sth an ~ data/file/form/screen/devi
produced by a person, ce; increase/decrease/provide
machine, or industry; some ~; a drop/fall/growth/rise
produced, delivered, or in ~;
supplied data steady/low/aggregate/gross/
overall/total ~; output (v);
ant. input
24 Optical (adj) relating to sight, ~ media/disk/zoom/scanner/st
especially in relation to orage/fiber/memory/cable/
the action of light drive/array/ lens; optics (n),
optically (adv), optician (n)
25 Pixel (n) one of the individual dots a ~
that make up a graphical bit/graphic/count/information/
image data/resolution/value; binary
~;
pack/modify ~s; pixilation (n),
pixilate (v), pixelated (adj): a
~ image
26 Plotter (n) an automated drawing a ~ font/display; a
tool that produces finely drum/flatbed/
scaled drawings by pen/chart/laser/electrostatic/
moving a pen and/or flat bed/color ~;
paper in response to upgrade/use/configure a ~
computer commands
27 Projector (n) a device used for overhead/film/slide/video ~;
displaying an image on a switch off (on)/operate a ~
screen, as from a
transparent slide or film
28 PTOYED (slang) an airline, cinema implement/break/follow the ~
(abbr) or theater announcement rule
Please Turn to make the passengers or
Off Your viewers turn off their
33
Electronic electronic devices and
Devices gadgets
29 Resolution (n) a firm decision to do or pass/vote on/adopt a ~;
not to do sth; a formal high/screen/spatial/color ~;
decision; the action modify/adjust/configure ~; a
of solving a successful/peaceful ~ of a
problem; density of problem; resolve (v): ~ a
pixels, measured by the problem; (un)resolved) (adj);
number of dots per inch (ir)resolute (adj): be ~ in one’s
determination to do sth;
(ir)resolutely (adv)
30 Retina display a device that works a ~ screen;
(n) without a screen by provide/include/adjust the ~
drawing pixels directly
on the user’s retina with a
focused beam of light
31 Sensor (n) a device that enables ~ data fusion/unit/device;
digital machines to infrared/analog/image/
monitor the physical electromagnetic ~; sense (v);
quantity of the analog sensory (adj); sensorily (adv);
world, such as syn. detector
temperature, humidity, or
pressure, to provide data
used in robotics,
environmental climate
control, and other
applications
32 Second-hand having had a previous a ~ device/gadget/accessory/b
(adj) owner; not new ook/clothing/goods/car/
computer/ knowledge;
syn. pre-owned
33 Smart (adj) having or showing quick ~ watch/phone/board/house/
wit and intelligence; (of a TV/ application/interface;
device) programmed so smartness (n), smartly (adv);
as to be capable of some syn. clever, intelligent
independent action ant. dumb, stupid, imbecile
34 Speakers (n) the part of a radio, CD high-quality/durable ~;
player, etc. which the upgrade/
sound comes out of (dis)connect/configure the ~
35 Swap (v) (coll.) give sth to sb in ~ gadgets/accessories/
exchange for sth else identity/deal/ideas;
syn. trade, exchange
36 Tablet (n) a small, flat computer ~ case/accessories/computer/P
that is controlled by C/ pen/phone;
34
touching the screen or by digitizer/graphic ~;
using a special pen upgrade/configure/furbish a ~;
Cf: I-pod, I-pad
37 Touch (v) come into or be in ~ pad/screen; multi ~; touch
physical contact with; (n): a ~ on/of sb’s
manipulate sth by hand/shoulder; manipulate sth
pressure and movement at the ~of the key;
of fingers on a screen (un)touchable (adj), touchy
(adj);
syn. stroke
38 Upgrade (v) improve a computer or ~ (a)
another machine by using computer/gadget/skills/policy/
the most recent system/package/standard/secur
developments so as to ity/ phone; upgrade (n):
make it more powerful or software/
effective price/network ~;
syn. improve
ant. downgrade
Cf. update, refurbish
39 Wearable a computer or other (a) ~ computer/device/clothes/
(adj) electronic device that is shades/gadget; wear (v),
small or light enough to (un)wearability (n);
be worn or carried on ant. unwearable
one’s body Cf. portable
40 Webcam (n) a device used for video a ~ leans/image/software; a
input wireless ~;
install/upgrade/replace a ~;
webcamming (n)
ACTIVITIES
1. conceal
2. wearable
3. input
4. clever
5. downgrade
6. assist
7. upgrade
Activity 3. Word family. Fill in the missing words of the same root where possible:
Activity 4. Complete the tables with words that form strong partnerships with the
target vocabulary units:
digital
36
Target vocabulary unit Noun
tablet
speakers
Activity 7. State the type of logical relations between the following concepts:
37
Concepts Type of logical relations
1. input – output A. general and specific
2. MP3 – compression B. cause and effect
3. label - barcode C. contrast
4. gadget overuse – gadget fatigue D. equivalence
5. smart - intelligent E. part and whole
6. computer – netbook F. method and purpose
7. alphabet – the Braille system
Activity 8. Decode Steve Jobs’ saying about computer device and comment on it:
http://puzzlemaker.discoveryeducation.com/code/BuildCryptogram.asp
Activity 9. Explain the difference between the following concepts using the Venn
diagram below:
38
Activity 10. Say what the following is used for. Give examples:
1. barcode
2. Braille
3. facsimile
machine
4. flash memory
5. headset
6. MP3
7. Webcam
1. digitization
2. faxing
3. flash memory
4. charging
5. swapping
6. optimization
7. upgrading
1. archived
2. backed up
3. compressed
39
4. formatted
5. recovered
6. retrieved
7. upgraded
Activity 13. Write a short report about the latest gadget, device or appliance.
Activity 15. Discuss: Today young people are very eager to get the latest models of
different gadgets. What do you think their reasons are? What are the
dis/advantages of getting ahead with the most up-to-date technology?
TEST
What is the logical relationship between the concepts “gadget –
1 smartphone”: a) cause and effect b) general and specific c) method and
purpose d) part and whole
One of the individual dots that make up a graphical image is known as (a)
2
___. a) resolution b) retina display c) brightness d) pixel
A device used for displaying an image on a screen, as from a transparent
3 slide or film is known as a ___. a) hologram b) projector c) webcam d)
monitor
All of these mean “a mechanism or a piece of equipment designed to
4 perform a number of functions” EXCEPT FOR: a) charger b) gizmo c)
device d) gadget
All of these are output devices EXCEPT FOR:
5
a) speaker b) headset c) microphone d) Braille embosser
All of these gadgets have rear cameras EXCEPT FOR:
6
a) MP3, b) smartphone c) I-pad d) tablet
All of these collocate with the adjective “digital” EXCEPT FOR:
7
a) divide b) time c) age d) certificate
All of these collocate with the adjective “optical” EXCEPT FOR:
8
a) cable b) media c) disk d) pixel
What is the logical relationship between the concepts “show – conceal”:
9 a) cause and effect b) general and specific c) contrast d) method and
purpose
What is the logical relationship between the concepts “webcam – input”:
10 a) cause and effect b) general and specific c) contrast d) method and
purpose
Cartographic data consist of ___ maps, that is, maps converted to
11 numerical form.
a) digital b) digit c) digitized d) digitally
40
Once again, many thanks for your ____ in this matter.
12
a) assistant b) assistance c) assistive d) assist
All of these are wearable devices EXCEPT FOR: a) camera b) Google
13
glasses c) digital helmet d) Braille embosser
A person who is obsessed with his electronic gadgets is called a gadget
14 ____.
a) freak b) monitor c) gizmo d) fatigue
The part of a radio, CD player, etc. which the sound comes out of is
15
known as a ___. a) speaker b) headset c) lens d) video card
Hackers can manipulate bank accounts ___ a keystroke.
16
a) with b) at c) in d) by
The bank imposed a penalty ___ the manager for data diddling.
17
a) on b) for c) to d) with
18 Mark the odd word: a) upgrade b) improve c) optimize d) promote
To get regular updates one has to subscribe ___ this publication.
19
a) to b) for c) – d) in
My visually impaired junior assistant helped the group get started on the
20
____ alphabet. a) Braille b) Brailled c) Brailling d) Brailles
41
Module 4. HARDWARE
ACTIVITIES
1. break
down
2. remove
3. decoder
4. repair
5. convert
6. defect
7. battery
1. configure
2. damage
3. periphery
48
4. master
5. encode
6. uptime
7. shrink
Activity 3. Word family. Fill in the missing words of the same root where possible:
Activity 4. Complete the tables with words that form strong partnerships with the
target vocabulary units:
a joystick
a laser
operate a
Activity 7. State the type of logical relations between the following concepts:
Activity 8. Decode Ken Olsen’s saying about the hardware system and comment on
it:
50
http://puzzlemaker.discoveryeducation.com/cryptogramSetupForm.asp
Activity 9. Explain the difference between the following concepts using the Venn
diagram below:
1. CPU – motherboard
2. card – flash drive
3. Bluetooth – WiFi
4. convert – configure
5. fault – crash
6. gamepad – joystick
7. modem – router
51
Activity 10. Say what can be… and how:
1. converted
2. expanded
3. processed
4. repaired
5. scanned
6. repeated
7. maintained
1. card
2. chip
3. Bluetooth
4. CPU
5. joystick
6. modem
7. port
1. breakdown
2. conversion
3. downtime
4. cycle
5. maintenance
6. operation
7. configuration
Activity 13. Speak on the latest trends in the hardware system development.
Activity 14. Brainstorm the current issues of e-waste nowadays. What makes it
hazardous? What are the possible solutions?
TEST
53
Module 5. SOFTWARE
ACTIVITIES
1. boot
2. catalogue
3. design
4. embed
5. emulate
6. function
7. icon
8. implement
63
Activity 2. Give antonyms:
1. add
2. context
3. install
4. kernel
5. launch
6. recover
7. release
8. system
Activity 3. Word family. Fill in the missing words of the same root where possible:
Activity 4. Complete the tables with words that form strong partnerships with the
target vocabulary units:
cluster
desktop
64
Adjective Target vocabulary unit
interface
software
utility
specification
version
Activity 7. State the type of logical relations between the following concepts:
Activity 8. Decode Bill Gates’ saying about software and comment on it:
66
http://puzzlemaker.discoveryeducation.com/code/BuildCryptogram.asp
Activity 9. Explain the difference between the following concepts using the Venn
diagram below:
Activity 10. Give examples of the following software types. Add other types of -ware
that you know:
1. shareware
67
2. software
3. freeware
4. adware
5. groupware
6. spyware
7. malware
Activity 12. Name some reasons why software should be updated. Illustrate these
reasons with examples from your own experience.
Activity 13. Arrange the software layers below in a descending order from top to
bottom; comment on the functionality of each software layer:
Operating system
Application software
BIOS
Drivers
Kernel
Utility
Activity 14. Say what types of application software given below you have installed
in your computer or smart phone:
1. documentation software
2. graphics software
3. presentation software
4. file management software
5. education and training software
6. entertainment software
7. accounting and finance software
TEST
69
Module 6. CYBERSPACE
70
syn. barrier, obstacle,
impediment, hindrance;
hinder, ban
ant. permit, give access, allow
5 Blog (n) a site maintained by create/maintain/add content to/
web + log an individual or a contribute to a ~, a ~
business with regular client/host/-hosting;
entries of commentary, corporate/company/ news/
descriptions of events, business ~; blogger (n):
or other material such popular/notorious ~;
as graphics or video (micro)blogging (n): the art of
~;
syn. online journal
Cf. splog (n)=(spam+blog)
6 Bookmark (n) a strip of leather, card, create/delete/share/follow a ~, a
etc., used to mark one's ~ list; bookmarker (n);
place in a book; a bookmarking (n):
record of the address clever/frequent/individual ~;
of a file, Internet page, syn. clip, holder, marker
or other data enabling
quick access by a user
7 Browse (v) survey goods for sale ~ around the store/through the
in a leisurely and newspaper; ~ the web/web
casual way; read or pages; browse (adj): a ~
survey (data files) via list/mode; browser (n):
a network web/popular/heavy ~, ~
interface; browsing (n):
web/easy/computer ~;
browsable (adj);
syn. surf
8 Cast (v) throw something ~ a(n) smile/net/anchor; ~
forcefully; cause (light back/aside/down/away; ~
or shadow) to appear doubts/lots; casting (n): life ~;
on a surface; arrange cast (n):
and present in a web/broad/pod/multi/vod ~;
specified form or style syn. emit, put on air
9 Clickbait (n) enticing readers to ~ headlines/titles/news;
click through to the clickbaiting (n): engage in ~
full story with a
misleading or
sensationalist headline,
usually with the goal
of generating page
views and advertising
71
revenue
10 CTR (abbr) a common method of increase/decrease/raise/lower/b
Clickthrough rate reporting on the oost the ~; high/low ~
number of people who
have viewed a
message or a piece of
content and clicked on
an ad or a link
11 Cookie (n) a sweet biscuit; a small ~ data/file/information/sheet/
identifier file placed verification; ~-enabled browser;
on a user’s computer delete/steal/spy/create
by a Web site, which (automatically)/enable/disable/
logs information about allow/switch on (off) ~s
the user and their
previous/current visits
12 Content(s) (n) sng.: a state of low fat ~; online ~ providers;
satisfaction; pl.: the be ~ with sth; ~ oneself with
material dealt with in a sth; time of ~; contentless (adj);
speech, literary work, contented (adj): feel ~;~ -based
etc. as distinct from its coding/information retrieval; ~
form or style; -driven document; ~
information made analysis/decoder
available by a website /management/filtering/provider
or another electronic ; ~s of a book; table of ~ s; the
medium ~s page/list/directory/
dictionary; ~s of a file/data
stream/message; block/
provide/create/show/restrict the
~s
ant. form
13 Community (n) a group of people the international/European/virtu
living together in one al/research/information/online/u
place, especially one ser/AI ~; ~
practicing common service/center/college/facilities
ownership; a web /health service/worker;
society uniting people syn. society, group
with the same
interests, social values
and or other particular
characteristics
14 Creep (v) move slowly and ~ up to sth/forward/back/
carefully in order to \slowly; creeping (adj); creeper
avoid being heard or (n): anonymous/irritating/fanati
noticed; spend an c/addicted ~
72
extended period of syn. lurk
time looking through Cf. follow
someone’s profiles,
photos, and videos on
social media
15 Crowdfunding the act of soliciting vast/urgent/quick/skillful ~ ;
(n) donations or try/succeed in/raise money
investments from through/ resort to ~
online users who
collectively raise
money to support a
cause or underwrite a
project
16 Cyber (adj) relating to or ~ age/space/warfare/
characteristic of the crime/life/criminal/offence/theft
culture of computers, / cash/culture/mail/café/sport/
information terrorism/citizen/phobia/
technology, and virtual security/slacker/speak/squatting
reality /stalking;
cybernated (adj): ~ humanity;
cybernation (n): of the world;
cybernaut (n); cybernetic (adj):
~ approach/control/machine/mo
del/ system; cybernetics (n);
cyborg (n);
syn. virtual
17 E- (prf) indicating the use of ~-mail/book/journal/commerce/
electronic data transfer banking/learning/cash/zine/
in cyberspace, crime/literacy/business/culture/
especially through the government/library/payment/pu
Internet blishing/voting
18 Emoticon (n) a representation of a a(n) strange/(in)appropriate/
Emotion + icon facial expression such (ir)relevant/funny/angry/vertica
as a smile or a frown, l/ horizontal/sticker ~;
formed by various send/attach/add/choose an ~;
combinations of syn. smiley
keyboard characters
and used in electronic
communications to
convey the writer's
feelings or intended
tone
19 FAQ (acr) a text file containing a publish/consult/ignore/look
Frequently asked list of questions and through/find the answer in ~;
73
questions answers relating to a Cf. FAQL (frequently asked
particular subject, esp. question list)
the one giving basic
information for users
of an Internet
newsgroup
20 Feed (v) frequently updated latest/abusing/parallel ~;
content subscription to web/news/events/line/power ~;
which allows to read (un)subscribe to a ~
the latest posts or
watch the newest
videos on a computer
or any portable device
21 Forum (n) a meeting or medium a(n) discussion/international ~;
where ideas and views join/provide a ~ for sb/sth; post
on a particular issue sth on a ~; World
can be exchanged; an Telecommunication ~;
online discussion site Independent Software
Developers ~; pl. fora
syn. conference, newsgroup
22 Geotagging (n) the process of adding automatic/precise/user’s ~; use/
location-based resort to/refer to/be guided by ~
metadata to media
such as photos, video
or online maps
23 Link (n) a relationship between perma/hyper/data/cable/fiber-
two things or optic/implicit
situations; a reference /logical/transmission/
in an electronic transport ~; follow/click
document that lets a on/build/ manage/control a ~; a
user display or activate ~ access/address/control/error/fi
another document or le; linked (adj): a ~
program; list/document/ communication;
a reference to data that link-up (n): a live satellite ~;
the reader can directly linkable (adj):a ~ cycle;
follow by clicking linkability (n): ~ of
devices/equipment; linkage (n):
external/internal ~;
syn. tie, connection,
(cross-) reference,
Cf. liason
24 Log (v) enter (an incident or ~ in to/out of a server; log (n): a
fact) in the log of a ~ command/entry/file/journal/
ship or aircraft or in message/server; logger (n):
74
another systematic site/internet ~; logged (adj): ~
record; go through the data/drive; logger (n): data/
procedures to begin (or multichannel/system ~, ~
conclude) using a machine; logging (n):
computer system error/executive/failure/ machine
time ~, ~ printer/unit;
login (n): user
/remote/automatic ~; ~
name/password/directory/
procedure/prompt/command
file; disable a ~;
syn. log on/off
25 Mail (n) letters and parcels sent e-/postal/snail/incoming/daily/d
by post; electronic irect ~; ~
mail box/edition/filter/program/
system/server/list/bot/man;
send/order by ~;
check/receive/redirect/delete/so
rt out the ~; mailable (adj);
mailing (adj): ~ list/list
manager/processor/program;
syn. listserver (listserv)
26 Meme (n) an element of a culture interesting/video/colorful/funny
or system of behavior /absurd ~; spread/track/send/
that may be passed post a ~; memetic (adj): ~
from one individual to algorithm/code/spread
another by imitation;
an image with a text,
video or link
describing a thought,
idea, joke, or concept
to be shared online
27 Media (n) media (pl.): the main (pl.) civic/social/mass/local/
means of mass broadcasting/multi/interactive/
communication network/communication ~, ~
(television, radio, and art/event/
newspapers) regarded library/studies/processor/-
collectively; specific;
medium (sng.): a ~ access/control/adapter/compu
means by which sth is ter/ frequency; ~-capacity/-run/-
communicated or sized; (sing.) information-
expressed; a particular carrying/input/output/
storage container for interactive/magnetic/recording/
computer files, such as storage/transfer (non)volatile ~;
75
magnetic tape or a disc the ~ of instruction
syn. means
28 Monitor (v) observe and check the ~ activity/function/signal;
progress or quality of monitor (n): black and
sth over a period of white/color/CRT/ refreshed/
time; observe some enhanced RGB/system/ flat-
activities and measure screen/LCD/LED/thin-
them against film/VGA/TV ~; ~
benchmark policies amplifier/display/
and rules mode/signal/switch; monitored
(adj); monitoring (n): call/low-
battery/performance/security
threat/heat/pulse/remote access
~, ~ of production/
performance/tool breakage; ~
equipment/technology/
window;
syn. control, check, audit
29 Navigate (v) guide (a vessel or a vessel/around the Web/a car
vehicle) over a through the traffic; be ~ed by
specified route, the stars; ~ skillfully; ~;
especially with navigable (adj): ~
difficulty, by using path/waterway; navigating
instruments or maps; (adj): ~ officer; navigation (n):
move around a electronic ~, ~ aids/air
website, the Internet, radar/area/button/canal/
etc. computer/control/electronics/
facilities/instrument/kit/support/
satellite; navigational (adj):
database/guidance/parameter/
query; navigator (n):
television/driver’s/GSM ~
30 Password (n) a secret word or a generate/change/supply/enter a
phrase that must be ~; multi (single)-user/one-time
used to gain admission ~, ~
to a place; a string of ageing/authentication/changing/
characters that allows identification/logout/security/
sb access to a verification; ~-protected;
computer system Cf. identification, login
31 Post (v) send by post; display ~ a message/status; ~ on the
(a notice) in a public wall/Internet/site; ~ in sb’s
place; make blog; post (n): place a ~, a ~
(information) available bag/boy/card/
on the Internet; send (a box/exchange/office; postal
76
message) to an Internet (adj): ~
bulletin board or address/code/service/transactio
newsgroup n; send/receive by ~;
provocative/clever/funny ~;
syn. mail, correspondence,
public message
Cf. poste restante
32 Site (n) an area of ground on do sth on ~; ~ visits; a landfill
which a town, ~; appear/post on the ~;
building, or monument close/block/ban/develop/design/
is constructed; (short control/address/administer/com
for website) an Internet promise a ~; ~
location that admin/control/database/
maintains one or more development/license/name/
web pages safety/server/testing; a
spyware ~;
syn. place, location, spot
33 Spam (n) irrelevant or send/receive/delete/block/report
inappropriate / avoid ~; ~
messages sent on the filter/bot/buster/victim;
Internet to a large spammer (n):
number of newsgroups annoying/irritating/ advertising
or users for advertising ~; spamming (n): ~ of
purposes mailboxes/accounts; spamster
(n);
syn. junk mail
34 Status (n) relative social or ~ of the person/bill, ~ bar/error/
professional position; control/monitoring/indicator/me
the current condition a ssage/report; update/post/
device or a user is in delete/change/announce/
maintain/preserve/restore the ~;
availability/(in)active/current ~;
statutory (adj): ~
order/instrument;
syn. state, position
Cf. status quo
35 Stream (n) a long, narrow strip of TV/radio/video/information/
material used as a communication/file/input/outpu
decoration or symbol; t/ manager/mode/flow ~; ~ of
a continuous flow of data; instruction/media ~;
data or instructions, stream (v); streamed (adj): ~
typically one having a content/students; streamer (n): a
constant or predictable plastic/party/multi-coloured ~ ;
rate decorate/adorn with ~s; digital
77
recording ~; streaming (adj):
TV/video ~, audio ~;
syn. poster, slogan, flood
36 Trace (v) follow or mark the ~ a(n)
course or position of signal/person/activity/actions; ~
sth; find or discover sth back; trace (n):
sth by investigation electrical/path/program/return/
reverse/signal ~; ~ analysis/
filter/interval/leakage/method/
scheduling; traceable (adj):
barely ~; traceability (n); traced
(adj): ~ profile; traceless (adj):
~ matrix/operator; tracer (n): ~
activity;
syn. track
37 Thread (n) a long, thin strand of execution/discussion/main/singl
fibers used in sewing e ~, ~ group/ID/
or weaving; a topic or package/time/detector(ion)/
subtopic within an failure/formation; start/close/
electronic discussion continue/limit a ~;
group or forum; a thread (v): ~ a needle;
programming structure threaded (adj): ~ file;
or process linking a threading (n): multi ~, ~
number of separate facility/tool
elements concurrently
executed in
multithreading
38 Virtual (adj) not physically existing ~ world/reality/function/address
as such but made by / business/call/network/channel/
software to appear to community/computer/\
do so; an online connection/database/device/dire
computer-simulated ctory/disk/library/meeting/mem
space ory/server/storage;
virtualization (n): ~ engine/
implementation/management/
platform/software/technique/
technology; virtualize (v);
virtually (adv): ~ impossible;
virtuality (n);
syn. cyber
ant. real, actual
39 Web (n) a widely used ~ conferencing/casting/publishi
World Wide Web information system on ng/ browsing/programming; ~
the Internet enabling page/address/application/
78
the user to search for browser/designer/document/hos
information by moving t/
from one document to interface/infrastructure/server/s
another pace/cast; ~-based
administration/ email/solution;
syn. the Internet, global
network
Cf. webinar, web-master,
webcam, webisode, webzine
40 Wiki (n) (from the Hawaiian ~pedia/books; media ~; ~leaks
“wiki wiki” which Cf. encyclopedia
means “super fast”) a
website or database
developed
collaboratively by a
community of users,
allowing any user to
add and edit content
1. Oxford Dictionary of English, 3rd Edition. - Oxford University Press Inc., 2010
2. Англо-русский словарь по вычислительной технике и программированию. -
8-е изд., исп. и доп. – ABBYY. - Масловский Е.К., 2008.
3. Англо-русский толковый словарь по вычислительной технике, Интернету и
программированию - 8-е изд., исп. и доп. – Э. М. Пройдаков, Л. А. Теплицкий,
2011.
4. Англо-русский словарь по телекоммуникациям. - «РУССО». - Александров
А.В., 2004.
ACTIVITIES
1. block
2. community
3. emoticon
4. forum
5. link
6. monitor
7. WWW
1. virtual
79
2. block
3. log in
4. snail mail
5. implicit
6. external
7. anonymous
Activity 3. Word family. Fill in the missing words of the same root where possible:
Activity 4. Complete the tables with words that form strong partnerships with the
target vocabulary units:
cyber
a blog
80
Adjective/Noun Target vocabulary unit
feed
cookies
e-
password
Activity 7. State the type of logical relations between the following concepts:
82
Activity 8. Decode Noam Chomsky’s saying about the Internet and comment on it:
http://puzzlemaker.discoveryeducation.com/code/BuildCryptogram.asp
Activity 9. Explain the difference between the following concepts using the Venn
diagram below:
emoticon – meme
blog – site
Wikipedia - encyclopedia
log- blog
www – the Internet – cyberspace
avatar – icon
83
Activity 10. Say what the following is used for:
1. bookmark
2. FAQ
3. e-mail
4. password
5. status
6. thread
7. account
Activity 13. Say which accounts you have got on the Internet. What is the purpose
of each account? How often do you use it?
84
Activity 14. Add to Wikipedia a page describing national clothes, a national
musical instrument or the national cuisine (min. 500 words). Report on your
contribution, demonstrate the results.
Activity 15. Do a mini research and prepare a short report about famous
blogs/bloggers.
TEST
86
Module 7. CYBER CRIME
87
8 Crime (n) illegal activity commit/prevent/report/fight (a)
punishable by law ~; punish sb for a ~; ~
rate/incidence; a victim of ~;
petty/serious/violent/ organized
~; criminal (adj), criminally
(adv), criminality (n),
incriminate (v),
incrimination (n);
syn. felony, wrongdoing
9 Cyberbullying (n) repeatedly harming or be subject to~; fall/become a
harassing other people victim of ~;
online in a deliberate syn. cyberstalking, trolling
manner
10 Cybercide (n) the deletion of an be prone to/commit ~; an act
individual's entire of ~;
online presences (the Cf. suicide, genocide, ecocide
removal of all social
media profiles, shared
photos, blog posts,
directory entries and
so on)
11 Cyberslacking (n) using company indulge in/engage in/combat ~;
computer for personal cyberslacker (n);
purposes during syn. cyberloafer, cyberloafing
working hours
(playing games,
shopping online or
using social
networking sites)
12 Cybersquatting purchasing a domain engage in/be (get) involved in
(n) name that contains a /combat/eliminate ~
well-known trademark
or commercial name to
sell it to the rightful
owner for profit
13 Data diddling (n) modifying data for fun engage in/be (get) caught ~;
and profit, e.g. data diddler (n)
modifying grades,
changing credit
ratings, fixing salaries,
or circumventing
book-keeping and
audit regulations
14 Disseminate (n) scatter or spread ~
88
widely, promulgate information/viruses/knowledge/
extensively; broadcast; ideas/news; dissemination (n);
disperse syn. spread, propagate,
promulgate
15 Filter (v) remove undesirable ~ a list of customers/incoming
data by sifting e-mail/traffic;
syn. sift away
16 Flooding (n) an overflow of a large engage
amount of water in/suspect/combat/protect
beyond its normal against ~; flood (v), flooded
limits; providing more (adj), flooding (n);
input than the entity Cf. mailbombing, packet
can process properly monkey
17 Fraud (n) manipulation of data a ~ scheme;
for criminal purposes, control/commit/suspect/
e.g. changing banking combat/ protect against ~; in
records to illegally case of ~; fraudulence (n),
transfer money to an fraudulent (adj), fraudulently
account (adv), fraudster (n)
syn. cheating, swindling
18 Hacker (n) someone who secretly speed/teleport/ethical ~;
uses or changes the hack (v), back-hack (v);
information in other syn. cracker
people's computer
systems
19 Identity theft (n) creating a false commit an ~; protect from ~;
identity using sb else’s accuse sb of ~
identifying
information to make
new credit cards or
take loans
20 Intruder (n) the one who puts network/computer/impudent ~;
oneself deliberately attack/alert an ~; intrude (v),
into a place or (un)intrusive (adj), intrusion
situation where one is (n);
unwelcome or syn. invader, trespasser
uninvited
21 Jacking (n) taking sth in a manner click/hi/page-~;
forbidden by law, engage in/be (get) involved
rules, or custom in/suspect/combat/protect
against ~; create a click-~ site;
jack in (v); jacker (n):
hi/click/page-~;
syn. stealing
89
Cf. identity theft
22 Keylogging (n) installing a program suspect/engage
on a victim's machine in/combat/protect against/suffer
that records every from ~; keylogger (n)
keystroke made by a
user for stealing login
and password details
23 Mousetrapping forcing an Internet engage
(n) user to stay on a in/suspect/combat/protect
particular website by against ~
triggering a mouse trap
24 Packet monkey sb who intentionally Cf. flooding
(n) floods a network
server or router with
data packets in order to
make it unreachable by
others
25 Phracking (n) a combination of engage
phreaking with in/suspect/combat/protect
computer hacking against ~; phracker (n)
26 Phreaking (n) hacking telephone engage in/suspect of
systems, usually for /combat/protect against ~;
the purpose of making freaker (n)
free phone calls
27 Piggybacking (n) gaining unauthorized engage in/be (get) involved
access to a computer in/be caught ~; a piggyback
system via another
user's legitimate
connection
28 Piracy (n) the act of illegally computer/software ~; act of ~;
copying software, engage
music, or movies that in/suspect/combat/commit/
are copyright- protect against ~; anti-piracy
protected (n): ~ law/measures; pirate (n),
pirated (adj);
syn. bootlegging
29 Pharming (n) misdirecting traffic
from one website to a engage in/be (get) involved in/
website controlled by a suspect/combat/commit/protect
criminal hacker by against ~; pharmer (n)
altering the domain
name system or
configuration files on a
victim’s computer
90
30 Phishing (n) sending e-mails or engage in/be involved in/be
creating web pages caught ~; phisher (n)
that are designed to
collect confidential
information for
penetration, financial
fraud or identity theft
31 Repudiation (n) rejection of ~ of a law/contract/policy/idea/
a proposal or idea; principle; (n); repudiate (v);
refusal to fulfill or syn. reject, renounce
discharge an ant. non-repudiation
agreement,
obligation, or debt
32 Salami theft stealing tiny amounts engage in/be (get) involved
/slicing (n) of money from each in/be (get) caught (in) ~
transaction
33 Scavenging (n) looking through engage in/be (get) involved
discarded listings, in/be (get) caught ~;
tapes, or other syn. dumpster diving
information storage
media for useful
information such as
access codes,
passwords, or sensitive
data
34 Spoofing (n) deceiving a system IP ~; engage in/be (get)
into thinking you are involved in/be (get) caught ~;
someone you really are spoofer (n)
not to bypass security
measures
35 Steal (v) take sb’s property ~ sth from sb; stolen (adj),
without permission or stealth (n), stealthy (adj),
legal right and without
stealthily (adv);
intending to return itsyn. theft (n)
Cf. thief
36 Trojan Horse (n) an innocent-looking download/detect/neutralize a ~;
program that has Cf. Easter egg, time bomb,
undocumented harmful zombie
functions
37 Trolling (n) an anti-social act of go ~; engage
causing an in/prevent/tackle/stop (an act
interpersonal of)/suffer from/reduce the risk
conflict and of ~; troll (v);
controversy syn. cyberbullying
91
online, purposely
sowing
hatred, bigotry, racism,
etc.
38 Virus (n) a computer program download/detect/neutralize/spre
designed to replicate ad/disseminate a ~;
and spread itself from Cf. bot, zombie
one machine to
another by human
action
39 Wiretapping (n) the interception of engage in/detect/be (get)
electronic caught/protect against/from ~
communications in
order to access
information
40 Worm (n) a program which install/download/detect/neutrali
spreads through a ze/ spread/disseminate a ~
computer system or
network by replicating
itself without human
action(like a virus) but
without integrating
itself into its
executable code
ACTIVITIES
1. bootlegger
2. combat
3. committed to sth
4. breach
5. stealth
6. cyberslacking
7. filter
92
Activity 2. Give antonyms:
1. compliant
2. repudiation
3. violation
4.conformity
5. copyright
6. piracy
7. black-hat cracker
Activity 3. Word family. Fill in the missing words of the same root where possible:
Activity 4. Complete the tables with words that form strong partnerships with the
target vocabulary units:
fraud
a worm/virus
93
commit a(n)
spoofing
comply with a
1. Because such publications do not conform ___ any standardized rules, this
information is not computer readable.
94
2. It must be terrible to be subject ___ cyberbullying.
3. We never thought him to be prone ___ suicide.
4. She went to the shop where she was diddled ___ ___ £15 when buying a pair of
flip-flops.
5. He regarded it as an infringement ___ his privacy.
6. I would not imagine him acting ___breach of law.
7. The companies would have to comply ___ the new safety standards and
procedures.
Activity 7. State the type of logical relations between the following concepts:
http://puzzlemaker.discoveryeducation.com/cryptogramSetupForm.asp
Activity 9. Explain the difference between the following concepts using the Venn
diagram below:
stealing vs jacking
phracking vs phreaking
hijacking - page-jacking - click-jacking
keylogging – mouse-trapping
malware – grayware
95
fraud – theft
hacker – cracker
Activity 11. Arrange the computer crimes in the ascending order of the difficulty of
committing them.
Activity 14. What could you do not to fall prey to Internet criminals (name at least
3 measures).
96
Activity 15. Do a mini-research and add to the above list more recent types of
computer crime.
TEST
1 Mark the odd word: a) oppose b) combat c) fight d) struggle
2 All of these may be committed EXCEPT FOR:
a) crime b) a mistake c) a murder d) suicide
3 What is the logical relationship between the concepts “breach - compliance
”: a) general and specific b) cause and effect c) method and purpose
d) contrast
4 A hacker and a cracker differ mostly in the ___ of their activity.
a) method b) purpose c) nature d) location
5 Which of these is synonymous to the word “cyberbullying”:
a) cyberslacking b) cyberstalking c) cybersquatting d) cyberloafing
6 Modifying data for fun and profit is known as ___.
a) phishing b) spoofing c) data diddling d) phreaking
7 One can filter any of these EXCEPT FOR:
a) fraud b) a list of customers c) incoming e-mail d) traffic
8 What is the logical relationship between “malware” and “a virus”:
a) general – specific b) method – purpose c) part – whole d) equivalence
9 Names of all crimes that consist in taking sth in a manner forbidden by law,
rules, or custom contain the root ___. a) cide b) jack c) tap d) cyber
10 Choose the correct preposition: Anyone subject ___ cybercrime should be
protected by law. a) of b) in c) to d) with
11 The words “trolling”, “cyberbullying”, “cyberstalking” relate to:
a) ill-treatment of people online
b) loss of confidential information
c) stealing sb’s property
d) deceiving people
12 The concepts of “keylogging”, “mousetrapping”, “pharming” relate to all of
these EXCEPT FOR:
a) manipulation of people
b) loss of confidential information
c) blackmailing
d) deceiving people
13 The words “hijacking”, “pagejacking”, “clickjacking” relate to:
a) loss of confidential information
b) illegal takeover
c) stealing sb’s property
d) deceiving people
14 The words “piracy”, “bootlegging”, “copyright” relate to:
a) ill-treatment of people online
97
b) loss of confidential information
c) stealing sb’s intellectual property
d) deceiving people
15 All of these are synonymous to the word “disseminate ” EXCEPT FOR:
a) promote b) spread c) propagate d) promulgate
16 Purchasing a domain name that contains a well-known trademark or
commercial name to sell it to the rightful owner for a big profit is known as
___.
a) cyberslacking b) cybersquatting c) cybercide d) cyberbullying
17 He is a convicted credit-card ___.
a) fraudster b) fraud c) fraudulent d) fraudulence
18 All of these collocate with the noun “worm” EXCEPT FOR:
a) install b) commit c) download d) detect
19 The difference between “copyright” and “copyleft” concerns mostly
the authors’ ___ (their) work. a) income from b) manner of c) method of
d) interest in
20 A blackhat and a whitehat differ mostly in the ___.
a) color b) size c) shape d) purpose
98
Module 8. CYBER SECURITY
99
categories according advertisement; be ~ according to
to shared qualities or into some categories;
characteristics; sth classify (v): ~ sb/sth into …
categorized as according to…; classification
officially secret, (n): ~ level/type/category;
access to which syn. categorize
requires authorization ant. declassified, unclassified
8 Code (n) a system of symbols write/crack a ~; ~
used to represent string/generator/
information in the inspection/length/point;
form other than the source/malicious/machine/ASCII
original one ~;
decode (v), encode (v);
syn. cipher, cryptogram
9 Compromise reach an agreement ~ a system/data/security/one’s
(v) or settlement of a principles; ~ on sth; compromise
dispute by each side (n): reach a ~; (un)compromised
making concessions; (adj);
cause to become syn. undermine, weaken,
vulnerable or concession
function less
effectively
10 Confidential information to be ~ information/service/details/
(adj) disclosed only to performance check; keep sth ~;
those authorized to on a ~ basis; divulge ~
view it information; confidentiality (n):
~ agreement, breach of ~, total ~,
under the terms of ~,
guarantee/request ~;
confidentially (adv);
syn. private, personal, secret,
sensitive, classified
ant. open, public
11 Corruption (n) dishonest or expose/root out ~; allegation of
fraudulent conduct by ~; prevent accidental data ~; lead
those in power, to/cause data ~; rotten with ~;
typically involving corrupt/ed (adj);
bribery; degradation ant. integrity
of a computer Cf. bribery
database or program
by alteration or the
introduction of errors
12 Dedicated (adj) devoted to a task or be ~ to a career/cause/team;
purpose; exclusively a ~ channel/security mode/link/
100
allocated to or terminal/web page/graphics/card/
intended for a employee/LAN /line; dedicate
particular purpose; a (v): ~ oneself to sth/sb; ~ sth to
mode of IS operation, sb; dedication (n);
wherein all users are syn: committed, exclusive,
authorized to access allocated
all data handled by
the system
13 Deny (v) refuse to give sth ~ access/the existence of
requested or desired sth/evidence/a law/a privilege/a
to sb; refuse to admit claim; ~ sb the right to sth; ~
the truth or existence oneself the pleasure of sth/doing
of sth sth; ~ that…; denial (n): ~ of
service/access;
(un)deniable (adj);
syn: reject, decline
14 Encrypt (v) convert (information ~ information/data/a password/a
or data) into a code, message; cryptography (n),
especially to prevent (un)encrypted (adj);encryption
unauthorized access (n): ~ standards/code;
syn. code, cypher
ant. decrypt, decode
15 Expire (v) (of a document, license/contract/term/authorizati
authorization, or on ~s on/ at …; expiry (n): ~
agreement) reach the date; upon/before/after ~; best
end of the validity before ~;
period expiration (n), expired (adj)
16 Expose (v) make sth visible by ~ sb to
uncovering it; release danger/risk/treatment/injury; ~
sensitive data to an the nature/flaw/defect of sth;
unauthorized entity exposed (adj): ~ to culture/best
(as a result of theft, practices; ~ and vulnerable;
wiretapping, etc.), exposure (n):
cause someone to be deliberate/unintentional ~;
vulnerable or at risk syn. endanger, imperil,
jeopardize sb/sth;
familiarize/acquaint sb with sth
17 Detect (v) discover or identify ~ (a/n)
the presence or intrusion/virus/attempt/cancer
existence of sth /crime/changes/trend;
detector (n): fire ~; detective (n);
syn. become aware/conscious of,
perceive
18 Digital (adj) relating to, using, or ~
101
storing data or certificate/signal/age/map/assista
information in the nt/
form of signals TV/generation/technology/revolu
expressed as series oftion/
the digits 0 and 1 recording/cassette/copier/image;
digitize (v); digit (n);
syn. computerized
ant. analogue
19 Disrupt (v) interrupt or prevent ~ the
the correct operation workflow/operations/activities/
of system services a(n)
and functions application/mechanism/process/
system/production/plans;
disruption (n), disruptive (adj);
syn. discontinue, interfere
20 Fail (v) be unsuccessful in ~ to qualify/to meet the
achieving one’s goal; standards/to do sth; ~ in one’s
cease to work attempt to do sth /an exam; a ~-
properly; break down safe mode; a ~ grade; ~;
failure (n): ~ control; control ~;
be doomed to ~;
syn. breakdown, malfunction, go
wrong;
ant. succeed
21 Filter (n) a piece of software ~ out/through sth;
that processes data ~ a system/a message/traffic/
before passing it to information/calls; filter (n):
another application, water/oil/software/removable ~;
for example by install a ~; ~ capability
reformatting syn. sift, purify
characters or
removing unwanted
types of material
22 Firewall (n) either a hardware install/construct/bypass a ~;
program or a feature monitor computers and networks
intended to filter through a ~; invest in a software
incoming and ~; up-to-date/outdated/personal
outbound traffic ~; voice ~;
syn: security, gateway
23 Identity (n) the characteristics ~ card;
determining who or personal/mistaken/group/corpora
what a person or te/ racial/social/ethnic/national ~;
thing is identify (v): ~ sb (oneself) with
sth/sb; identifier (n);
102
identification (n);
syn. selfhood
24 Integrity (n) the quality of being a man of ~; data/database ~
honest and having check; check sth for ~;
strong moral structural/moral/territorial ~;
principles; the state ensure/preserve ~; integral (adj),
of being undivided; (dis)integrated (adj);
internal consistency syn. soundness, wholeness,
or lack of corruption solidity
in electronic data
25 Intrude (v) enter with a ~ on sb’s privacy/into sb’s
disruptive or adverse private life;
effect; intruder (n), intrusion (n): defend
gain access to sth against ~;
sensitive data without syn. encroach, infringe on,
authorization by invade, disrupt
circumventing a Cf: trespassing, penetration,
system's security reverse engineering
protection
26 Log in/on (v) gain access to a ~ to one’s
session to use system computer/account/network;
resources usually by login (n): type the ~; a ~
providing a user command file;
name and password log (n): keep a ~ of sth; a
to an access control logbook (n);
system ant. log off/out
27 Password (n) a secret word or type/enter/change/require/supply
phrase used to gain / know/forget the ~; ~ protection;
admission to a place; be protected by a ~; a(n)
a string of characters (in)valid ~
that allows access to
a computer, interface,
or system
28 Penetrate (v) go into or through sth ~ the market/into a system/sb’s
especially with force words;
or effort; gain penetration(n): high/deep ~; ~
unauthorized access level; (im)penetrable (adj): ~
to sensitive data by barrier/network;
circumventing a syn. infiltrate, invade
system's protections
29 Privacy (n) the state of being free loss/guarantee of ~;
from public attention; invade/protect ~;
the right of a person ~ concerns/issues/policy/setting;
to determine the for ~ reasons/considerations/
103
degree to which s/he protection;
will share private (adj): a ~ network
information about syn: confidentiality
him/herself with ant. publicity, public
others
30 Proprietary sth owned by an ~
(adj) individual or a information/brand/rights/interest
company, which s/ name /OS/database/software/
needs to be licensed system/features; proprietorship
from the owner (n);
before it can be used ant. open, public/generic (brand)
31 Rely (v) depend on sb/sth ~ on/upon sb/sth;
with full trust or (un)reliable (adj), (un)reliability
confidence (n);
syn. be confident of; depend on,
trust
32 Risk (n) exposure to danger, ~-averse/aversion; the ~ factor;
the possibility that pose a ~; run/take the ~ of; a
something unpleasant security ~; a ~ to safety; ~taker;
or unwelcome will risky (adj), riskiness (n);
happen syn. insecurity,
33 Safety (n) the condition of cyber/public ~ ;
being protected from assure/jeopardize sb’s ~; ~
or unlikely to cause barriers/precautions;
danger, risk, or injury safe (adj): stay ~ on the Internet,
be ~ for sb/from sth; safely
(adv);
syn. security
ant. insecurity
34 Scan (v) look quickly but not ~ for/through/into the computer;
very thoroughly ~ data/information/library/the
through sth; contents/pages/headings; scan
convert a document (n): a quick ~ of sth;
or picture into digital scanner (n):
form; check manually optical/ultrasound/color/ desktop
or automatically for ~; buy/test/run the ~
viruses and malware
35 Secret (n) not known or seen or guard/keep/divulge a ~; a(n)
not meant to be open/state/commercial/military
known or seen by ~; meet in ~; secretive (adj): be ~
others about sth
syn. cryptic, confidential,
classified
36 Secure (adj) protected against ~ connection/transaction; ~
104
attack or other against/from sth;
criminal activity security (n) : ~ policy/update/
environment/mechanism/service/
protocol/level; social/data ~;
ensure/ compromise/undermine
~;
ant. insecure, insecurity
37 Sensitive (adj) quick to detect or ~ to criticism/other people’s
respond to slight feelings/about sth; ~
changes, signals, or information/issue/test/equipment
influences; kept /area;
secret or with sense (n), (in)sensitivity (n);
restrictions on ant. insensitive
disclosure to avoid
endangering security
38 Threat (n) a person or thing pose/constitute/cause/carry
likely to cause out/fulfill/face a ~;
damage or danger, a security/major/hidden ~; a ~ to
potential for violation
public safety; under the ~ of sth;
of security or threaten (v), threatening (adj);
inflicting harm syn. jeopardy, menace
39 Valid (adj) legally or officially ~ contract/license/password/visa;
acceptable or (in)validity (n), (in)validate (v),
binding; in legal (in)validation (n);
force syn. effective
ant. invalid, ineffective
40 Vulnerability a flaw or weakness in degree of ~; exploit/identify/fix a
(n) a system that could ~ on a system; in/vulnerable
be exploited to (adj): ~ group/position/to
violate the system's criticism; emotionally/feel ~;
security policy ant. immune, immunity
ACTIVITIES
105
Activity 1. Give synonyms:
1. authenticate
2. authorize
3. compromise
4. deny
5. endanger
6. disrupt
7. intrude
1. encrypt
2. code
3. admit
4. vulnerable
5. confidential
6. succeed
7. cipher
8. proprietary
Activity 3. Word family. Fill in the missing words of the same root where possible:
Activity 4. Complete the tables with words that form strong partnerships with the
target vocabulary units:
a certificate
106
Verb Target vocabulary unit
a firewall
confidential
code
dedicated
deny
107
1. back door A. disclose confidential information
2. divulge B. a feature or defect of a computer system that allows
secret unauthorized access to data
3. deny C. sth categorized as officially secret, access to which
requires authorization
4. classified D. internal consistency or lack of corruption in electronic
data
5. integrity E. refuse to admit the truth or existence of sth
6. threat F. owned by an individual or a company, which needs to be
licensed from the owner before it can be used
7. proprietary G. a person or thing likely to cause damage or danger
Activity 7. State the type of logical relations between the following concepts:
Activity 8. Decode Bruce Schneier’s saying about computer security and comment
on it:
108
http://puzzlemaker.discoveryeducation.com/code/BuildCryptogram.asp
Activity 9. Explain the difference between the following concepts using the Venn
diagram below:
1. secured
109
2. corrupted
3. certified
4. dedicated
5. in/validated
1. authentication
2. authorization
3. encryption
4. back door
5. invalidation
6. coding
7. fail-safe
mode
TEST
111
Module 9. TRENDS IN IT
117
1. Technology dictionary, Technopedia. Available:
http://www.techopedia.com/definition [Accessed: 20 Oct. 2015]
2. Computer glossary, Techtarget dictionary and encyclopedia. [Online]. Available:
http://bnc.bl.uk/saraWeb.php?qy=best+practices&mysubmit=Go [Accessed: 24 Oct.
2015]
3. Online tech dictionary for IT professionals, IT Business Edge. [Online]. Available:
http://www.webopedia.com/ [Accessed: 22 Oct. 2015]
ACTIVITIES
1. quantum programming
2. agile
3. accelerate
4. synchronous
5. integrated
6. real time
7. remote
8. tolerant
Activity 2. Word family. Fill in the missing words of the same root where possible:
Activity 3. Complete the tables with words that form strong partnerships with the
target vocabulary units:
-proof
118
Target vocabulary unit Noun
nano-
remote
tele-
119
Activity 5. Fill in the blanks with the words “-tolerant”, “-proof”, “multi-“,
“tele-“”-free”
Activity 7. State the type of logical relations between the following concepts:
Activity 8. Decode Bill Gates’ saying about innovations and comment on it:
120
http://puzzlemaker.discoveryeducation.com/code/BuildCryptogram.asp
Activity 9. Explain the difference between the following concepts using the Venn
diagram below:
121
Activity 10. Say what the following is used for:
1. life-hacking
2. nanotechnology
3. cloud computing
4. beta testing
5. biometrics
6. a fool-proof device
7. open source
1. multi-purpose
2. multi-mode
3. multi-user
4. multi-functional
5. multi-media
6. fault-tolerant
7. ad hoc
1. channel integration
2. biometric identification
3. cloud storage
4. cobotic devices
5. asynchronous computing
122
6. beta testing
7. optical character
recognition
Activity 15. Analyze your computer experience and identify the areas in which it
lags behind the best practices in the industry.
TEST
124
SPECIFIC PART
1. New Oxford American Dictionary, 3rd Edition. – Oxford University Press Inc. –
2010.
2. Oxford Dictionary of English, 3rd Edition. – Oxford University Press. – 2010.
3. Англо-русский словарь по вычислительной технике и программированию. –
8-е изд., исп. и доп. Mасловский Е.К. – 2008.
4. Англо-русский толковый словарь по вычислительной технике, Интернету и
программированию (6-е изд., исп. и доп.). – Э.М. Пройдаков, Л. А. Теплицкий –
2011.
ACTIVITIES
1. maintain
2. bug
3. tool
4. command
5. condition
6. execute
7. manual
1. binary
2. compile
135
3. variable
4. assemble
5. code
6. compress
7 integrate
Activity 3. Word family. Fill in the missing words of the same root where possible:
Activity 4. Complete the tables with words that form strong partnerships with
the target vocabulary units:
applet
array
thread
136
Verb Target vocabulary unit
a script
procedure
default
process-
Activity 6. Place the following words in the columns according to the prefix used
to form a negative counterpart:
Activity 7. State the type of logical relations between the following concepts:
Activity 8. Decode John Romero’s saying about programming and comment on it:
http://puzzlemaker.discoveryeducation.com/code/BuildCryptogram.asp
138
Activity 9. Explain the difference between the following concepts using the Venn
diagram below:
Activity 10. Say what the following is used for. Give examples:
1. applet
2. command
3. compiler
4. manual
5. prototype
6. script
7. toolbar
Activity 11. Name at least 7 popular tools (buttons) situated on almost every
application software toolbar.
Activity 12. Describe the functions of utilities patched into a PC operating system.
139
Activity 14. Do a mini-research and briefly characterize the following
programming languages in terms of their popularity, complexity and applicability.
1. C++
2. Java
3. HTML
4. Visual Basic
5. Python
6. Ruby
Activity 15. Write a paragraph about the applets you have got in your PC and
smart phone right now. Briefly describe some of their functions.
TEST
141
Module 11. NETWORKS
143
with addresses sharing
a common suffix or
under the control of a
particular organization
or individual
13 Duplex (adj) communication flowing ~ transmission;
in both directions full/half ~
simultaneously
14 Echo (n) a reflection of sound, ~ check/cancellation;
coming some time after cloud/electric/talker/multiple ~;
the sound per se; a spread/check/cancel ~;
network continuity test echo (v): ~ a command/packet;
where packets are sent syn. imitation, reflection,
to a distant node that is repetition
obligated to
immediately send the
packets back
15 Ethernet (n) a standard way to ~ provider/connection/bus/cable/
connect computers on a bridge/adapter/access/card;
network over fast/gigabit/thin ~;
a wired connection (dis)connect from/to the ~;
16 Flow (n) steady and continuous work/data /traffic/gas ~;
movement (of a liquid, ~ control/sheet; ~ of (the)
gas, or electricity) in a refugees/current/program;
current or stream; control/restrict/stop a ~;
movement of packets or flow (v);
data from a source to a syn. movement, stream
destination
17 Forward (v) send (a letter or email) ~ a packet/data/message;
on to a further forward (adj): ~ error correction;
destination; send a forwarding (n): packet ~;
frame toward its forwarded (adj); reforward (adj);
ultimate destination via ant. block
an internet-connected
device
18 Framework (n) a structure for architecture/adaptability/applicat
supporting sth, ion/ logical ~; ~ -oriented
especially a skeletal design/class; under/within the ~
support for a of sth;
construction; a legal/practical/broad/supporting
144
standard network ~;
structure build up/set up a ~;
syn. plan, scheme, structure
19 Frequency (n) the number of (light, sound)
occurrences of a wave/processor/natural/
repeated event per unit negative/normalized ~;
of time, esp. in ~ range/converter/deviation/
measuring the speed or distribution/spectrum;
the rate of sound, radio control ~; (in)frequent (adj):
and light waves ~ replication/changes;
frequently (adv): a ~ occurring
mistake; frequenter (n);
syn. density, recurrence
ant. infrequency
20 Hub (n) the effective center of e-mail/Ethernet/USB ~;
an activity, region, or (dis)connect a ~; hub (v): ~ a
network; a central computer/devices on a network;
Ethernet-based syn. center, nucleus, kernel
connection
21 Hotspot (n) a Wi-Fi network access ~ connection/controller;
point or area airport/railway station/mobile ~;
find/(dis)connect to (from) a ~;
place/(re)locate/give access to a
~
22 Host (n) one who receives guests act as a ~; play ~ to sth; a ~ of
in a social or official sth;
capacity; a computer ~ address/ number/node; host
that acts as a server for (v): ~ a conference/meeting/
other computers on a event;
network syn. mother computer, Internet
node;
ant. guest, visitor
23 Latency (n) the state of existing but ~ period/mode/optimization/of
not yet being developed recovery; network ~; suffer from
or manifest; the time ~;
interval between syn. delay, access time, response
initiating a process, and time
receiving the results;
the time required for a
computer on a
network to respond to a
request
145
24 Layer (n) a single thickness of a a thick/thin/insulating/ozone ~ ;
material covering a a ~ of dust; create/change/remov
surface or forming an e/ place in a ~; cover sth with a
overlying part; ~ of sth; ~ address/mode/optimiz
a group of ation; internet/memory/upper/ph
communication ysical/transport/user/application
functions and the ~;
protocols implemented syn. stratum
therein Cf. Secure Sockets Layer
25 Network (n) a group or system of a ~ of institutions/organizations/
interconnected people professionals; a(n)
or things; a collection dedicated/corporate/ cable
of computers, servers, television/dial up/in-house/
mainframes, network local/wireless/Internet/intra/extra
devices, peripherals, or / bot/local/optical/communicatio
other devices connected n/ enterprise/free/radio ~;
to one another allowing (a) ~ adapter/address/administrat
for data to be shared or/architecture/interface/layer/
and used management/devices;
connect to/penetrate into/hack a
~;
syn. structure, system
Cf. LAN, WAN, WLAN
26 Noise (n) sound of any kind; a video signal/random/short/
disturbance that spontaneous ~; a ~ filter/source;
interferes with data make/produce/block/remove/
transmission get rid of ~;
and corrupts the quality noisy (adj), noisily (adv);
of the signal ant. silence
146
of rules used to define a TCP/IP, FTP
method of exchanging
data over a computer
network
29 Receiver (n) a person who gets or pick up a ~; the ~ account;
accepts sth that has a satellite/radio /television/call
been sent or given to ~; receive (v): ~ a
them; a piece of radio call/message/signal; reception
or television apparatus (n), recipient (n);
that detects broadcast syn. get
signals and converts ant. transmit, send
them into a visible or Cf. accept
audible form
30 Route (n) an established line of a scenic/railway/train ~;
travel or access; the close/take/change/choose/
path a network packet send over a
takes to reach its ~; alternate/default/direct/
destination main ~; route (v): ~ a
cable/signal/message;
router (n); routing (n); routed
(adj);
syn. direction, itinerary, track,
trail
31 Server (n) a computer that ~ adapter/address/administration
provides data to other /application/architecture;
computers file/web/network/print ~;
program/build/maintain/
administer a ~;
syn. host computer
ant. client, slave
32 Session (n) a period devoted to a a(n) training/induction/
particular activity; an parliamentary/
on-going relationship editing/user ~; set/conduct/
between two computers attend/organize/cancel a ~;
involving the allocation charge per ~; chair a ~;
of resources and a syn. conference, period
sustained data flow
33 Signal (n) a gesture, action, or transmit/send/restrict/clear a ~;
sound that is used to analog/digital/light/discrete/traffi
convey information or c ~; ~ speed/flare/adapter; a ~ to
instructions; an stop/
147
electrical impulse or turn right; signal (v);
radio wave transmitted signaling (adj)
or received
34 Switch (n) a device for making and multiple/backbone/optical/
breaking the connection packet/manual ~; switch (v): ~
in an electric circuit; a on/off;
unit used to network switching (n): packet ~
multiple computers
together
35 Telephony (n) the working or use of ~ communication/application/
telephones; a control/board/backbone; IP ~;
technology that enables radio/voice/wireless ~;
a user to receive and telephone (n, v);
make calls through their syn. transmission, call
computer
36 Telecommunicat the process of ~ access/bandwidth/path/route/
ion (n) transmitting data channel/satellite;
electronically over any commercial/industrial/land/cellul
communications line ar ~; send/intercept ~;
telecommute (v)
37 Terminal (n) the end of a railway or bus/ferry/airport ~; network/idle/
other transport route, or virtual/teller/office ~;
a station at such a point; program/access/disable/build/
a simple device with a adjust a ~; terminate (v): ~ a
monitor and a process/action;
keyboard, at which data syn. station
can be entered into or Cf. hub
retrieved from a
network
38 Transmit (v) cause sth to pass on ~ a message/signal; transmission
from one person or (n): ~ path/route/cable, one
place to another; send way/parallel/
packets of data across a serial/optical/voice/packet ~;
network transmitter (n);
syn. disseminate, transfer,
pass on
ant. receive
39 Topology (v) the physical bus/ring/tree/star/network/
configuration of a system ~; build/configure a ~;
network that determines topological (adj):
how the network ~ analysis/function/approach
148
computers are
connected
40 Wireless (adj) a system that provides ~ access/control/microphone/
communication without connection;
the use of wires syn. Wi-Fi, mobile, cellular
ant. wired, cable, landline
1. New Oxford American Dictionary, 3rd Edition. – Oxford University Press Inc. –
2010.
2. Oxford Dictionary of English, 3rd Edition. – Oxford University Press. – 2010.
3. Англо-русский словарь по вычислительной технике и программированию. –
8-е изд., исп. и доп. Mасловский Е.К. – 2008.
4. Англо-русский толковый словарь по вычислительной технике, Интернету и
программированию (6-е изд., исп. и доп.). – Э.М. Пройдаков, Л. А. Теплицкий –
2011.
ACTIVITIES
1. allocate
2. bandwidth
3. cable
4. channel
5. framework
6. session
7. hub
1. connect
2. receiver
3. frequency
4. noise
5. server
6. transmit
7. wireless
Activity 3. Word family. Fill in the missing words of the same root where possible:
149
forwarding
transmit
collided
connectedly
frequent
address -
Activity 4. Complete the tables with words that form strong partnerships with the
target vocabulary units:
broadcast
a hotspot
150
Adjective Target vocabulary unit
layer
a terminal
network
telecommunication
Activity 7. State the type of logical relations between the following concepts:
Activity 8. Decode Alison Gopnik’s saying about the Web and comment on it:
http://puzzlemaker.discoveryeducation.com/code/BuildCryptogram.asp
Activity 9. Explain the difference between the following concepts using the Venn
diagram below:
152
1. LAN – WAN - WLAN
2. full-duplex – half-duplex
3. DNS - provider
4. bridge - hub
5. switch - hub
6. server – host
7. hook up – connect
1. backbone
2. bridge
3. DNS
4. hub
5. hotspot
6. SSL
7. topology
153
2. wireless
connection
3. satellite
connection
4. backbone
connection
5. dial-up connection
6. mobile connection
Activity 13. Name at least 3 popular domains of the 1st and 2nd level.
Activity 14. Give definition of the Internet protocol. Say what the following types of
protocols are used for:
1. TCP/IP
2. MTP
3. HTTPS
4. VOIP
5. FTP
TEST
155
Module 12. DATA STORAGE
ACTIVITIES
Activity 1. Give synonyms:
1. erase
2. format
3. retention
4. preserve
5. archive
6. backup
7. cache
161
Activity 2. Give antonyms:
1. subscribe
2. fragment
3. compress
4. upload
5. capacity
6. preserve
7. compress
Activity 3. Word family. Fill in the missing words of the same root where possible:
Noun Verb Adjective Adverb
record
store
archive
compressible
subscribe
retentive
accessibly
Activity 4. Complete the tables with words that form strong partnerships with the
target vocabulary units:
upload
a file
memory
162
Target vocabulary unit Noun
preserve
retrieve
Activity 7. State the type of logical relations between the following concepts:
163
Concepts Type of logical relations
1. file – archive A. general and specific
2. backup – mirror B. cause and effect
3. download – upload C. contrast
4. erase – loss of data D. method and purpose
5. library – storage E. part and whole
6. expand – reduce
F. equivalence
7. CD – CDR
http://puzzlemaker.discoveryeducation.com/cryptogramSetupForm.asp
Activity 9. Explain the difference between the following concepts using the Venn
diagram below:
1. bit – byte
2. subscribe – purchase
3. cache – store
4. retrieve – restore
5. online storage – external hard drives
6. CD – Blu-ray
7. overwrite – erase
164
Activity 10. Say what the following is used for:
1. archive
2. backup
3. Blue-ray
4. CD
5. cache
6. storage
7. WORM
1. digitization
2. faxing
3. refurbishment
4. optimization
5. swapping
6. configuration
7. restoration
Activity 12. Discuss the data storage devices you use, their advantages and
disadvantages.
Activity 13. Arrange the following data in the descending order of priority and
share the results with your partner(s).
165
Activity 14. Analyze in groups of 4 the data storage methods (cloud storage,
CD/DVD, HDR, etc.) in terms of their pros and cons as the most appropriate way
to keep the given entities:
Activity 15. Make a comparative analysis of the traditional and innovatory data
storage methods. Make projections into the data storage perspectives in the future.
TEST
What is the logical relationship between the concepts “retention -
1 preservation”: a) general and specific b) contrast c) equivalence
d) part and whole
Which of these means “remove the previously written data”:
2
a) erase b) extend c) expand d) expose
A defined structure for the processing, storage, or display of data is
3
referred to as a ___. a) fragment b) library c) archive d) format
A collection of related data records stored in a computer memory is
4
referred to as a___. a) document b) file c) archive d) page
All of these are synonymous to the verb “cache” EXCEPT FOR:
5
a) stash b) keep c) hide d) conceal
Which of these adjectives is WRONG:
6
a) cacheable b) convertible c) downloadable d) recoverable
A storage medium that cannot be rewritten is referred to as a ___.
7
a) WORM b) ROM c) DVD d) CD
Which of these means “cause to last longer”:
8
a) expand b) extend c) enlarge d) augment
What is the logical relationship between the concepts “data – archive”:
9 a) general and specific b) cause and effect c) method and purpose d) part
and whole
Which of these is synonymous to the word “recover”:
10
a) break b) damage c) restore d) destroy
The ___ mode, as its name suggests, erases existing text to the right of the
11 cursor replacing it automatically with your alteration.
a) rewrite b) delete c) overwrite d) retrieve
The amount of memory space needed to store one character, which is
12
normally 8 bits is referred to as ___. a) byte b) boot c) bot d) bite
166
What is the logical relationship between the concepts “download –
13 upload”: a) general and specific b) contrast c) method and purpose
d) part and whole
All of these collocate with the adjective “restricted” EXCEPT FOR:
14
a) access b) area c) password d) space
15 This videogame is available ___ Blu Ray. a) on b) to c) in d)at
The files are automatically compressed so they're small enough to send
16 ____ e-mail.
a) for b) to c) via d) on
Which of these suffixes is used to form an antonym to the adjective
17 “retrievable”:
a) un b) in c) ir d) non-
CD, DVD and Blue Ray differ in all of these EXCEPT FOR:
a) the method of information recording b) the volume of information they
18 may store
c) the type of information they may store d) the number of layers they
contain
Query and request differ in all of these EXCEPT FOR ____.
19
a) field of use b) degree of generality c) part of speech d) style
A unit of information equal to one million or, strictly, to 1,048,576 bytes,
20
is called a ____byte. a) mega b) tera c) kilo d) bit
167
Module 13. RADIOELECTRONICS
ACTIVITIES
1. aperture
2 .cover
3.delay
4. module
5. regulate
6. synchronize
7. terminate
1. attenuation
2. cover
3. damp
4. expose
5. resist
6. scatter
7. resistible
Activity 3. Word family. Fill in the missing words of the same root where possible:
Activity 6. State the type of logical relations between the following concepts:
176
Activity 7. Complete the tables with words that form strong partnerships with the
target vocabulary units:
attenuation
beacon
acoustic
density
electron
177
http://puzzlemaker.discoveryeducation.com/cryptogramSetupForm.asp
Activity 9. Explain the difference between the following concepts using the Venn
diagram below:
1. ray – signal
2. vibration – oscillation
3. attenuation – damping
4. electron – quantum
5. period – phase
6. FM - AM
1. damped
2. delayed
3. emitted
178
4. intensified
5. synchronized
6. reflected
7. tuned
1. compass
2. beacon
3. antenna
4. radio
5. resistor
6. cover
7. stabilizer
Activity 12. Fill in the table reflecting the use of different compass types given
below:
Activity 13. Discuss the use of the term ‘quantum’ in mechanics, computing,
physics, cryptography and electronics.
Activity 15. Do a mini-research and prepare a short report about the contribution
of different engineers such as Alexander Popov, Guglielmo Marconi and
Ferdinand Braun to the invention of radio.
TEST
1 What is the logical relationship between the concepts “antenna - radio set-”:
a) general and specific b) cause and effect c) method and purpose
d) part and whole
2 What is the logical relationship between the concepts “radio modulation -
FM”: a) general and specific b) cause and effect c) method and purpose
d) equivalence
3 All of these are synonymous to the word “aperture” EXCEPT FOR:
a) breach b) hole c) eyelid d) opening
4 What is the logical relationship between the concepts “vibration - waves”:
a) general and specific b) cause and effect c) equivalence d) part and whole
5 The maximum extent of a vibration or oscillation, measured from the
position of equilibrium is known as ____. a) amplitude b) aperture d)
179
attenuation d) oscillation
6 A very small particle of matter that has a negative charge of electricity and
that travels around the nucleus of an atom is known as____.
a) electron b) quantum d) molecule d) signal
7 Travelers leaving the vehicles in Safari are exposed _____ danger.
a) to b) under c) for d) in
8 The software development project is divided ______ several modules.
a) into b) by c) on d) in
9 To ______ means to cause to occur or operate at the same time or rate.
a) synchronize b) stabilize c) regulate d) terminate a not b
10 Mark the odd word: a) intense b) intensity c) intensified d) intensive b not a
11 All of these are synonyms EXCEPT FOR:
a) synchronize b) harmonize c) coordinate d) terminate
12 All of these are antonyms to the word “attenuation” EXCEPT FOR:
a) increasing b) enlargement c) strengthening d) decreasing
13 Mark the odd word: a) terminated b) terminative c) terminating d) terminate
14 What does FM stand for? a) frequency modulation b) frequency module c)
frequent modulation d) frequently modulation
15 FM and AM are examples of radio___. a) broadcast b) modulation c) phases
d) tunes
16 All of these collocate with the noun “attenuation” EXCEPT FOR:
a) light b) sound c) frequency d) density
17 Fire, sea, tower are the types of : a) beacons b) beams c) rays d) compasses
18 Work with electronic equipment requires special protective screens to filter
_____ the rays that might be optically harmful. a) from b) out c) through d)
by b not a
19 Which of these is NOT a type of a compass: a) wet b) liquid c) bearing d) sun
20 All of these verbs collocate with the noun “density” EXCEPT FOR:
a) measure b) calculate c) vary d) cover
180
Module 14. TELECOMMUNICATION
ACTIVITIES
1. beam
2. bear
3. disperse
4. distort
5. mount
6. power
7. sequence
1. detect
2. landline
187
3. standard
4. synchronous
5. mobile
6. remote
7. vibration
Activity 3. Word family. Fill in the missing words of the same root where possible:
188
3. The Democratic People's Republic of Korea claimed to put an Earth
observation satellite ____ orbit.
4. Keeping _____ the communication standards is rather a challenging task for
professionals.
5. British Prime Minister David Cameron called for discussions on how to bring
_____ political transition in Syria.
6. Dozens of people had to line___ ___ queue to get the tickets.
7. Two ___ the power ___ 4 equals 16
Activity 7. State the type of logical relations between the following concepts:
Activity 4. Complete the tables with words that form strong partnerships with the
target vocabulary units:
energy
indicator
remote
189
Adj/N Target vocabulary unit
sonde
traffic
Activity 8. Decode Bob Poe’s quote about telecommunications and comment on it:
http://puzzlemaker.discoveryeducation.com/cryptogramSetupForm.asp
Activity 9. Explain the difference between the following concepts using the Venn
diagram below:
190
Activity 10. Say what can be … and how:
1. detected
2. distorted
3. diffused
4. generated
5. propagated
6. shielded
7. queued
1. ADSL
2. carrier
3. satellite
4. LTE
5. remote
control
6. resonator
7. teleport
Activity 12. Arrange the standards for communication in an ascending order from
the least advanced to the most: 3G, 2G, LTE, dial-up. Explain the chosen
sequence. What do you know about the latest communication standards?
Activity 13. Brainstorm the current issues of alternative energy sources. Do you
think it’s possible to completely substitute traditional energy sources in the near
future?
191
Activity 14. Do a mini research and prepare a short report about the most
devastating blackouts in the history of humankind.
Activity 15. Write a paragraph explaining the statement of Bob Poe in Activity 8.
TEST
193
Module 15. COMPUTER MODELING
ACTIVITIES
1. component
2. concept
3. constraint
4. diagram
5. evaluation
6. optimize
7. probability
201
Activity 2. Give antonyms:
1. force
2. risk
3. simplify
4. probable
5. system
6. dynamic
7. effective
Activity 3. Word family. Fill in the missing words of the same root where possible:
Activity 4. Complete the tables with words that form strong partnerships with the
target vocabulary units:
a proportion
ratio
a result
202
Adj Target vocabulary unit
structure
Activity 7. State the type of logical relations between the following concepts:
Activity 8. Decode a famous quote of Louis Gerstner (IBM CEO) and comment on
it:
http://puzzlemaker.discoveryeducation.com/cryptogramSetupForm.asp
Activity 11. Explain the difference between the following concepts using the Venn
diagram below:
1. experiment - measurement
2. manipulation - modeling
3. proportion - ratio
4. system - structure
5. parameter - dimension
6. efficient - effective
204
Activity 10. Say what can be … and how:
1. 2-dimensional
2. 3-dimensional
3. evaluated
4. manipulated
5. measured
6. predicted
7. simulated
1. simulations
2. simplification
3. analysis
4. CAD
5. evaluation
6. experiment
7. prediction
Activity 12. Describe the problems that make computer modeling vital in the
following fields:
1. Space and air travel
2. Fire-fighting
3. Earthquake prediction
4. Medicine
5. Building
205
Activity 13. Name physical forces that affect a person in the natural environment,
describe their effect briefly.
Activity 14. Say what CAD software is popular now and what it is used for.
Comment on the CAD uses today.
Activity 15. Do a mini research and prepare a short report on the theory of the 4th
dimension.
TEST
207
Module 16. MATHEMATICS
214
1. Англо-русский словарь по вычислительной технике и программированию. -
8-е изд., исп. и доп. – Масловский Е.К. – ABBYY, 2008.
2. Telecom ABC. [Online]. Available: http://www.telecomabc.com [Accessed: 3
Nov. 2015]
3. Computer hope. Free computer help and information. [Online]. Available:
http://www.computerhope.com/jargon.htm [Accessed: 3 Nov. 2015]
ACTIVITIES
1. derive
2. altitude
3. calculate
4. deviate
5. divide
6. deduct
7. finite
1. add
2. approximate
3. average
4. fraction
5. precise
6. reduce
7. rigid
Activity 3. Word family. Fill in the missing words of the same root where possible:
215
Activity 4. Complete the tables with words that form strong partnerships with the
target vocabulary units:
a number
outcome
proportion
root
Activity 7. State the type of logical relations between the following concepts:
Activity 8. Decode Tobias Danzig’s saying about mathematics and comment on it:
217
http://puzzlemaker.discoveryeducation.com/cryptogramSetupForm.asp
Activity 9. Explain the difference between the following concepts using the Venn
diagram below:
1. equation – formula
2. number – value
3. altitude – angle
4. approximate – average
5. derivation – deviation
6. division – fraction
7. integer – number
1. added
2. calculated
3. approximated
218
4. derived
5. divided
6. reduced
7. valued
1. equation
2. base
3. average
4. verification
5. argumentation
6. approximation
7. coefficient
Activity 12. Calculate the following equations, comment on every step you make to
get the outcome:
8a - 8d = 74
4m2n4 + 2m = 0 5a2 – 5a = 35
TEST
220
INDEX
A
Accelerate (v) 91
Access (v) 125
Account (n) 61
Acoustic (adj) 134
Ad hoc (adj) 91
Add (v) 42, 165
Address (n) 114
Administrator (n) 5
Agile (adj) 91
AI (abbr) Artificial Intelligence 91
Algorithm (n) 104
Align (v) 14
Allocate (v) 114
Altitude (n) 165
Amplify (v) 91
Amplitude (n) 134
Analyst (n) 5
Analyze (v) 151
Angle (n) 165
Anonymity (n) 61
Antenna (n) 134
Aperture (n) 134
Applet (n) 104
Application (n) 42
Approximate (adj) 165
Architect (n) 5
Archive (n) 125
Argument (n) 165
Array (n) 104, 125
Assemble (v) 104
Assist (v) 22
Asynchronous (adj) 91
Attack (n) 81
Attenuation (n) 134
Authenticate (v) 81
Authorize (v) 81
Avatar (n) 61
Average (adj) 165
Axis (n) 165
B
Back (adj) 5
Back door (adj) 81
Backbone (n) 114
Backup (n) 125
Band (n) 141
Bandwidth (n) 114
Barcode (n) 22
221
Base (n) 166
Battery (n) 32
Beacon (n) 134
Beam (n) 141
Bear (v) 141
Behavior (n) 151
Best practices (n) 91
Beta test (n) 91
Binary (adj) 104
Biometric (adj) 92
BIOS (abbr) 45
Bit (n) 125
Blackout (n) 141
Block (v) 61
Blog (n) 61
Blogger (n) 5
Bluetooth (n) 32
Blu-ray (n) 125
Board (n) 32
Bold (adj) 14
Bookmark (n) 61
Boot (v) 45
Bootlegger (n) 70
Botmaster (n) 5
Braille (n) 22
Breach (n) 70
Break (v) 32
Breakthrough (n) 92
Bricks and clicks (n) 92
Bridge (n) 114
Broadcast (n) 114
Browse (v) 60
Buffer (n) 125
Bug (n) 104
Bullet (n) 14
BYOD (abbr) 22
Byte (n) 125
C
Cable (n) 114
Cache (v) 125
CAD (acr) Computer-aided design 151
Calculate (v) 166
Camera (n) 22
Capacity (n) 125
Card (n) 32
Carrier (n) 141
Case (n) 14
Cast (v) 60
Catalogue (n) 42
CD (acr) Compact disc 123
Cellular (adj) 141
222
Certificate (n) 81
Channel (n) 115
Channel integration (n) 92
Charge (v) 22
Chip (n) 32
Cipher (n) 81
Classified (adj) 81
Clickbait (n) 60
Clipboard (n) 14
Close (v) 14
Cloud (n) 92
Cluster (n) 42, 92
Cobot (n) 92
Code (n) 104
Code (n) 80
Coefficient (n) 166
Collision (n) 115
Combat (v) 70
Command (n) 102
Commit (v) 70
Community (n) 60
Compass (n) 134
Compatible (adj) 42
Compile (v) 14, 102
Comply (v) 70
Component (n) 33, 151
Compose (v) 102
Compress (v) 102, 123
Compromise (v) 80
Compute (v) 102
Computer (n) 32
Concept (n) 151
Condition (n) 103, 151
Confidential (adj) 80
Configuration (n) 33
Configure (v) 103
Connect (v) 22, 115
Constraint (n) 151
Consumer (n) 6
Content(s) (n) 60
Context (n) 43
Convert (v) 32, 123
Cookie (n) 60
Copy (v) 14
Copyright (n) 70
Correct (v) 14
Corruption (n) 80
Coupling (n) 134
Cover (v) 135
CPU (abbr) 33
Crack (v) 70
Crash (n) 33
223
Creep (v) 61
Crime (n) 70
Crowdfunding (n) 61
Cryptographer (n) 6
CTR (abbr) Clickthrough rate 60
Cube (n) 166
Customer (n) 6
Cutting-edge (adj) 92
Cyber (adj) 61
Cyberbullying (n) 70
Cybercide (n) 70
Cyberslacking (n) 71
Cybersquatting (n) 71
Cycle (n) 33
D
Damp (n) 135
Data (n) 123
Data diddling (n) 71
Decoder (n) 33
Dedicated (adj) 80
Default (n) 103
Degree (n) 166
Delay (v) 135
Delete (v) 15
Density (n) 135
Deny (v) 80
Derive (v) 166
Design (v) 43
Designer (n) 6
Desktop (adj) 43
Detect (v) 81, 141
Developer (n) 6
Deviate (v) 166
Device (n) 23
Diagram (n) 155
Dial-up (n) 115
Diameter (n) 166
Diffuse (v) 142
Digital (adj) 23, 81
Dimension (n) 155
Discrete (adj) 164
Disperse (v) 142
Display (n) 23
Disrupt (v) 81
Disseminate (n) 71
Distort (v) 142
Disturb (v) 135
Divide (v) 164
Domain (n) 115
Download (v) 123
Downtime (n) 33
224
Drive (n) 33
Driver (n) 43
DSL (abbr) Digital Subscriber Line 142
Duplex (adj) 115
Dynamic (adj) 155
E
E- (prf) 23, 61
Echo (n) 115
Edit (v) 15
Effect (n) 155
Efficient (adj) 155
Electron (n) 135
Embed (v) 43
Emission (n) 135
Emoticon (n) Emotion + icon 61
Emulate (v) 43
Encapsulate (v) 43
Encrypt (v) 80
Energy (n) 142
Engineer (n) 6
Engineering (n) 142
Enter (v) 15
Environment (n) 155
Equation (n) 164
Erase (v) 123
Error (n) 103
Ethernet (n) 115
Evaluation (n) 153
Event (n) 153
Execute (v) 104
Expand (v) 33
Experiment (n) 153
Expert (n) 6
Expire (v) 81
Exponential (adj) 164
Expose (v) 81
Exposure (n) 133
Extend (v) 123
F
Fail (v) 81
FAQ (acr) Frequently asked questions 61
Fault (n) 34
Fax (facsimile machine) (n) 23
Feed (v) 61
File (n) 15, 123
Filter (n) 81
Filter (v) 71
Finite (adj) 164
Firewall (n) 81
225
Flash (n) 123
Flash memory (n) 23
Flooding (n) 71
Flow (n) 116
FM (abbr) Frequency Modulation 133
Folder (n) 15
Follower (n) 6
Font (n) 15
Force (n) 153
Format (n) 15, 124
Formula (n) 164
Forum (n) 60
Forward (v) 15, 116
Fraction (n) 164
Fragment (n) 124
Framework (n) 116
Fraud (n) 71
Freelancer (n) 6
Frequency (n) 116
Function (n) 44, 164
G
Gadget (n) 23
Gamepad (n) 23
Geek (n) 6
Generate (v) 104, 142
Geotagging (n) 60
Google Glass (n) 23
H
Hacker (n) 71
Headset (n) 24
Highlight (v) 15
Host (n) 116
Hotspot (n) 116
Hub (n) 116
I
Icon (n) 44
Identity (n) 80
Identity theft (n) 71
IEEE (abbr) The Institute of Electrical and Electronics Engineers 142
Image (n) 15
Implement (v) 44
Import (v) 16
Indent (v) 16
Indicator (n) 143
Influence (v) 153
Innovate (v) 90
Input (n) 24
Insert (v) 16
226
Install (v) 44
Instruction (n) 104
Integer (n) 164
Integrate (v) 104
Integrity (n) 80
Intensity (n) 133
Interface (n) 44
Intrude (v) 80
Intruder (n) 70
ISP 7
Italic(s) (n) 16
Iteration (n) 44
J
Jacking (n) 70
Joystick (n) 34
K
Kernel (n) 45
Key (n) 34
Keylogging (n) 70
Keyword (n) 124
Knowledge (n) 90
L
Lamer (n) 6
Landline (n) 143
Language (n) 104
Laser (n) 34
Latency (n) 116
Launch (v) 45
Layer (n) 114
Layman (n) 7
Layout (n) 16
Lens (n) 24
Level (n) 133
Library (n) 124
License (n) 45
Life hacker (n) 90
Linear (adj) 165
Link (n) 60
Locate (v) 133
Log (v) 60
Log in/on (v) 80
Logarithm (n) 165
Loop (n) 102
LTE Long-Term Evolution (4G) 143
Lurker (n) 7
M
Manager (n) 7
227
Mail (n) 60
Maintain (v) 34, 102
Manipulate (v) 153
Manual (n) 102
Margin (n) 16
Master (n) 7
Measure (v) 153
Media (n) 61
Meme (n) 60
Memory (n) 34, 124
Menu (n) 45
Mobile (adj) 143
Model (n) 153
Modem (n) 34
Moderator (n) 7
Modify (v) 90
Modulate (v) 133
Monitor (n) 24, 34
Monitor (v) 61
Mount (v) 143
Mouse (n) 34
Mousetrapping (n) 70
Move (v) 16
MP3 (n) 24
Multi- (prf) 90
Multiply (v) 165
N
Nano (n) 90
Navigate (v) 61
Nerd (n) 7
Netbook (n) 24
Netizen (n) 7
Network (n) 114
Neural network 90
Newbie (n) 7
Next-generation (adj) 90
Noise (n) 114
Number (n) 165
O
Open source (n) 90
Operate (v) 35, 102
Operating System OS (abbr) 45
Operator (n) 7
Optical (adj) 24
Optimize (v) 154
Option (n) 16, 154
Oscillate (v) 133
Outcome (n) 165
Output (n) 24
228
Outsourcing (n) 90
Overwrite (v) 124
P
Package (n) 45
Packet (n) 114
Packet monkey (n) 70
Page (n) 124
Parameter (n) 154
Password (n) 61, 80
Paste (v) 16
Patch (n) 102
Pending (v) 16
Penetrate (v) 80
Period (n) 134
Periphery (n) 35
Pharming (n) 70
Phase (n) 134
Phishing (n) 71
Phracking (n) 70
Phreaking (n) 70
Piggybacking (n) 70
Piracy (n) 70
Pixel (n) 24
Platform (n) 35
Plotter (n) 25
Pointer (n) 46
Port (n) 35
Post (v) 61
Power (n) 143
Precise (adj) 165
Predict (v) 154
Preserve (v) 124
Printer (n) 35
Privacy (n) 80
Probability (n) 154
Procedure (n) 103
Process (n) 35
Process (v) 102
Program (v) 103
Programmer (n) 7
Projector (n) 25
Proof (adj) 91
Proofread (v) 16
Propagate (v) 143
Property (n) 165
Proportion (n) 154, 165
Proprietary (adj) 80
Protocol (n) 114
Prototype (n) 103
Provider (n) ISP 7
PTOYED (abbr) 25
229
Q
Quantum (n) 136
Quantum programming (n) 91
Query (n) 124
Queue (n) 145
R
R&D (abbr) Research and Development 91
Radio (n) 134
Ratio (n) 154, 166
Ray (n) 134
Real-time (adj) 91
Receiver (n) 114
Recognition (n) 91
Record (n) 124
Recover (v) 46, 124
Recursion (n) 103
Reduce (v) 166
Redundancy (n) 104
Reflect (v) 134
Register (v) 125
Regulate (v) 134
Relay (v) 134
Release (v) 46
Rely (v) 81
Remote (adj) 91, 143
Remove (v) 35
Repair (v) 35
Repairer (n) 8
Repeat (v) 36
Repudiation (n) 71
Resist (v) 135
Resolution (n) 25
Resonator (n) 143
Restore (v) 125
Restrict (v) 125
Result (n) 154
Retention (n) 125
Retina display (n) 25
Retrieve (v) 125
Reverse (v) 104
Risk (n) 81, 155
Roaming (n) 143
Robot (n) 91
Root (n) 166
Rotate (v) 36
Route (n) 115
S
Safety (n) 81
230
Salami theft/slicing (n) 71
Sample (n) 155
Satellite (adj) 144
Saturate (v) 144
Save (v) 16
Savvy (adj) 8
Scan (v) 36, 81
Scatter (v) 135
Scavenging (n) 71
Scientist (n) 8
Script (n) 46, 104
Second-hand (adj) 25
Secret (n) 81
Sector (n) 36
Secure (adj) 81
Select (v) 17
Sensitive (adj) 81
Sensor (n) 25, 144
Sequence (n) 144, 166
Server (n) 36, 115
Session (n) 115
Shape (n) 155
Shield (v) 144
Signal (n) 115, 135
Simplify (v) 155
Simulate (v) 155
Site (n) 60
Smart (adj) 25, 91
Social media (n, pl.) 91
Software (n) 46
Solar (adj) 144
Solution (n) 155
Sonde (n) 144
Space (n) 17
Spam (n) 60
Speakers (n) 25
Specialist (n) 8
Specification (n) 46
Spectrum (n) 135
Spoofing (n) 71
Spreadsheet (n) 17
Square (adj) 166
Stabilize (v) 135
Standard (n) 144
Statistical (adj) 155
Status (n) 60
Steal (v) 71
Store (v) 125
Stream (n) 60
Stroke (n) 17
Structure (n) 155
Subscribe (v) 125
231
Subscriber (n) 8
Subtract (v) 166
Surfer (n) 8
Swap (v) 25
Switch (n) 115
Synchronize (v) 135
System (n) 47, 156
T
Tablet (n) 26
Task (n) 47
Technician (n)
Tele- (prf) 92,145
Telecommunication (n) 115
Telecommuter (n)
Telephony (n) 115
Template (n) 17
Terminal (n) 115
Terminate (v) 135
Test (n) 104
Textese (n) 17
Thread (n) 61, 104
Threat (n) 81
Threshold (n) 135
Tolerant (adj) 92
Tool (n) 104
Topology (v) 116
Touch (v) 26
Trace (v) 60
Track (v) 125
Traffic (n) 145
Transition (n) 145
Transmit (v) 116
Trojan Horse (n) 71
Trolling (n) 71
Troubleshoot (n) 104
Troubleshooter (n)
Tune (v) 136
Tunnel (n) 145
Type (v) 17
U
Underscore (v) 17
Unit (n) 36
Update (v) 47
Upgrade (v) 26
Upload (v) 125
User (n) 8
Utility (n) 47
V
232
Valid (adj) 81
Value (n) 105, 166
Variable (n) 105
Velocity (n) 156
Vendor (n) 8
Verify (v) 166
Version (n) 48
Vibration (n) 145
View (v) 17
Viral (adj, n) 92
Virtual (adj) 61
Virus (n) 71
Volume (n) 156
Vulnerability (n) 82
W
Ware (n) 48
Wave (n) 136
Wearable (adj) 26
Web (n) 61
Webcam (n) 26
Widget (n) 48
Wiki (n) 61
Window (n) 48
Wireless (adj) 116
Wiretapping (n) 71
Wizard (n) 9
World Wide Web (n) 61
WORM (acr) Write Once Read Many 125
Worm (n) 71
233