Professional Documents
Culture Documents
English for
INFORMATION TECHNOLOGY
December 2021
nN
ii
PREFACE
In the era of globalization, it is crucial that students should be equipped with not
only the specialized knowledge but also the language communication skills prior to
their starting out on professional career. For that reason, “English for Information
Technology” is designed as an English for Specific Purposes (ESP) course for
information technology (IT) majors at the University of Transport Technology (UTT).
With the attempt to develop students’ English communication skills in the context of
information technology, the course introduces UTT’s undergraduate students to
fundamental IT knowledge together with a wide variety of language focuses related to
various topics in this area. Hopefully, the course will create opportunities for the
enhancement of students’ language skills (reading comprehension, listening
comprehension, speaking, writing, etc. ) in general, and those in IT field in particular.
The book “English for Information Technology” is tailored to build students’
terminology range in the IT field as well as their abilities to absorb IT texts, audios,
videos, write reports, deliver presentations, translate ESP materials, etc. It comprises
nine (9) topic-based units addressing significant concepts and aspects of IT industry
with clear, concise structured tasks. The book is featured by
- extensive vocabulary range that effectively supports students in comprehending
IT materials;
- diverse reading texts adapted from profound reliable sources;
- interactive video, listening activities that bring about interesting IT knowledge
- simulated speaking situations and ample opportunities to deliver presentations
- practical writing task that must be useful for students during their IT studies and
future careers
Notwithstanding compilers’ considerable effort, unintended shortcomings are
unavoidable. Therefore, all reader’s comments and contributions are welcome to
improve this book and make it an useful reference for IT students, teachers and
practitioners.
iii
iv
TEXTBOOK CONTENTS
CONTENTS DESCRIPTION TEXTS
PART 1 JOBS IN IT
PART 2 IT WORKPLACE
(P.9)
Further Advantages and disadvantages of • Is Information Technology a
working in IT industry Good Career Path?
reading
(P.10)
v
CONTENTS DESCRIPTION TEXTS
vi
CONTENTS DESCRIPTION TEXTS
UNIT 3 DATABASES
In this unit, students will be given an introduction to databases, types of databases and data
processing.
Speaking and Talking about advantages and • Relational Database Benefits and
disadvantages Limitations
writing
(P.38)
vii
CONTENTS DESCRIPTION TEXTS
viii
CONTENTS DESCRIPTION TEXTS
ix
CONTENTS DESCRIPTION TEXTS
UNIT 7 WEBSITES
In this unit, students will be given an overview pf website, types of website and webpage design.
x
CONTENTS DESCRIPTION TEXTS
xi
CONTENTS DESCRIPTION TEXTS
xii
WORKING IN THE
UNIT 1 INFORMATION TECHNOLOGY
INDUSTRY
PART I JOBS IN IT
STARTER
Task 1. Work in groups. List the IT jobs you know.
Web designer
Jobs in IT
Task 2. Read this team introduction. Complete the descriptions 1-4 with the IT job
in the box.
-1-
Database analyst IT support officer network administrator network architect
1. Sylvia is a ____________________________________
2. Isabelle is a ___________________________________
3. Andrew is an __________________________________
4. Mark and Latika are _____________________________
LISTENING
Task 1. (Track 1.1) Listen to six people introducing themselves. What jobs do they
do? Complete the sentences. Then compare answers with a partner.
database administrator helpdesk supervisor project manager
software developer support technician systems analyst
-2-
d. look______________computers
e. install______________
f. diagnose______________
h. design______________
i. maintain______________
j. write______________for software
Task 3. Work in pairs. What does each person in listening do in their job? Use the
collocations above.
E.g. An IT project manager is responsible for IT projects.
SPEAKING
Language work: expressing frequency
Time expression (once a week, from time to Pawel takes training courses two or
time, all the time, etc.) go at the beginning or end three times a year.
of the sentence
Student B: You are a software developer from Hipt Group. You are in charge of
designing and managing software programs, training users, maintaining and upgrading
existing software systems.
Suggested questions:
Greeting & introducing: Hello/ Hi/ How do you do/
My name….What’s your name?
I’m from……….(company’s name)
Nice to meet you…..
Asking about job: What do you do? What position do you hold at work?
What are your duties every day?
How often do you…..?
-3-
PART 2 IT WORKPLACE
READING 1
Task 1. Read the statement from the DataPro Inc. CEO. Then, mark the following
statements as true (T) or false (F).
F
1. __________The IT Department is increasing.
F
2. __________ Data Processing employees now encode data.
T
3. __________ Supervisors know the employees’ new assignments
4 Technical support
IT Department
Restructuring
1 Data processing DataPro Inc. is going, and so our
workload is increasing. But our IT
department is not dealing with this
increase effectively. So I am dividing the
IT department into three sections: Quality
assurance, data processing and
information security. The
responsibilities of each section are:
Quality Assurance
Testing hardware 5 Hardware
Providing technical support
2 Information security Data Processing
Writing code
Organizing data
Information security
Encoding online data transfers
Updating security software
These changes are not simple or easy. But
smaller groups deal with tasks more
effectively than larger ones. See your
supervisors for your new section
assignment.
6 Software
3 Online
Thomas Jenkins,
CEO DataPro Inc.
-4-
Task 2. Match the words (1-10) with the definitions (A-J).
1. _____ software a. Put secret information into code
2. _____ code b. the physical parts of a computer
3. _____ hardware c. connected to the Internet
4. _____ data processing d. numbers entered/held in a computer
5. _____ information security e. checking products for problems
6. _____ online f. the act of using information
7. _____ technical support g. programs/instructions added to computers
8. _____ data h. helping people use/understand technology
9. _____ quality assurance i. program language
10. _____ encoding j. the act of protecting information
SPEAKING
Task 1. Read the memo below and find words that match these definitions. Then
compare answers with a partner.
a. person in charge of IT______________
b. keeping something safe______________
c. information such as numbers and details about people______________
d. a secret word that you type into a computer before you can use it______________
e. a group of connected computers______________
f. having only letters and numbers______________
g. letters, numbers, punctuation marks, etc. ______________
h. people you work with______________
READING 2
Task 1. Working in pairs. Choose an IT company and list activities the company
carries out.
-6-
Adapted from English for Information technology 2
Task 2. Read the company profiles and find words that match these definitions.
a. a company or companies that sell things (Futachiba) _________
b. companies that make things to sell (Futachiba) _________
c. factories (Futachiba) _________
d. things a company sells (Futachiba) _________
e. using software that runs and stores information on the Internet (IBGroup) _________
f. customers (IBGroup) _________
g. start selling a new product (Digital World) _________
Task 3. Read the company profiles again and answer these questions. Then compare
answers with a partner.
Which company or companies:
a. is getting bigger?___________
b. develops software? ___________, ___________
c. makes things in more than one country? ___________
d. has a new product to launch? ___________
e. sells software for use on the internet? ___________
-7-
WRITING
Task 1. Complete the company description and job advertisement with the words in
box. Then, compare answers with a partner.
Client diagnosing from time to time installing launch
Maintaining provide service centers spreadsheet and database
supplies
-8-
Task 2. Look again at the company description and job advertisement. Which one of
these patterns do they follow?
a. a mixture of general and detailed information throughout
b. general information first and more detailed information later
c. more detailed information first and more general information later
d. only detailed information
Task 3. Write a job advertisement for an IT job you would like to work. Use pattern
you identified in task 2.
Suggested ideas:
- Search for the company’s information (possibly choose one of the three company in
READING)
- Write a brief description about the company (What the company specializes in, how the
employees are, what products and services the company offers, what the strong points of
the company are)
- Think about a proper job vacancy in the company (describe the features of the job, why
the job is needed, what people do in the job, etc).
- Find out the requirements for the job (qualifications, experience, skills, etc.)
- If possible, add information about benefits (salary, insurance, paid vacation and sick
time, holiday, etc.) and method of application (who to contact, how to contact, etc.)
TRANSLATION
Translate into Vietnamese.
1. The company is among the top five suppliers internationally of servers and among the
top ten manufacturers of laptop computers.
……………………………………………………………………………………………..
……………………………………………………………………………………………..
2. We have production facilities in six countries and we sell our products to almost every
country in the world. With service centers in all our major markets, we provide a very
high level of customer service.
……………………………………………………………………………………………..
……………………………………………………………………………………………..
……………………………………………………………………………………………..
3. Information technology (IT) professionals are responsible for helping organizations
maintain their digital infrastructure and providing troubleshooting assistance to technology
consumers.
……………………………………………………………………………………………..
……………………………………………………………………………………………..
……………………………………………………………………………………………..
4. IT employees are in demand to help others keep up with technological advances and
security procedures.
……………………………………………………………………………………………..
……………………………………………………………………………………………..
-9-
5. If you are interested in developing skills in programming and problem-solving, you may
consider a career in IT
……………………………………………………………………………………………..
……………………………………………………………………………………………..
FURTHER READING
Task 1. Read the following features, decide which ones are the advantages (pros) and
which ones are the disadvantages (cons) of working in IT industry.
a. Jobs in IT provide great job security
b. Time management is difficult
c. Jobs in the IT industry are stressful
d. Constant learning is required
e. Other people’s annoyance
f. Jobs in the IT industry are well paid
Task 2. Now, read the text, give each paragraph a title from task 1.
Like any other industry, IT is not some sort of perfection, and it has its own series
of advantages and disadvantages. To that end, we’ve put together a list of pros and cons, so
you can decide for yourself whether Information Technology careers are right for you.
(1)_________________
-10-
When it comes to computer and information technology jobs, the average wage is
way above the median annual wage for all other occupations. According to the Bureau of
Labor Statistics (BLS), the average annual wage for tech jobs in 2018 was $86,320. By
comparison, for all other industries, the average was at $38,640. Obviously, these salaries
will vary based on skill, seniority, and geographical location, but even an entry-level Help-
Desk professional can earn around the $38,000 mark.
(2) _________________
Stress will probably be part of the job description when working in IT If you’re in a
Help-Desk position, you’ll likely have to deal with all sorts of people who’ve already lost
their patience with their computers. Systems Administrators, Network Administrators, or
anyone who has anything to do with cybersecurity will also be under a great deal of stress.
The nature of their job will always keep them on high alert, while even the smallest mistake
can cause big problems. .
(3) _________________
The tech industry is growing at an accelerated rate. According to the same BLS data
from above, the number of IT jobs are projected to grow by 12% from 2018 to 2028. That’s
an additional 546,200 new jobs over the coming years. In the cybersecurity sector alone,
there is a global shortage of two million skilled professionals. Every year in the U.S.,
40,000 jobs for information security analysts go unfilled.
Because of this widening skill gap in cybersecurity, only 1% of organizations can
say that their security demands are met, while 85% find themselves understaffed. As such,
earning a certificate in information security can make you pretty hard to replace. And while
this sector is the most affected, all other IT occupations are in a similar position.
(4) _________________
An annoying part of working in the IT Industry that you’ll probably run into are your
coworkers who’ll likely ask you to fix all sorts of issues with their personal gadgets and
computers. It won’t really matter if this is part of your job description or not since less tech-
savvy people won’t be able to see the difference between the different technology careers
out there.
(5) _________________
Most IT jobs work on deadlines, which makes time management difficult as it is.
Another thing to keep in mind here is that security breaches, crashed servers, or other such
problems won’t keep track of your schedule. This means that you could be called upon to
deal with an emergency at any given moment, day or night. You’ll be similar to an on-duty
firefighter or paramedic in this regard.
(6) _________________
The IT industry is a quickly evolving organism. What is relevant today may become
obsolete tomorrow. Tech professionals are, therefore, required to constantly keep
themselves up-to-date on the latest trends and developments, learn new skills, and fall into
the common trap of thinking they know enough. Not even those in apparently stable
professions, like health care or human resources, can afford to stagnate, let alone people in
tech
-11-
UNIT 2 COMPUTER SYSTEMS
-12-
g. ___________________ h. ___________________ i___________________
Task 3. Look at the following assembly instructions. Answer the questions beside
them.
READING
Task 1. Read the text and then explain the diagram in your own words.
What is a computer?
-14-
Input Processing Output
Data is collected and entered Data is manipulated The results are shown on the
monitor or print form
Storage
Files and programs are held on disk
Balance
Expenses
(E.g.
payroll,
services,
Publicity)
Income
(E.g.
sales,
Stocks,
Interest)
Task 2. Match these words from the text (1-9) with the correct meanings (a-i).
1. Software a. The brain of the computer
2. Peripherals b. Physical parts that make up a computer system
3. Main memory c. Programs which can be used on a particular computer
4. Hard drive (also known system
as hard disk) d. The information is presented to the computer
5. Hardware e. Results produced by a computer
6. Input f. Input devices attached to the CPU
7. Ports g. Section that holds programs and data while they are
8. Output executed or processed
9. Central processing unit h. Magnetic device used to store information
(CPU) i. Sockets into which an external device may be connected
Task 3. Read the text again and answer the following questions.
a. When does a computer process the instructions?
_____________________________________________________________________
b. What are hardware and software?
_____________________________________________________________________
c. How many types of hardware are in a computer system? What are their functions?
_____________________________________________________________________
-15-
d. How can devices connect to a computer?
_____________________________________________________________________
e. According to the reading, one change in the modern design of a computer is mentioned,
what is that? What do you think about the change?
_____________________________________________________________________
_____________________________________________________________________
LISTENING
Task 1. (Track 2.1) Watch the video and answer the following questions.
a. What are some examples of computers?
_____________________________________________________________________
b. What exactly is a computer?
_____________________________________________________________________
c. How do the computer make a photo, movie, etc.?
_____________________________________________________________________
d. How can hardware and software be defined?
_____________________________________________________________________
e. List all types of computers you can see.
_____________________________________________________________________
-16-
Computers use a combination of (8)____________ and software. Hardware is any
physical part of the computer which includes the internal components and the
(9)____________ parts like the monitor and keyboard.
Software is any set of (10)____________ that tells the hardware what to do such as
a web browser media player or word processor.
Task 3. Label the pictures (a-e) with words from the box.
Mainframe PDA
Task 4. (Track 2.2.) Listen to a recording and decide whether these sentences are true
or false. Correct the false ones.
a. ____________A mainframe computer is less power full than a PC.
b. ____________A mainframe is used by large organizations that need to process great
amount of data.
c. ____________The most suitable computers for home use are desktop PCs.
d. ____________A laptop is not portable
e. ____________Laptops are not as powerful as desktop PCs.
f. ____________Using a stylus, you can write directly onto the screen of a tablet PC.
g. ____________A Personal Digital Assistant is small enough to fit into the palm of your
hand.
h. ____________A PDA does not allow you to surf the Web.
-17-
PART 2 COMPUTER HARDWARE
VOCABULARY
Label the elements of this computer system. Then compare your answers with those
of your partner.
LISTENING
Task 1. (Track 2.3) Watch a video introducing types of hardware and answer the
questions after it.
Task 2. Work in pairs. Match the items in Column A with their function in Column
B. Then describe their function.
A. Item B. Function
1. RAM a. Controls the cursor
2. Processor b. Inputs data through keys like a typewriter
3. Mouse c. Displays the output from a computer on a screen
4. Clock d. Reads DVD-ROMs
5. 3.5” floppy drive e. Reads and writes to removable magnetic disks
6. Monitor f. Holds instructions which are needed to start up the computer
7. Keyboard g. Holds data read or written to it by the processor
8. DVD-ROM drive h. Provides fast access for sections of a program and its data
9. Cache i. Controls the timing of signals in the computer
10. ROM k. Controls all the operations in a computer
Task 3. (Track 2.4) Now, listen to a technician describing the motherboard to a new
trainee. Match these words to A-G in the photo below.
-18-
LANGUAGE WORK
We can describe the function of an item in some ways. Study these examples.
- Using the Present simple
ROM holds instructions which are needed to start up the computer
- Used to-infinitive, Used for + -ing form
ROM is used to hold instructions which are needed to start up the computer
ROM is used for holding instructions which are needed to start up the computer
- Emphasizing the function
The function of ROM is to hold instructions needed to start up the computer
Task 4. Work in pairs. Who might use each of the items in 2? What might they use them
for?
WRITING
Task 1. Read this email quickly. What does Kamal want to do?
-20-
PART 3 COMPUTER SOFTWARE
LISTENING
Task 1. Work in small groups.
a. Make a list of all the computer software you use in your work or study.
b. How are computer software classified?
c. Look at the pictures below, what kind of software are they?
Task 2. (Track 2.5) Now, watch the video about types of software. Watch for the first
time and fill in the diagram with suitable words.
COMPUTER SOFTWARE
(1)……………………………………………… (2)………………………………………………
(3)………………………………………… (4)………………………………………
Task 3. Look at the icons below, write the name of the icons, then arrange them in
proper categories. Then, watch the video again and check.
-21-
Application software Operating system Utility software
SPEAKING
In pairs, find out as much as you can about the software your partner uses at home or
at school. Ask about spreadsheet programs, databases, word processors, video
conferencing, business accounting, email, and web browsers. Look at the Useful
language to help you.
Useful language
- What kind of spreadsheet program do you use?
- What do you use it for?
- Do you use it at home or at work?
- What’s your favorite…?
- What features do you like most about it?
- How do you…?
-22-
PART 4 OPERATING SYSTEM
READING
Task 1. Match the labels to the four layers of this diagram with the help of the
diagram caption
(1) applications programs
(2) user
(3) hardware
(4) operating system
Task 2. Read the following Memo and circle the correct answer below it.
MEMO
To: All Employees
From: IT Supervisor
Subject: OS Update
Date: 27 May
All company computers in the Melbourne and Victoria offices require an
update to the operating system. This update will prepare our computers
for the new version of our accounting software, which should arrive in
the first Week of July. Technicians will install the new operating system
beginning on 3 June. We expect the process to be completed around 16
June, providing time to work out any bugs with the operating system
before the accounting software is uploaded.
Completing the entire process will require you to log in so that we can
verify the system is working as anticipated. Therefore, if you plan to go
on holiday during this period, please inform IT Support immediately of
the dates you will be out so that we can plan an alternate date to
accommodate your schedule.
If you have any questions, please contact IT Support staff at extension 48.
Adapted from Toeicexamstore.com
-23-
1. When is the installation of the operating system expected to be finished?
A. in the first week of June
B. In the middle of June
C. At the end of June
D. In the first week of July
During the process, the computer will restart by itself several times.
Near the end of the process, you can partition the hard drives.
In the BIOS, set the first boot drive to DVD. Then reboot again.
At the end of the process, the operating system will ask for the product
key, time, date, network type and details for user accounts.
First, put the installation DVD into the optical drive. Then reboot the
computer while you press the “F2” key. The BIOS will now start.
This time, the computer will boot from the DVD and installation will
begin.
1 Before you start, back up everything.
Near the start of the process, it will ask you to agree to the license term
WRITING
This description of the Mac OS X is drawn from the table below. Write a similar
description of Linux.
-24-
Criteria Mac OS X Linux
type Unix-based Unix-based
computer Apple Mac wide variety
features memory-protection, pre-emptivemulti- variety of
tasking, symmetric multiprocessing distribution kits
support available
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
-25-
TRANSLATION
1. A computer is an electronic machine which can accept data in a certain form, process
the data, and give the results of the processing in a specified format as information.
………………………………………………………………………………………………
………………………………………………………………………………………………
2. The role of the operating system is to communicate directly with the hardware.
………………………………………………………………………………………………
………………………………………………………………………………………………
3. One task of the supervisor program is to load into memory non- resident programs as
required.
………………………………………………………………………………………………
………………………………………………………………………………………………
4. The success or failure of any computer system depends on the skill with which the
hardware and software components are selected and blended.
………………………………………………………………………………………………
………………………………………………………………………………………………
5. A mainframe is used by large organizations that need to process great amount of data.
………………………………………………………………………………………………
………………………………………………………………………………………………
6. A computer system consists of two parts: hardware and software. Hardware is an
electronic or mechanic part you can see or touch. Software is a set of instructions, called a
program, which tells the computer what to do
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
-26-
UNIT 3 DATABASES
STARTER
Task 1. Fill in the gaps.
Record Sort Database Search Fields
READING 1
Task 1. Look at the illustration, which represents a database file. Can you identify a
record and a field?
-27-
Task 2. Read the text and check your answer to task 1.
Databases
A database is a collection of related data, and the software used in databases to store,
organized and retrieve the data is called the Database management system, or DBMS.
However, we often use the word database to cover both meanings. A database can manage
any type of data, including text, numbers, images, sound and video and hyperlinks (links to
websites).
Information is entered into the database via fields. Each field holds a separate piece
of information, and the fields are grouped together in records. Therefore, a record about an
employee might consist of several fields which give their name, address, phone number,
date of birth, salary and length of employment with the company.
Records are grouped together into files which hold large amounts of information.
Files can easily be updated- you can always change fields, add new records or delete old
ones. An electronic database is much faster to consult and update than a card index system
and occupies a lot less space. With the right software, you can keep track of stock, sales,
market trends, orders and other information that can help your company stay successful.
A database program lets you create an index- a list of records ordered according to
the content of certain fields. This helps you to search the database and sort records into
numerical or alphabetical order very quickly. Modern databases are relational- that is, they
are made up of related files: customers and orders, vendors and purchases, students and
tutors, etc. Two database files can be related as long as they have a common field. A file of
students, for example, could include a field called Tutor ID and another file with details of
tutors could include the same field. This key field can be used to relate the two files.
Databases like Oracle, DB2 and MySQL can manage these relationships.
A database query function allows you to extract information according to certain
conditions or criteria. For example, if a managing director wanted to know all the customers
-28-
that spend more than €8,000 per month, the program would search on the name field and
the money field simultaneously.
The best database packages also include network facilities, which can make
business more productive. For example, managers of different departments can have direct
access to a common database. Most aspects of the program can be protected by user-defined
passwords and other security devices. For example, if you wanted to share an employee’s
personal details but not their commission, you could protect the commission field.
Adapted from https://slideplayer.com/slide
Task 3. Answer the following questions.
1. What does DBMS stand for?
_____________________________________________________________________
2. What types of data can a database manage?
_____________________________________________________________________
3. How is Information entered into the database?
_____________________________________________________________________
4. What can be done to update files?
_____________________________________________________________________
5. What is an index?
_____________________________________________________________________
6. When can two database files be related?
_____________________________________________________________________
7. What would the program do if a managing director wanted to know all the customers
that spend more than €8,000 per month?
_____________________________________________________________________
-29-
9. Security i. to look for information on a computer, the
Internet, etc.
10. Search k. the protection of information against
being stolen or used wrongly or illegally.
LISTENING
Task 1. Planning the database is an important step. A well planned database design is
crucial for building a robust database that meets user data requirements. Work in
pairs, try to match the steps in Database Design Planning Process with their planning
activities.
1. Step 1 a. Mapping Business Processes, Rules and Policies.
2. Step 2 b. Defining the User Data Requirements.
3. Step 3 c. Defining the Database Objectives.
4. Step 4 d. Creating Data Models.
5. Step 5 e. Defining the Database Requirements Specifications.
6. Step 6 f. Database Normalization.
7. Step 7 g. Database Design Team and Stake holders.
8. Step 8 h. Creating Conceptual Data Model.
-30-
9. Step 9 i. Creating Logical Data Model.
Task 3. (Track 3.1) Watch a video about Database Normalization and check the
answers to task 2.
Task 4. Watch the video again and complete the talk by choosing ONE of the words
in the box below.
decomposing enrolled invented root multiple
redundant solution present duplicate entity
READING 2
Task 1. There are various types of databases used for storing different varieties of
data. In groups of three or four, complete the following diagram.
Task 2. Read the first paragraph of the text and answer the following questions.
1. How are databased closely defined?
2. What is a database system referred to?
Introduction to Types of Database
Basically databases are data warehouses. Since we also have a book store in a public
library, we can assume that a database of books is a library. However, closely defined,
databases are computer frameworks which store, organize, protect and supply data. A
database system is referred to as a system for the management of a database or DBM.
-32-
1. Distribution Database
In comparison to the centralized database idea, there are inputs from the general
database and the information collected from local computers. The data is not accessible in
a single location and is distributed to various company sites. These sites are connected to
each other through communication links that enable access to the data distributed.
A distributed database in which various parts of a database are located in different
physical locations along with databases replicated and distributed between different points
in a network can be imagined. Heterogeneous and homogenous are the two kinds of
distribution database. Databases with the same base hardware and running on the same
operating systems and applications are known as homogeneous DDBs. In different sites of
the DDB defined as a heterogeneous DDB, operating systems, the underlying hardware and
application procedures can be different.
2. Relational Database
Such databases are classified by a set of tables, in which data falls into a predefined
classification. The table is made up of rows and columns with data input for a certain
category and rows, with the example of the data identified by the category. The Structured
query language is the standard interface of a relation-database user and application
program. There are several basic operations which can be added to a table that enables the
expansion of these databases, joining two commonly-related databases and modifying all
existing applications.
3. Object Oriented Database
An object-driven database is an object-driven and relational database collection.
There are different items, such as java, C++, that can be saved in a relational database using
object-oriented programming languages, but object-oriented databases are suitable for these
components. An object-oriented database will be organized instead of actions around
objects and data instead of logic. In contrast to an alphanumeric value, for example, a
multimedia record in a relational database can be a definable data object.
4. Cloud Database
Nowadays, data are actually stored in a public cloud, a hybrid cloud or a private
cloud, also known as a virtual environment. A cloud database is an automated or built-in
database for such a virtualized environment. A cloud service offers various advantages,
including the ability to pay per user storage capacity and bandwidth and provides scalability
on request, as well as high availability. In addition, a cloud platform allows companies to
support enterprise applications in the delivery of software as a service.
5. Centralized Database
The data is stored centrally and users from various locations can access this data.
This database includes hiring processes that help users even from a remote location to
access the data. For verification and validation of end-users, various types of authentication
procedures are applied, and the application processes keeping a track and record of data
utilization also provide registration numbers.
6. End User Database
The end-user is generally not worried about purchases or transactions at different
levels and only understands the commodity that is a program or application. It is, therefore,
-33-
a collaborative database that is designed specifically for the end-user as do the managers at
various levels. This database offers a list of all the details.
7. NoSQL Database
These are used for large data sets. There are certain big data performance problems
that are handled effectively by relational databases, and NoSQL databases can easily
address such problems. The analysis of large-size, unstructured information can be done
very efficiently on several cloud virtual servers.
8. Commercial Database
These are the paid versions of the enormous databases, designed for users who wish
to access the information for assistance. These databases are specific subjects and such huge
information cannot be maintained. Commercial links provide access to such databases.
9. Personal Database
Data is collected and stored on small and easily manageable personal computers.
The data are usually used by the same company department and are viewed by a small
number of individuals.
10. Operational Database
In this folder, information on a company’s operations is stored. These databases are
needed for functional lines such as marketing, employee relationships, customer service,
etc.
Adapted from https://www.matillion.com/resources/blog/the-types-of-databases-with-examples
Task 3. Read the text and decide the following statements are True (T) or False (F).
a.____________ Heterogeneous and homogenous are the two kinds of Relational
database.
b.____________ An object-oriented database will be organized instead of actions
around objects and data instead of logic.
c.____________ A cloud platform allows companies to support enterprise applications
in the delivery of hardware as a service.
d.____________ The analysis of large-size, unstructured information cannot be done
very efficiently on several cloud virtual servers.
e.____________ Data is collected and stored on small and easily manageable personal
computers.
Task 4. Match the terms with their appropriate definitions or explanations.
1. Homogeneous DDBs a. is an automated or built-in database for such a virtualized
environment
2. The Structured query b. are needed for functional lines such as marketing,
language employee relationships, customer service.
3. A cloud database c. a collaborative database that is designed specifically for
the end-user as do the managers at various levels.
4. Operational Database d. databases with the same base hardware and running on
the same operating systems and applications.
5. End User Database e. is the standard interface of a relation-database user and
application program.
6. Centralized Database f. are used for large data sets.
-34-
7. NoSQL Database g. The data is stored centrally and users from different
locations can access this data,
LANGUAGE FOCUS
Asking people to do things
Could you help me, please?
Sure.
Please could you help?
We can use can/could/would No problem.
you + infinitive without to when Can you explain what a database is, please?
we ask somebody to do I’m afraid I can’t.
something for us. Please can you explain what a database is?
I’m sorry, I can’t.
Would you explain that, please?
Could you come back a bit later? I’m busy right now.
-35-
PART 2 DATA PROCESSING
VOCABULARY
Match the headings in the box to the data processing steps a-f.
data coding data collection data entry data sorting
data tabulation data validation
LISTENING
Task 1. Put the data processing steps in Vocabulary into the correct order.
Task 2. (Track 3.2) Listen to an IT expert describing the data processing steps to a
colleague. Check your answers to task 1.
Task 3. (Track 3.3) Listen and mark the syllable stress in these nouns and verbs. Then
listen again and repeat the words.
1. entry 7. gather
2. collection 8. create
3. tabulation 9. arrange
4. validation 10. enter
5. sorting 11. double-check
6. coding 12. format
-36-
SPEAKING
Task 1. Pair works: Explain the data processing steps from Vocabulary in your own
words.
Task 2. Look at the examples of database software below. What database software do
you know? What is it used for?
-37-
SPEAKING AND WRITING
Task 1. Work with a partner to read the advantages and disadvantages of Relational
Database and prepare a five-minute presentation explaining those advantages and
disadvantages. Give your presentation to the class.
Making presentation:
+ Introducing yourself and your talk + Referring to visual
For those who don’t know me, my name As you can see in this slide,…
is… This (next) slide/ transparency show…
I’m here today to talk about/ tell you + Concluding
something about… To sum up…
I’m going to speak about… In conclusion…
Feel free to ask questions as we go I’d just to repeat my main points.
along. Are there any questions?
There’ll be time for questions at the end.
+ Structuring the presentation
Firstly/ Secondly/ Thirdly/ Finally…
Let’s now look at…
Moving on, I’d like to say something
about…
-38-
Now we come to…
That brings me to my next point.
I think that covers everything about…
7 – Security
Data is secure as Relational Database
Management System allows only
authorized users to directly access the
data. No unauthorized user can access
the information.
Task 2. Basing on the information given in Task 1, write a paragraph about the
advantages and disadvantages of Relational Database.
Useful structures:
Topic sentence:
- It is believed that …….has its own advantages and disadvantages.
-40-
OR
- This paragraph will present the benefits and drawbacks of…
Supporting ideas: Advantages Supporting ideas: Disadvantages
- - It can be said that…….has some positive - On the other hand, there are a number
effects. of disadvantages of…….that people
should take into consideration.
- Despite these aforementioned benefits,
several drawbacks do exist.
OR However, …….is not completely
benefit, there are several negative
aspects that should be taken into
consideration.
- The main/most important advantage/benefit• - The main/most/serious disadvantage of
of…….is that……. …….is …….
- One/ Another/ An ad ditional advantage • - One/An additional disadvantage of
of…….would be……. …….would be …….
Your writing
-41-
TRANSLATION
Translate the following sentences into Vietnamese.
1. Basically databases are data warehouses. Since we also have a book store in a public
library, we can assume that a database of books is a library.
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
2. In different sites of the DDB defined as a heterogeneous DDB, operating systems, the
underlying hardware and application procedures can be different.
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
3. There are several basic operations which can be added to a table that enables the
expansion of these databases, joining two commonly-related databases and modifying all
existing applications.
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
4. A cloud service offers various advantages, including the ability to pay per user storage
capacity and bandwidth and provides scalability on request, as well as high availability.
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
5. There are certain big data performance problems that are handled effectively by relational
databases, and NoSQL databases can easily address such problems.
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
-42-
UNIT 4 ARTIFICIAL INTELLIGENCE
VOCABULARY
Match these words with the definitions.
LISTENING 1
Task 1. (Track 4.1) Listen to a short talk about Artificial Intelligence, then fill in the
blank with ONE suitable word.
Artificial intelligence, or AI, is any type of (1) _____________ that can learn how to do
tasks on its own. Artificial intelligence is starting to become very (2) _____________ in
everyday life. Phones and tablets often come with (3) _____________ digital assistants.
Streaming platforms use AI to recommend content to their users. The type of AI we have
today is called narrow AI, which means it can only perform very specific tasks. Researchers
are trying to create something called general AI, which would be able to think and learn
like a human. But many scientists are concerned about the (4) _____________ digital
assistants. An extremely intelligent computer would be very good at accomplishing its (6)
_____________, but it might not care very much about human life.
Adapted from https://builtin.com/artificial-intelligence
Task 2. Listen again and choose the best answer.
-43-
A. Narrow AI
B. General AI
C. Simple AI
2. General AI would be able to
A. recommend content to people
B. perform some specific to people
C. think like a human
3. Some scientists are concerned about AI because
A. It might not care about human life.
B. It might start to hate humans
C. It might not be good at accomplishing goals
READING 1
-45-
7. trial and error g. the arrangement of words and phrases to create well-formed
sentences in a language
8. infusing h. to examine casually
9. bot i. information retained in the brain and retrievable from it over a
brief span of time
10. search engine j. the process of experimenting with various methods of doing
something until one finds the most successful
11. syntax k. to be the person who makes all the important decisions and
who has the most power in a situation.
12. short-term l. a predetermined set of instructions for solving a specific
memory problem in a limited number of steps
13. algorithm m. violent anger caused by the stress and frustration involved in
driving a motor vehicle in difficult conditions
Task 2. Use the words and phrases below to fill in the blank spaces; some word forms
need to be changed.
1. Artificial Intelligence is slowly making progress, but it could soon ____________ into a
new trend in technology.
2. If you want to ____________ your ____________ of learning English, you will have to
study a lot.
3. Many computer scientists are now trying to ____________ ____________ how
computers can learn to think like humans.
4. Many movies have been produced about robots ____________ ____________ on
humanity.
5. Many people suffer from insomnia, which is simply sleep ____________.
6. People today are ____________ ____________ ____________ of the rising technology
of Artificial Intelligence.
7. There are many different branches of Artificial Intelligence. It is a ____________ field.
8. To ____________ a language usually takes many years of study and exposure to the
language.
9. We learn many lesson from our mistakes. We all learn by ____________ ____________
____________.
10. You can ____________ Artificial Intelligence into 6 major branches: robotics, vision
systems, natural language processing, learning systems, neural networks and expert
systems.
-46-
Task 3. Read the text again and then answer the following questions.
1. Do many people today interact with artificial intelligent?
________________________________________________________________________
________________________________________________________________________
2. What is AI?
________________________________________________________________________
________________________________________________________________________
3. How long has Artificial Intelligence been around?
________________________________________________________________________
________________________________________________________________________
4. What has happened to AI during the last few years?
________________________________________________________________________
________________________________________________________________________
5. What has caused AI to have the ability to improve so much in recent years?
________________________________________________________________________
________________________________________________________________________
6. What is a bot?
________________________________________________________________________
________________________________________________________________________
7. What advantages does machine learning have over human learning?
________________________________________________________________________
________________________________________________________________________
8. What advantages does human learning have over machines?
________________________________________________________________________
________________________________________________________________________
9. What functions can Watson (IBM’s computer) perform?
________________________________________________________________________
________________________________________________________________________
10. Do you think Robots will eventually take over the world? What is a more likely problem
humans will face in the future if AI becomes the next big thing?
________________________________________________________________________
________________________________________________________________________
______________________________________________________________________
VOCABULARY
1. Guess the meaning of these AI apps.
facial recognition
-47-
2. Match these words with the pictures.
1. 2.
3. 4.
5.
6.
-48-
7.
8.
9.
LISTENING 2
(Track 4.2) Listen to some people talking about the benefits and disadvantages of the
above artificial intelligence apps. Then, write notes for their benefits or disadvantages.
The first example has been done for you.
AI apps Benefits Disadvantages
Facial recognition - good - had problem when
(Face ID) - improve safety and security wearing mask
Digital assistant - -
(Alexa)
Auto complete - -
Online shopping - -
recommendation
-49-
The robot floor - -
cleaner
Translation apps - -
Chatbot - -
Speech-to-text - -
SPEAKING
Work in group, ask and answer these questions. You should use the useful language
recommended below.
1. Which AI apps is the most interesting for you? Why?
2. Which AI app do you use most often? Why do you use it?
3. Which AI app is the most annoying? Explain
4. Which AI app do you never use? Why?
5. What would be the dream AI app for you? Use your imagination?
USEFUL LANGUAGE
Well, my most interesting AI app is..........
I think ..... is fantastic, it can help you....
You can ......
It saves a lot of time and energy
It is so useful when you ....
I think it is quite stupid ....
WRITING
Base on the suggestions given below, write a paragraph about the benefits and the
limitations of artificial intelligence.
Examples:
-50-
- One of the main advantages of Artificial Intelligence is that it can significantly
reduce errors and increase accuracy.
- A major drawback of AI is that can cost a great amount of money.
Your writing
READING 2
Robots smarter than humans by 2029
A scientist said robots will be more intelligent than humans by 2029. The scientist’s
name is Ray Kurzweil. He works for Google as Director of Engineering. He is one of the
world’s leading experts on artificial intelligence (AI). Mr Kurzweil believes computers will
be able to learn from experiences, just like humans. He also thinks they will be able to tell
jokes and stories, and even flirt. Kurzweil’s 2029 prediction is a lot sooner than many
-51-
people thought. The scientist said that in 1999, many AI experts said it would be hundreds
of years before a computer was more intelligent than human. He said that it would not be
long before computer intelligence is one billion times more powerful than the human brain.
Mr Kurzweil joked that many years ago, people thought he was a little crazy for
predicting computers would be as intelligent as humans. His thinking has stayed the same
but everyone else has change the way they think. He said: “My views are not radical any
more. I’ve actually stayed consistent. It’s the rest of the world that’s changing its view.” He
highlighted examples of high-tech things we use, see or read about every day. These things
make us believe that computers have intelligence. He said people think differently now:
“Because the public has seen things like Siri (the iPhone’s voice-recognition technology)
where you talk to a computer; they’ve seem the Google self-driving cars.”
Adapted from The Daily Mirror/ The Japan Times
Task 1. Read the text and decide whether these statements are True (T) or False (F).
1. _______This research is conducted by a scientist from Google.
2. _______The article says the scientist is an expert on jokes around the world.
3. _______Many people talk robots would be smarter than humans in 1999.
4. _______The scientist believes computers will be a billion times smarter than us.
5. _______Most people now think about robots more like the scientist does.
6. _______The scientist said his views about robots are more radical than ever.
7. _______The scientist said our everyday things show us computer intelligence.
8. _______The article says Siri is the name of Google’s self-driving cars.
-52-
TRANSLATION
Translate these sentences into Vietnamese.
1. For decades, humanity envisioned and dreamed of a technology-enabled future. One with
autonomous transportation, flying vehicles, a clean and safe environment and a healthy,
extended life.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
2. Although Artificial General Intelligence (machines that compare to or surpass the human
mind) still belongs in the distant future, researchers believe that machines are gradually
approaching human levels when performing simple tasks, such as understanding naturally
spoken language or evaluating unknown, new situations.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
3. One of the most common applications of AI today is speech recognition. The biggest
breakthrough in speech recognition thus far has come from IBM, which has managed to
reduce the error rate in conversational speech recognition to 5.5% (relative to the human
error rate is of 5.1%).
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
-53-
FURTHER READING
Artificial Intelligence May Doom The Human Race Within A Century
An Oxford philosophy professor who has studied existential threats ranging from
nuclear war to superbugs says the biggest danger of all may be superintelligence.
Superintelligence is any intellect that outperforms human intellect in every field, and Nick
Bostrom thinks its most likely form will be a machine -- artificial intelligence.
There are two ways artificial intelligence could go, Bostrom argues. It could greatly
improve our lives and solve the world's problems, such as disease, hunger and even pain.
Or, it could take over and possibly kill all or many humans. As it stands, the catastrophic
scenario is more likely, according to Bostrom, who has a background in physics,
computational neuroscience and mathematical logic.
"Superintelligence could become extremely powerful and be able to shape the future
according to its preferences," Bostrom told me. "If humanity was sane and had our act
together globally, the sensible course of action would be to postpone development of
superintelligence until we figure out how to do so safely."
Bostrom, the founding director of Oxford's Future of Humanity Institute, lays out
his concerns in his new book, Superintelligence: Paths, Dangers, Strategies. His book
makes a harrowing comparison between the fate of horses and humans. Horses were
initially complemented by carriages and ploughs, which greatly increased the horse's
productivity. Later, horses were substituted for by automobiles and tractors. When horses
became obsolete as a source of labor, many were sold off to meatpackers to be processed
into dog food, bone meal, leather, and glue. In the United States, there were about 26 million
horses in 1915. By the early 1950s, 2 million remained.
The same dark outcome, Bostrom said, could happen to humans once AI makes our
labor and intelligence obsolete. It sounds like a science fiction flick, but recent moves in
the tech world may suggest otherwise. Earlier this year, Google acquired artificial
intelligence company DeepMind and created an AI safety and ethics review board to ensure
the technology is developed safely. Facebook created an artificial intelligence lab this year
and is working on creating an artificial brain. Technology called "deep learning," a form of
artificial intelligence meant to closely mimic the human brain, has quickly spread from
Google to Microsoft, Baidu and Twitter. (...) In an interview about his book Bostrom points
out that there are few people working full time on AI control problem. They need more
brilliant brains to this technical work. His hope is that his book will do something to
encourage that. ‘How to control super-intelligent AI is really the most important task of our
time -- yet, it is almost completely ignored.’ says Bostrom.
Adapted from: http://www.huffingtonpost.com
Read the article and choose the correct answer.
1. Superintelligence
A is a substitute for the human intellect.
B will possibly take form of a machine.
C is a machine replacing the human intellect.
D is any intellect which is better than the human one in some fields.
2. According to Bostrom artificial intelligence
A is going to kill all the humanity.
B will probably do us more good than harm.
-54-
C could be a solution for major problems.
D improves the humanity’s intelligence.
3. Bostrom’s advice is
A to stop developing superintelligence for good.
B for people to join forces and improve superintelligence.
C the best way would be to give up developing superintelligence.
D to find some ways of controlling the superintelligence
4. The problem with the horses was that
A they were not productive any more.
B they were more useful for humanity for their meat than for their labor.
C they were a source of labor for meatpackers.
D their labor was taken over by cars.
5. Bostrom says
A controlling the AI is an urgent problem which is being ignored.
B the main task is to control brilliant brains.
C more intelligent people are needed to overtake the AI’s work.
D his book will bring the change in controlling the AI.
-55-
UNIT 5 NETWORK SYSTEMS
VOCABULARY
Match these types of computer networks with the pictures.
22.
1.
3.
4.
-56-
5.
LISTENING 1
Agatha is the owner of a small flower shop. Katharina is a network architect. Agatha
needs some advice from Katharina about a network solution for her company.
-57-
box.
SPEAKING
Work in group, look at the pictures below and discuss these questions. Which
network solution would you recommend for a large corporation or organization, a
small business and a family home? Why?
-58-
USEFUL LANGUAGE
I’d recommend LAN for used within households or a single building.
Typically, it includes one router, that all the computers in the network use to access the
internet. It also includes a file server; this is the computer that hosts the network.
READING 1
Warm-up
Match the words of network devices with the pictures.
Computer network
-59-
What is a computer network?
-60-
• CAN (campus area network): A CAN is also known as a corporate area network.
A CAN is larger than a LAN but smaller than a WAN. CANs serve sites such as
colleges, universities, and business campuses.
• VPN (virtual private network): A VPN is a secure, point-to-point connection
between two network end points. A VPN establishes an encrypted channel that
keeps a user’s identity and access credentials, as well as any data transferred,
inaccessible to hackers.
The exchange of information in a network is controlled by communications
protocols, which define the formats and rules that computers must follow when talking to
one another.
Well-known communications protocols are Ethernet, which is a family of protocols
used in LANS, and the Internet Protocol Suite, which is used in any computer network.
Computer networks offer many advantages. For example, they facilitate communication,
allowing people to send emails and texts, make phone/ video calls and videoconference.
Furthermore, networks allow people to share files, data and other types of information as
users may access data and information stored on other computers in the network.
On the other hand, networks may be difficult to set up and may be insecure as computer
hackers can send viruses or computer worms to the net computer. They may also interfere
with other technologies, as power line communication strongly disturb certain forms of
radio communication and access technology such as ADSL.
Adapted from https://www.javatpoint.com/types-of-computer-network
Task 1. Read the text and then answer the following questions.
1. What does a computer network consist of
________________________________________________________________________
________________________________________________________________________
___________________________________________________________________
2. What is the purpose of a computer network?
________________________________________________________________________
________________________________________________________________________
3. How can you build a computer network?
________________________________________________________________________
________________________________________________________________________
4. What is a router?
________________________________________________________________________
________________________________________________________________________
5. What is the function of communication protocols?
________________________________________________________________________
________________________________________________________________________
_______________________________________________________________________
6. What is Ethernet used for?
________________________________________________________________________
________________________________________________________________________
7. What are the advantages of using a network?
________________________________________________________________________
-61-
________________________________________________________________________
8. What are the disadvantages of using a network?
________________________________________________________________________
________________________________________________________________________
Task 2. Read the text a gain and then decide whether these statements are True (T) or
False (F).
1. _____A LAN connects computers in an office building, school, over a relatively long
distance.
2. _____The connection between devices of WLAN and LAN are the same.
3. _____A WAN connects computers over a wide area, such as from country to country
or even continent to continent.
4. _____MANs are typically bigger than LANs but smaller than WANs. Authorities and
government entities typically own and manage MANs.
5. _____A PAN serves a lot of people.
6. _____A SAN works like a storage drive which is attached to a computer.
7. _____A CAN is larger than a WAN but smaller than a LAN.
8. _____A VPN is a secure which keeps a user’s identity and access credentials, as well
as any data transferred, inaccessible to hackers.
Task 3. Match the terms with the definitions.
LISTENING 2
Task 1. (Track 5.2) Watch a video of a technician explaining how to set up a computer
network. Then fill in the blank with ONE suitable word.
Right here, we have two of my computers. I have a MacBook here, and a PC here.
And, they both have Ethernet ports, but where do (1)_______ them to? I can't really connect
them to each other. I mean, that would work for certain things, but it's not a real network.
What I need is something like this: a router. Now, a router has a bunch of (2) _______ in
the back that I can connect to multiple computers, and it also works wirelessly, so I can
connect more computers without (3) _______ . But right now, I'm going to show you how
to connect them with cables. And to do that, we're going to need a bunch of these Ethernet
cables.
-62-
So I'm just going to get one of these, hook it up to my Mac, and the other side is
going to go to one of these ports on my (4) _______ . I'm going to do the same with my PC.
I'm going to take this port right here, and the other side will go right to my router. Now,
what the router is doing right now is giving both of the computers something called IP
Addresses, which is their (5) _______ on the network. These are the numbers that these
computers have, so that other computers can talk to them, and know how to (6) _______
them.
The third thing you could do with your router is connect it to the Internet, so that
both of these computers could also have Internet access, and the way you do it is by (7)
_______ up an Ethernet cable to the one port in the back that looks different from all the
other ports. So, if you look at the back, there are (8) _______ ports that you can use for
computers, and then there's one port usually marked as WAN, or Internet, or Uplink, that
we can take our cable to. And then, the other side goes to our DSL or cable (9) _______
and gives us Internet.
And that's basically how we set up a simple computer network. With a router, you
can connect Macs and Pc's on a (10) _______ network. And you don't really have too much
headaches and compatibility issues, because they all use the same standard, and it just
works.
Adapted from https://www.youtube.com/watch?v=IdRsWGY9zwo
Task 2. Watch the video again and re-order these re-arrange the sentences in the right
order of setting up a computer network.
a. Do the same with the PC
b. Connect the router to the Internet, by hooking up an Ethernet cable to the one port in the
back that looks different from all the other ports.
c. Prepare a Macbook, a PC and a router, a bunch of these Ethernet cables.
d. The router gives both of the computers something called IP Addresses which is their
numbers on the network.
e. Now, both of these computers have Internet access
f. Get one of the cables and hook it up to the Mac and the other side is attached to the ports
on the router
1. ____ 2. ____ 3. ____ 4. ____ 5. ____ 6. ____
WRITING
Look at the diagram below write a short paragraph to describe the process of setting
up a computer network at home. You should follow the suggestions.
-63-
There are ........... main steps in setting up a computer
network.
At the first stage, you should prepare .................
Next, .................
Then, .................
The next step is .................
Finally, .................
Your Writing
-64-
READING 2
Network Topologies
Ring network
Star bus topology is the most common network
topology used today. It combines elements of
star and bus topologies to create a more
effective network. Computers in a specific area
are connected to hubs creating a (11) ________,
then each hub is connected together along the
network backbone.
The main advantage of this type of topology is
that it can be more easily expanded over time
than a bus or a star. On the other hand, this
topology is more difficult to (12) ________
than the others and if the backbone line breaks,
the whole network goes down.
Star bus topology
-66-
Task 2. Read the texts again and decide if the following statements are True (T) or
False (F).
1. _______The topology chosen depends only on the location of computers.
2. _______All topologies use many cables and are very expensive.
3. _______ In a bus topology all the buses are connected one after the other.
4. _______In a bus topology a server controls the flow of data.
5. _______In a star network data is always updated.
6. _______The hub doesn’t connect printers and other devices in a star topology.
7. _______In the ring topology each node is connected to the hub.
8. _______In the ring topology if the hub doesn’t work, the network goes down.
9. _______Star bus topology combines elements of bus and ring topologies.
10. _______In a star bus topology a backbone line failure affects the whole network.
Task 3. Read the text again and complete the table with the missing information.
Topology Connection Use Advantages Disadvantages
small network
Each node is
connected to
the central hub
ring
Task 1. (Track 5.3) Listen and complete the dialogue between Karoline and Sam.
Karoline: How do you describe network speed?
Sam: In bits, kilobits, megabits and gigabits. They describe network speed. For example,
dial-up connections allow (1) ________ kilobits per second and DSL from (2) ________
kilobits per second to (3) ________ megabits per second.
Karoline: OK. I’ve got that. What about the range?
Sam: Range is the distance of network coverage, so distance units represent network range.
Most countries use metric but some use feet as units of measurement. Metres or feet usually
describe the range of a network. Home networking routers support a range up to (4)
________ feet or (5) ________ metres indoors and (6) ________ feet or (7) ________
metres outdoors.
-67-
Task 2: Listen and repeat these speeds and ranges.
1. 77 kilobits per second
2. 5 megabits a second
3. 2 gigabits per minute
4. 250 metres
5. 40 feet
TRANSLATION
Translate these sentences into Vietnamese.
1. Computer networks commonly help endpoint users share resources and communicate.
They commonly appear all over the place, such as homes, offices and government
administrations.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
2. Computer networks enable the usage and sharing of any number of applications and
services, including emails, video, audio and plenty of other types of data, over the internet.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
3. Computer networks operate using a varying set of hardware and software. All packet-
switched networks use Transmission Control Protocol/Internet Protocol (TCP/IP) to
establish a standard means of communication.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
4. Endpoint nodes, which are used for routing purposes, include switches and routers,
servers, personal computers, phones, networked printers and other peripheral computing
devices, as well as sensors and actuators.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
5. Network capacity is measured in terms of bandwidth. Bandwidth is quantified by the
theoretical maximum number of bits per second (bps) that can pass through a network
device.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
-68-
UNIT 6 COMMUNICATION SYSTEMS
VOCABULARY
Label the pictures (1-7) with the Information and Communications Technologies
(ICT) and services in the box.
READING 1
Channels of communication
-70-
3. Most existing TV sets can be upgraded to ___________ by connecting a digital decoder.
4. My grandfather is 75 and he is still watches ___________ on TV to find out share prices,
weather forecasts and sport results.
5. I work in a ___________. I receive incoming calls with information inquiries. I also make
outgoing calls for telemarketing.
6. Please complete this form and send it by ___________ or normal mail.
7. I have a ___________ navigation system in my car but I don’t use it very often. My town
is small and I know it well.
LISTENING 1
Task 1. (Track 6.1) Listen to a short talk about “Information and Communications
Technologies (ICT)?”. Then, fill in the blank with suitable word or phrases.
-71-
4. What are the benefits that ICT bring to the
business?__________________________________________________
________________________________________________________________________
5. What are the drawbacks of ICT?
________________________________________________________________________
________________________________________________________________________
SPEAKING
Work in group and discuss the advantages and disadvantages of ICT in social life.
Then make a presentation.
You can base on the suggestions below.
Advantages Disadvantages
• Speed/time and money can be saved • Lack of security and privacy
• Cost effectiveness • Cause high unemployment rate
• Greater availability • Social media has negative effects on
• Bridging the cultural gap the youth
• Creation of new and interesting jobs • Cyber bulling on the internet
in IT sectors • Reliance on technology
• New opportunity for further
education
USEFUL LANGUAGE
WRITING
Write a paragraph about the pros and cons of ICT in social life. You can base on the
suggestion below.
READING 2
Task 1. Match these types of electronic communication with the pictures.
-73-
1. 2.
3. 4.
5. 6.
7.
ELECTRONIC COMMUNICATION
What is an electronic communication?
-74-
Electronic communication can be defined as, the communication which uses
electronic media to transmit the information or message using computers, e-mail, telephone,
video calling, FAX machine, etc. This type of communication can be developed by sharing
data like images, graphics, sound, pictures, maps, software, and many things.
Types of electronic communication
Electronic communication can be classified into different types like messaging,
voice call, e-mail, social media, etc. We know that e-communication has changed due to
the way public interact and communicate with each other for different purposes like
personal or business. By using this, it is very simple to communicate with the world.
E-MAIL
E-Mail or electronic mail is the most used type of electronic communication. By
using this communication, one can send a message to another person through a mail
immediately. For that, we need to create an account to send an e-mail, media files, photos,
documents, etc. This type of communication has replaced many conventional types of
communication due to many benefits. Therefore, this type of communication is more
suitable for different methods of communication. The benefits of this communication are
ease of usage, completely free, etc. Additionally, this type of electronic communication
doesn’t affect the surroundings.
SMS
The second oldest form of electronic communication is SMS (or short message
service). The first SMS was sent in 1992. Since the early 90s, any mobile phone could send
a short message (or SMS) to another mobile phone. Today, SMSs are rarely used for
personal communication since instant messaging and social media applications can send
the same short messages for free.
BLOGGING
The first form of one-way conversation is blogging, in which a website creator post
short, informal stories or articles on their website. It is a discussion or informational website
published on world wide web consisting of discrete, often informal diary style text entries.
The audience is generally people who are interested in the content of that specific blog.
Whenever a new story is posted, it is automatically moved to the top of the website where
it will be seen first while all the older stories move down one position.
INSTANT MESSAGING
Instant messaging is a service, like SMS, that allows people to send short messages
using their mobiles phones (or computers). However, unlike SMSs, instant messages are
sent for free over the internet and can contain multimedia items like emoji, pictures, videos
and voice recordings. In 2018, the most popular instant messaging applications are
WhatsApp, Facebook Messenger and WeChat, although newer instant messaging
applications like Snapchat and Telegram have gained many users very quickly.
VIDEO CASTING
-75-
Videocasting refers to a form of communication where videos are broadcast over the
internet. Videos can first be created and then uploaded to a website (like YouTube), or they
can be streamed live, allowing people to watch the video as it is created. One very popular
form of videocasting is vlogging. The word vlogging is a combination of two words: Video
and blogging. Vlogging (or a vlog) is like blogging but with videos. As with blogs, vlogs
show several informal, conversational videos with the most popular video appearing first.
These videos can be on any topic and are generally not professionally made. Most channels
you will find on YouTube are examples of vlogs.
PODCASTING
Podcasting (or a podcast) refers to an audio only broadcast released on the internet.
It is a free service that allows Internet users to download audio files from a podcasting Web
site to listen to on their computers or personal digital audio players. As with blogging and
vlogging, there are thousands of different types of podcasts, from novels and dramas, to
news and talk show podcasts to popular culture and documentary podcasts, which means
that there is a podcast for every type of audience.
VIDEO CONFERENCING
Video conferencing refers to a set of technologies that allow a person to make a
video call to one or more people at the same time. These calls are like phone calls but can
also include a video broadcast of the people in the call. Popular examples of video call
applications include Skype, FaceTime and Discord.
Adapted from https://www.elprocus.com/electronic-communication-and-its-types/
Task 2. Read the text, then match the terms with their definitions.
-76-
4. Instant Message d. This is a free service in which audio only broadcast
released on the internet and users can download to listen.
5. Video Casting e. By using this type of electronic communication, one can
send message to others by using e-mail system.
6. Podcasting f. This is a kind of service in which users make calls over
the Internet rather than through the traditional telephone or
cell phone networks
7. Voice Over Internet g. This is a kind of service that allows people to send short
Protocol message for free.
8. Video conferencing h. This is one of the oldest form of electronic
communication in which people can send short message
with charge.
Task 3. Read the text again and decide whether these statements are True (T) or False
(F).
1. ______E-mail, telephone, video calling, FAX machine are typically used to transmit
information in electronic communication.
2. ______Messaging, voice call, e-mail, social media are examples of electronic
communication.
3. ______E-communication has remained unchanged for years. ______
4. ______Many conventional types of communication have replaced e-mailed due to their
benefits.
5. ______SMSs are no longer used for personal communication since instant messaging
and social media applications can send the same short messages for free.
6. ______When using blogs, bloggers can write informal diary style text entries.
7. ______If you want to send instant messages on Facebook Messenger, Whatsapp or
Snapchat, you will be charged a small fee.
8. ______Vlogging and Blogging are similar in delivering informal styles, however, with
Vlogging, Vloggers can post videos.
9. ______If Internet users want to download a podcast from a website, they need to pay a
fee.
10. ______There are thousands of different types of podcast available.
11. ______If you want to make a telephone call by using VOIP, your device need to connect
to the Internet.
12. ______The analogue phone system is rarely used these days due to the popularity of
VOIP service.
13. ______We can use Skype, Facetime or Discord to make video call.
LISTENING 2
-77-
Task 1. (Track 6.2) Listen to an expert from Aircall talking about VOIP (Voice Over
Internet Protocol), then fill in the blank with word/ phrases from the box below.
-78-
where an internet connect device knows it’s (10) __________ other internet connect device,
example of this included Facetime audio or Google calls.
Adapted from https://aircall.io/blog/customer-happiness/how-voip-works/
Task 2. (Track 6.3) Listen to the rest of the talk and list some benefits that VOIP brings
to business.
First, the per-minute calling rate is ...................
Second, VOIP allows for much greater...................
Plus, IP technologies is accessible from smartphone, so ...................
Finally, VOIP can be intricately connected to your other ....................
TRANSLATION
Translate these paragraphs into Vietnamese.
1. One of the reasons that helps Vietnam controlling COVID-19 effectively is that the
Ministry of Health and the Ministry of Information and Communications have made a
strong collaboration with big ICT enterprises to make and deploy digital applications that
helps to control the pandemic.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
2. Not only building and deploying applications to control COVID-19, ICT industry has
promptly directed and lead big IT enterprises to build and deploy platforms that support
working and learning remotely in healthcare and education sectors.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
3. The government of Vietnam has identified ICT as a major industry and socio-economic
growth driver and is urging government agencies at all levels to apply advanced ICT
solutions towards the goals of improving operational efficiencies and providing better
governance services.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
4. Vietnam is expected to continue to import the bulk of ICT hardware, software and
services, as Vietnamese suppliers are still relatively new and may not be able to offer the
same range of solutions and services as foreign suppliers.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
-79-
5. Electronic communication is fast, cost-effective and convenient, but these attributes
contain inherent disadvantages.
................................................................................................................................................
................................................................................................................................................
6. Devices such as cell phones with mobile communication technology and portable laptops
enable people to stay in touch with friends and co-workers at all times.
................................................................................................................................................
................................................................................................................................................
7. Electronic communication is convenient and usually instantaneous. It dispenses with the
need to mail or fax documents that can be safely backed up online or on portable electronic
devices to protect against loss or theft.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
8. Electronic communication is convenient and usually instantaneous. It dispenses with the
need to mail or fax documents that can be safely backed up online or on portable electronic
devices to protect against loss or theft.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
9. Due to the advancement of electronic media, business managers can effortlessly manage
operation transversely the world. Video or teleconferencing e-mail and mobile
communication are helping managers in this observe.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
10. Electronic communication provides the opportunity for interactive communication with
distant people. Video conferencing, for example, allows interactive communication even
though the participants are geographically dispersed.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
FURTHER READING
COVID-19: Consequences and opportunities for the ICT sector
COVID-19 has impacted a large number of countries and is turning out to be even
worse than the critical economic, strategic, and political clashes happening around the
world. The outbreak has and still is impacting all industries, including the Information &
Communication Technology (ICT) sector.
The world has never been more interconnected, and this health crisis is affecting the
whole world. The ICT industry is already losing a lot of income opportunities, and it’s still
uncertain when the situation will contain. Amidst the uncertain scenario, many
technological areas will be the key focus and keep emerging as clear winners.
-80-
With organizations promoting working remotely, there is already an exponential rise
in video calls/phone calls, as an increasing number of people are organizing meetings via
apps or collaboration platforms. Digital media and Over the Top (OTT) content players are
benefiting while Virtual Private Networks (VPNs), cybersecurity, and data security are
other technologies that will see a surge as most workforces are operating remotely. Cloud
services will grow, boosted by higher usage of content, gaming downloads, video
conferencing, and the impact of remote access to corporate networks. There will also be an
increased focus on technologies like artificial intelligence, big data, augmented reality, and
virtual reality, among others going forward. Equipment maker, Huawei, for example,
recently posted a surge in its technological services comprising AI, video conferencing, and
wireless network coverage across the Asia Pacific, given the on-ground communication
challenges to ensure smooth connectivity.
Although the COVID-19 pandemic has certainly not triggered Industry 5.0, it has
brought home the reality of Industry 4.0. digital workflows, robots, automation are no
longer goals; they are requirements. IoT devices have offered organizations a path toward
preserving revenue streams during this pandemic.
Other areas that would see an uptick include e-learning, online education, and e-
governance. As shoppers begin to self-isolate and avoid crowded areas, the clear winner is
the e-commerce sector, with digital payment taking over a lot faster than the physical
payment options.
The media industry (both traditional broadcasters and newer streaming platforms)
are playing a vital role during the pandemic in providing correct and responsible health
information to the public with search engines and social media platforms. In terms of the
morale of those isolated, access to the wealth of quality content available is
important. (Refer to our whitepaper: Implications of COVID-19 on cable tv and streaming
business3 for a more in-depth analysis)
The current circumstances may also accelerate the adoption of 5G to meet the
demands of bandwidth, performance, and network slicing. There will be more focus on the
sufficiency of networks to carry the significantly increased traffic as working from home
continues to ramp up. Social distancing and self-isolation mean that telecommunication has
become an elevated essential service. It will be worthwhile to see how the Communications
Service Providers (CSPs) both Mobile Network Operators (MNOs) and cable operators
meet the challenge of their new critical role in the changed world.
While people are mostly using home WiFi, they would still use their mobile phones
for voice communications, and this is the area that MNOs need to keep a close eye on. With
video conference services (Skype, Zoom, and others) traffic is going through the roof right
now, the dial-in option is an alternative if video conferencing platforms are overloaded.
Also, with the need for social distancing, people are communicating more, which will drive
additional voice traffic, whether it’s on legacy circuit-switched systems or the 4G network
-81-
with Voice over Long-Term Evolution (VoLTE) calls. The strain on voice services, though,
will be helped to some extent by the convergence of WhatsApp, Messenger, Skype,
Hangouts, and FaceTime calling within the iOS and Android ecosystems. Nevertheless,
some CSPs are predicting significantly higher voice traffic growth against the regular year-
on-year increase of only 5%4.
With the potential congestion of fixed broadband service, there is a chance that
devices will fall back on mobile networks, and this will cause a significant surge of mobile
data traffic. Likewise, in areas where MNOs also provide home broadband connectivity,
one would expect a significant increase in data traffic, and in some parts of the world where
unlimited data isn’t pervasive, an increase in subscriber costs.
The cable operators, on the other hand, will be more impacted than MNOs due to the
increased activity at home – working from home and a greater demand for streaming
services. Netflix and Google have already announced that they would be reducing video
streaming quality in Europe for a month from high definition (HD) to standard definition
(SD) to prevent network overload and collapse.
With significant changes in user behavior, escalating use of telemedicine solutions
for remote diagnosis, and the corresponding data traffic shifts, it will be increasingly
important for CSPs, whether it’s a mobile or cable operator, to keep vigilant and closely
monitor their network.
Read the text and answer the following questions.
1. Can you name some sectors that are impacted by Covid-19 pandemic?
________________________________________________________________________
2. Is the ICT industry losing a lot of income opportunities?
________________________________________________________________________
3. What happens with organizations promoting working remotely?
________________________________________________________________________
4. How important is the media industry during the pandemic?
________________________________________________________________________
5. Why is it necessary to adopt 5G technology?
________________________________________________________________________
6. According to the article, what is the trend of voice communication in the pandemic?
________________________________________________________________________
7. Why are the cable operators more impacted than MNOs?
________________________________________________________________________
-82-
UNIT 7 WEBSITES
STARTER
Work with your partner to answer the questions.
1. Which websites do you use in your work and study?
2. Make a list and share it with a partner. Do you use the same sites?
VOCABULARY
Task 1. Complete these sentences about the purpose of websites with the words in the
box.
offer practise present promote read sell share
Example: The purpose of Nationalgeographic.com is to present information on topics.
1. People visit CNN.com to__________ international news.
2. Some websites want to__________ a service.
3. Companies use Amazon.com to__________ their products.
4. Thegreenshoppingguide.co.uk wants to __________ environmentally friendly shopping.
5. Students visit Math.com to __________ their maths.
6. English teachers join eltforum.com to __________ teaching resources.
Task 2. Match the website analysis tools 1-5 to the descriptions a-e.
1. traffic a. information about where the visitors to your site
are from
2. meta tag b. invisible information (e.g. a hidden keyword) on
a website
3. visitor map c. information about a user and the sites they
browse
4. user profile d. increasing the number of visitors to your site
5. page optimisation e. the movement and actions of visitors to your site
-83-
READING
Task 1. Read this text about different types of websites. Answers the following
questions.
1. Why do people visit organizational websites?
2. Why do people visit company websites?
3. Why do people visit entertainment websites?
4. Why do people visit news websites?
LISTENING
Task 1. Work in pairs, think about your favourite websites and discuss these
questions.
-86-
1. Do you like the way they are designed? Give reasons for your answer.
2. What elements do you think a good website should have? Make a list.
Task 2. (Track 7.1) Listen to an interview with a web designer describing how to
design a website and put these steps into the correct order.
Write and format the text
-87-
WRITING
Task 1. Complete this text with the words in the box.
After that Finally First Next Secondly Then Thirdly
LANGUAGE SKILLS
Describing a process
Firstly/ The first step is/ To After that… Finally…
begin with… Then… The last step/ stage is…
Secondly… Following that…
Thirdly…
Next…
The next step/ stage is…
Task 2. Write a paragraph describing the website development process in your own
words. Use the phrases in the language box to help you.
-88-
TRANSLATION
Translate into Vietnamese.
1. Companies develop commercial websites to sell products or services. Entertainment
websites are designed to entertain or provide fun activities. People visit news websites to
obtain information.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
2. You can view the source HTML code of a web page by choosing the Page Source option
in your web browser. But you needn’t learn HTML in order to build your own website
................................................................................................................................................
................................................................................................................................................
3. You could use HTML code to specify the font, text styles and background color.
Nowadays, however, it is more common to use CSS. This makes it easy to apply
presentation changes across a website.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
4. If you want to share information with people, you can use RSS feeds and provide readers
with a link to the feed. RSS allows subscribers to receive updates of blogs, news, podcasts,
etc.
................................................................................................................................................
................................................................................................................................................
5. Many websites now incorporate audio files, and if you’re designing a site, you may like
to insert songs, podcasts, etc.
................................................................................................................................................
................................................................................................................................................
6. If you want to inject something special into your web pages, you can use Adobe Flash to
include interactive animations and streaming audio. Additionally, you can insert Java
applets – small programs that enable the creation of interactive files.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
-89-
UNIT 8 NETWORK SECURITY
STARTER
Task 1. Match the words/ phrases in the box with the pictures.
adware hacker Browser hijacker malware attack
spyware Trojan Phishing Ransomware
1.
2.
3. 4.
-90-
5. 6.
7. 8.
-91-
4. Malware attack d. is when attackers send malicious emails designed to
trick people into falling for a scam.
5. Spyware e. is a type of malicious code or software that can take
control of your computer.
6. Phishing f. is just a person who uses computer programming or
technical skills to overcome a challenge or problem.
7. Ransomware g. software that enables a user to obtain covert
information about another's computer activities by
transmitting data covertly from their hard drive.
8. Trojan h. is a common cyberattack where malware (normally
malicious software) executes unauthorized actions on the
victim's system.
READING 1
Task 1. Read the first passage of the article and then answer the questions below.
1. What is Internet Security?
2. Can you name some kinds of the internet security threats?
Internet Security
-92-
Individuals and organizations can protect themselves from these kinds of threats by
practicing internet security.
Ransomware
Ransomware is a type of malware that prevents you from using your computer or
accessing specific files on your computer unless a ransom is paid. It is often distributed as
a trojan – that is, malware disguised as legitimate software. Once installed, it locks your
system’s screen or certain files until you pay.
Because of their perceived anonymity, ransomware operators typically specify
payment in cryptocurrencies such as Bitcoin. Ransom prices vary depending on the
ransomware variant and the price or exchange rate of digital currencies. It isn’t always the
case that if you pay, the criminals will release the encrypted files.
-93-
Ransomware attacks are on the rise, and new ransomware variants continue to emerge.
Some of the most talked-about ransomware variants include Maze, Conti, GoldenEye, Bad
Rabbit, Jigsaw, Locky, and Wanna Cry.
Adapted from https://www.kaspersky.com/resource-center/definitions/what-is-internet-security
Task 2. Match the underline words in the text with their synonyms.
1. ______________ something that can be easily hurt, influenced, or attacked.
2. ______________ a large amount of money that is demanded in exchange for someone
3. ______________ not officially allowed.
4. ______________ from a distance.
5. ______________ to give a new appearance to a person or thing, esp. in order to hide its
true form.
6. ______________ complicated.
7. ______________ to make something legal or acceptable.
8. ______________ a form of digital cash.
9. ______________ being what something or someone appears or claims to be; real,
not false.
10. ______________ secret or private.
11. ______________ something such as a document that proves who someone is.
12. ______________ to use something in a way that helps you.
13. ______________ a digital currency produced by a public network that use cryptography
to make sure payment are sent and received.
14. ______________ to persuade someone that something false is the truth, or to keep
the truth hidden from someone for your own advantage.
Task 3. Read the rest of the text and decide whether these statements are True (T) or
False (F) .
1. ____ Phishing is a cyber-attack in which phishing emails are sent to gather users’ login
information.
2. ____The objective of phishing is to tempt users to download malware.
3. ____ In recent days, phishing is becoming more and more simple.
4. ____Hackers are always trying to attack a private network or system's vulnerabilities so
they can steal secret information and data.
5. ____ Remote access technology creates opportunities for hackers to exploit.
6. ____The security of RDP is relatively low, so hackers are easily to attack.
7. ____ Ransomware is often distributed as Trojan.
8. ____ If your computer is attacked by ransomware, you don’t have to pay any ransom to
unlock your screen and your file.
9. ____ Ransomware operators typically specify payment in cryptocurrencies because
they are anonymous.
10. ____ The number of ransomware attacks decreases steadily.
-94-
LISTENING 1
(Track 8.1) You are going to listen to a radio programme about cybercrime. Listen
to the first part of the programme and answer the question.
According to Inspector Peter, cybercrime includes ...............................
Task 1. Listen to the rest of the programme and fill in the blank with suitable word.
Christine: Can you explain what cyber bullying is?
Inspector: Embarrassing someone or spreading (1) ________ on the Internet or via text
messages to mobile phone is called online- or cyber bullying. As part of my job, I visit
schools to talk to (2) ________ about their use of the Internet. Recently, I asked a group of
kids what they did online. Most replied that I chatted, watched music (3) ________, and
sent instant messages and e-mails. Those were typical answers. But one student admitted
that he was bullied online.
Christine: How can someone be bullied online?
Inspector: There are several ways. Sometimes bullies put their victims’ (4) ________on
the Internet without their knowledge, or they send their victims nasty or frightening text
messages or e-mails. Other times, they (5) ________lies and rumors about them on the
Internet. Sometimes they send text messages threatening the victim with (6) ________.
Christine: Why do you think teenagers do this?
Inspector: Most cyber bullying don’t think that they’re doing is terrible. They think it’s(6)
________. Sometimes their friends encourage them to do it. Another reason might be that
they can bully someone and they’re sure they won’t get caught.
Christine: What happens if someone is caught cyber bullying? Are they punished?
Inspector: Well, when we (7) ________who the bully is, we make sure his or her ISP –
Internet Service Provider – is closed down.
Christine: So have you got any tips for someone that is being cyber bullied?
Inspector: Christine, cyber bullying is a serious matter. If you get a frightening text
message or e-mail, you should immediately (8) ________it to an adult that you trust, such
as a parent or a teacher. Phoning the mobile phone provider is a good idea, too. The provider
can find out who (9) ________the phone. Teenagers can get more advice at sites like
www.bullying.co.uk. In addition, many school have got systems where students can (10)
-95-
________cases of online bullying. So you see, there’s actually a lot of you can do if you
have been bullied.
Christine: Thanks for the helpful information.
Task 2. Listen again and decide whether these statements are True (T) or False (F).
1. _______ According to Inspector Peters, most teenagers use Internet for cyberbullying.
2. _______ Sending someone a threatening text message is an example of cyberbullying.
3. _______ Cyber bullies are never punished.
4. _______ Inspector Peters believes that people shouldn’t take cyberbullying seriously.
5._______ In case, you receive threatening messages, you should report police
immediately.
6. _______ Teenagers can get advices from school when they are online bullied.
SPEAKING
Work in pair and discuss the question “which is the worst behavior?”. Number these
statements from the least to the bad behavior.
-96-
READING 2
Cybersecurity threats and solutions
-97-
commands and queries, such as by using a safe API with parameterized queries. Businesses
should also use input validation, and observe the principle of least privilege, applying
controls like the SQL LIMIT function to reduce the damage from a successful attack.
A Web Application Firewall (WAF) which updates a threat database in real-time is the only
effective way to filter application input to protect against code injection.
Data Breach
The cost of data breach well documented. They are often caused by compromised
credentials, but the range of other common causes include software misconfiguration, lost
hardware, or malware.
Data breach prevention requires a range of good practices. Site traffic and
transactions should be encrypted with SSL, permissions should be carefully set for each
group of users, and servers should be scanned. Employees should be trained in how to avoid
being caught by phishing attacks, and how to practice good password hygiene. The
principle of least privilege is worth noting here, as well.
Malware infection
Most businesses are aware on some level of the security threat posed by malware,
yet many people are unaware that email spam is still the main vector of malware attack.
Because malware comes from a range of sources, several different tools are needed for
preventing infection. A robust email scanning and filtering system is necessary, as are
malware and vulnerability scans. Like breaches, which are often caused by malware
infection, employee education is vital to keep businesses safe from malware.
Any device or system infected with malware must be thoroughly scrubbed, which means
identifying the hidden portions of code and deleting all infected files before they replicate.
This is practically impossible by hand, so requires an effective automated tool.
Adapted from https://www.liquidweb.com/blog/five-common-web-security-problems/
Task 1. Read the text carefully and complete the table below.
Data Breach
-98-
Malware infection
WRITING
Write about the problems and solutions of cybercrime. You can base on the
information of the article in Reading 2.
Paragraph 1: Problems
One of the prominent reasons concerning this problem is .............
This is because + S + have/ has the propensity for + V-ING
Hence, S + be + considered as the chief culprit behind +N/ N phrase ...........
Another factor leading to this situation is + N.
This means + N
Paragraph 2: Solutions
-99-
In truth, some imperative measures ought to be taken to resolve these prospective issues.
• V-ing + be + highly + recommended/ complemented/ suggested.
• …………., which prevent + O + from V-ing/ N
LISTENING
Task 1. (Track 8.2) Listen to an interview with Diana Wilson, a member of the
Internet Safety Foundation. Which answers (a or b) best describe what she says?
1. Parents should make children aware of
a. the benefits and risks of the Internet
b. the risks of the Internet
2. A web filter program can be used to
a. prevent access to sites with inappropriate content.
b. rate web content with labels (similar to the way movies are rated)
3. If kids spend too much time online or suffer from internet addiction, parents should
a. stop them using the Internet.
b. look for help from specialists.
Task 2. Listen again and complete the interviewer’s lists.
Risks Solutions
Manipulation of children There are websites (4) __________
Invasions of (1) __________ at children.
Distribution of indecent or (2) __________ Internet (5) __________
material programs let block objectionable
Violence and racist (3) __________ websites.
Websites should (6) __________
-100-
their content with a label, from child-
friendly to over 18 only.
TRANSLATION
Translate these sentences into Vietnamese
1. The main purpose of a security policy is to inform users, staff and managers of their
obligatory requirements for protecting technology and information assets. The policy
should specify the mechanisms through which these requirements can be met the purpose
of a security policy
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
2. Another purpose is to provide a baseline from which to acquire, configure and audit
computer systems and networks for compliance with the policy. Therefore, an attempt to
use a set of security tools in the absence of at least an implied security policy is meaningless.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
3. Another major use of an AUP (Appropriate Use Policy) is to spell out, exactly, the
corporate position on privacy issues and intellectual property issues. In some countries, if
the company does not explicitly state that e-mail is not secure, it is considered to be so and
any breach could cause privacy and confidentiality liabilities.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
4. It is very important to spell out what is and is not acceptable in intellectual transfers and
storage and what the corporate privacy policies are to prevent litigation about same. An
AUP may also be part of a security policy. It should spell out what users shall and shall not
do on the various components of the system, including the type of traffic allowed on the
networks.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
5. Once your security policy has been established it should be clearly communicated to
users, staff, and management. Having all personnel sign a statement indicating that they
have read, understood, and agreed to abide by the policy is an important part of the process.
-101-
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
6. The cost of data breach well documented. They are often caused by compromised
credentials, but the range of other common causes include software misconfiguration, lost
hardware, or malware.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
-102-
FURTHER READING
Security and privacy on the Internet
There are many benefits from an open system like the Internet, but one of the risks
is that we are often exposed to hackers, who break into computer systems just for fun, to
steal information, or to spread viruses (see note below). So how do we go about making our
online transactions secure?
Security on the Web
Security is crucial when you send confidential information online. Consider, for
example, the process of buying a book on the Web. You have to type your credit card
number into an order form which passes from computer to computer on its way to the online
bookstore. If one of the intermediary computers is infiltrated by hackers, your data can be
copied.
To avoid risks, you should set all security alerts to high on your web browser.
Mozilla Firefox displays a lock when the website is secure and allows you to disable or
delete cookies – small files placed on your hard drive by web servers so that they can
recognize your PC when you return to their site.
If you use online banking services, make sure they use digital certificates – files that
are like digital identification cards and that identify users and web servers. Also be sure to
use a browser that is compliant with SSL (Secure Sockets Layer), a protocol which provides
secure transactions.
Email privacy
Similarly, as your email travels across the Net, it is copied temporarily onto many
computers in between. This means that it can be read by people who illegally enter
computer systems.
The only way to protect a message is to put it in a sort of virtual envelope – that is,
to encode it with some form of encryption. A system designed to send email privately is
Pretty Good Privacy, a freeware program written by Phil Zimmerman.
Network security
Private networks can be attacked by intruders who attempt to obtain information
such as Social Security numbers, bank accounts or research and business reports. To protect
crucial data, companies hire security consultants who analyse the risks and provide
solutions. The most common methods of protection are passwords for access control,
firewalls, and encryption and decryption systems. Encryption changes data into a secret
code so that only someone with a key can read it. Decryption converts encrypted data back
into its original form.
Malware protection
Malware (malicious software) are programs designed to infiltrate or damage your
computer, for example viruses, worm, Trojans and spyware. A virus can enter a PC via a
-103-
disc drive – if you insert an infected disc – or via the internet. A worm is a self-copying
program that spreads through email attachments; it replicates itself and sends a copy to
everyone in an address book. A Trojan horse is disguises as a useful program; it may affect
data security. Spyware collects information from your PC without your consent. Most
spyware and adware (software that allows pop-ups – that is, advertisements that suddenly
appear on your screen is included with “free” downloads.
If you want to protect your PC, don’t open email attachments from strangers and
take care when downloading files from the Web. Remember to update your anti-virus
software as often as possible, since new viruses are being created all the time.
Note: Originally, all computer enthusiasts and skilled programmers were known as hackers, but
during the 1990s, the term hacker became synonymous with cracker – a person who uses
technology for criminal aims. Nowadays, people often use the word hacker to mean both things. In
the computer industry, hackers are known as white hats and crackers are called black hats or
darkside hackers.
Read the text carefully and answer these questions.
1. Why is security so important on the Internet?
2. What security features are offered by Mozilla Firefox?
3. What security protocol is used by banks to make online transactions secure?
4. How can we protect our email and keep it private?
5. What methods are used by companies to make internal network secure?
6. In what ways can a virus enter a computer system?
7. How does a worm spread itself?
-104-
UNIT 9 THE FUTURE OF IT
SSSS
PART 1 THE FUTURE OF IT
STARTER
Work in pairs to list a number of trends that will define the future of Information
technology.
READING
WRITING
LANGUAGE FOCUS
Predictions: Future perfect and It in subject position
-106-
1. By 2030 scientists will have developed the prediction is a that clause. For
active contact lenses example:
We can vary the strength of our predictions 1. It’s likely that computers will be used
using the certainly verbs studied instead of to develop other faster computers.
will. For example: 2. It’s possible that we’ll work from
telework centres in future.
Task 2. Make predictions for 2030 for each of the following using the methods studied
here. You may wish to use these verbs:
develop disappear increase replace take over
1. computing power 6. shops
2. interfaces 7. machine intelligence compared to
human intelligence
3. monitors 8. the Internet
4. teleworking 9. keyboards
5. money 10. Speech recognition
-107-
PART 2 FUTURE TRENDS OF NEW TECHNOLOGIES
READING
Task 1. Match the texts (1-5) with the picture (a-e). Which trends in ICT (Information
and Communications Technologies) do you think will affect our lives in the future?
3. Imagine you are about to take a holiday in Europe. You walk out to the garage and
talk to your car. Recognizing your voice, the car’s doors unlock. On the way to the
airport, you stop at an ATM. A camera mounted on the bank machine looks you in the
eye, recognizes the pattern of your iris and allows you to withdraw cash from your
account.
When you enter the airport, a hidden camera compares the digitized image of your
face to that of suspected criminals. At the immigration checkpoint, you swipe a card
and place your hand on a small metal surface. The geometry of your hand matches the
code on the card and the gate opens. You’re on your way.
Does it sound futuristic? Well, the future is here. Biometrics uses computer
technology to identify people based on physical characteristic such as fingerprints,
facial features, voice, iris and retina patterns.
5. In the ideal smart home, appliances and electronic devices work in sync to keep the
house secure. For example, when a regular alarm system senses that someone is
breaking into the house, it usually alerts the alarm company and then the police. A
smart home system would go further, turning on the lights in the home and then
sending a text message to the owner’s phone. Motorola Homesight even sends images
captured by wireless cameras to phones and PCs. Smart homes can remember your
living patterns, so if you like to listen to some classical music when you come home
from work, your house can do that for you automatically. They will also know when
the house is empty and make sure all appliances are turned off. All home devices will
be interconnected over a home area network where phones, cable services, home
cinemas, touch screens, smart mirrors and even the refrigerator will cooperate to make
our lives more comfortable.
-110-
4. Hey google, show me a (6) __________ for breaded chicken.
5. There are nine (7) __________. You can add them to the recipe.
Task 2. Watch the video again and check your answers.
Task 3. Work with a partner and think of your smart home in the future then make a
small presentation to the class.
TRANSLATION
Translate these sentences into Vietnamese.
1. Over the last few years, the landscape of IT trends has changed significantly. New
technologies arose while others are losing their momentum.
................................................................................................................................................
................................................................................................................................................
2. The latest trends in information technology clearly show that data security will continue
to be in the spotlight of attention. Keeping business data and the data of customers secure
will be among the biggest future IT trends and requirements. n
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
provide a baseline from which to acquire, configure and audit
3. Automation will prevail in the future of IT. It aims to reduce manual work and improve
business efficiency. Data science is the key sphere that is predicted to benefit from
automation the most., configure and audit
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
4. Top information technology trends also include the growth in the importance of social
media. They will continue to gain traction both among businesses and customers.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
5. Another one of the latest trends in information technology is big data and analytics. Big
data analytics uncovers hidden patterns, correlations, and provides other important insights,
for example, on customer behavior, etc.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
-111-
FURTHER PRACTICE 1
When a brand new computer comes off memory other operating system programs
the factory assembly line, it can do (called nonresident) from disk storage
nothing. The hardware needs software to only as needed.
make it work. Are we talking about
applications software such as word- An operating system has three main
processing or spreadsheet software? functions: manage the computer's
Partly. But an applications software resources, such as the central processing
package does not communicate directly unit, memory, disk drives, and printers,
with the hardware. Between the establish a user interface, and execute and
applications software and the hardware is provide services for applications software.
a software interface - an operating system. Keep in mind, however, that much of the
An operating system is a set of programs work of an operating system is hidden
that lies between applications software from the user. In particular, the first listed
and the computer hardware. function, managing the computer's
The most important program in the resources, is taken care of without the user
operating system, the program that being aware of the details. Furthermore,
manages the operating system, is the all input and output operations, although
supervisor program, most of which invoked by an applications program, are
remains in memory and is thus referred to actually carried out by the operating
as resident. The supervisor controls the system.
entire operating system and loads into
-112-
The user is aware of the effects of different applications programs (1)
___________operating systems are invisible to most users. They lie between applications
programs, (2) ___________ wordprocessing, and the hardware. The supervisor program is
the most important. It remains in memory, (3) ___________ it is referred to as resident.
Others are called non-resident (4) ___________ they are loaded into memory only when
needed. Operating systems manage the computer's resources, (5) ___________ the central
processing unit (6) ___________, they establish a user interface, and execute and provide
services for applications software. (7) ___________ input and output operations are
invoked by applications programs, they are carried out by the operating system.
-113-
FURTHER PRACTICE 2
LINUX
Linux has its roots in a student project. In aid by Professor Andy Tannenbaum) Linus
1992, an undergraduate called Linus set out to write his own 'kernel' — the core
Torvalds was studying computer science in of an operating system that handles memory
Helsinki, Finland. Like most computer allocation, talks to hardware devices, and
science courses, a big component of it was makes sure everything keeps running. He
taught on (and about) Unix. Unix was the used the GNU programming tools
wonder operating system of the 1970s and developed by Richard Stallman's Free
1980s: both a textbook example of the Software Foundation, an organization of
principles of operating system design, and volunteers dedicated to fulfilling Stallman's
sufficiently robust to be the standard OS in ideal of making good software that anyone
engineering and scientific computing. But could use without paying. When he'd
Unix was a commercial product (licensed written a basic kernel, he released the source
by ATEtT to a number of resellers), and code to the Linux kernel on the Internet.
cost more than a student could pay. Source code is important. It's the original
Annoyed by the shortcomings of Minix (a from which compiled programs are
compact Unix clone written as a teaching generated. If you don't have the source code
-114-
to a program, you can't modify it to fix bugs easy to give your fixes back to the
or add new features. Most software community that most people do so.
companies won't sell you their source code, An operating system kernel on its own isn't
or will only do so for an eye- watering price, a lot of use; but Linux was purposefully
because they believe that if they make it designed as a near-clone of Unix, and there
available it will destroy their revenue is a lot of software out there that is free and
stream. was designed to compile on Linux. By about
What happened next was astounding, from 1992, the first 'distributions' appeared.
the conventional, commercial software A distribution is the Linux-user term for a
industry point of view — and utterly complete operating system kit, complete
predictable to anyone who knew about the with the utilities and applications you need
Free Software Foundation. Programmers to make it do useful things — command
(mostly academics and students) began interpreters, programming tools, text
using Linux. They found that it didn't do editors, typesetting tools, and graphical user
things they wanted it to do - so they fixed it. interfaces based on the X windowing
And where they improved it, they sent the system. X is a standard in academic and
improvements to Linus, who rolled them scientific computing, but not hitherto
into the kernel. And Linux began to grow. common on PCs; it's a complex distributed
There's a term for this model of software windowing system on which people
development; it's called Open Source (see implement graphical interfaces like KDE
www.opensource.org/ for more and Gnome.
information). Anyone can have the source As more and more people got to know about
code - it's free (in the sense of free speech, Linux, some of them began to port the Linux
not free beer). Anyone can contribute to it. kernel to run on non-standard computers.
If you use it heavily you may want to extend Because it's free, Linux is now the most
or develop or fix bugs in it — and it is so widely- ported operating system there is
[Adapted from 'Smooth Operator' by Charles Stross, Computer Shopper magazine, November
1998]
Task 2. Match the terms in Table A with the Statements in Table B
Table A Table B
a. Kernel (1) A type A type of software development where any
b. Free Software Foundation programmer can develop or fix bugs in the software
c. Source code (2) The original systems program from which compiled
d. Open Source programs are generated
e. A distribution (3) A complete operating system kit with the utilities and
f. X applications you need to make it do useful things
(4) A standard distributed windowing system on which
people implement graphical interfaces
(5) An organization of volunteers dedicated to making
good software that anyone could use without paying
(6) The core of an operating system that handles memory
allocation, talks to hardware devices, and makes sure
everything keeps running
-115-
Task 3. Mark the following statements as True or False.
a. __________Linux was created in the 1980s.
b. __________Minix was created by a university student.
c. __________Linux is based on Unix.
d. __________Minix is based on Unix.
e. __________Linux runs on more types of computer than any other operating system.
-116-
FURTHER PRACTICE 3
-118-
FURTHER PRACTICE 4
-119-
Source: Oxford English for Information Technology
-120-
Task 1. Read the text and answer the questions.
1. What languages were derived from SGML?
_____________________________________________________________________
2. What type of language is used to structure and format elements of a document?
_____________________________________________________________________
3. Name two metalanguages.
_____________________________________________________________________
4. What elements of data is XML (but not HTML) concerned with?
_____________________________________________________________________
5. What is meant by the term “extensible”?
_____________________________________________________________________
6. What makes XML a more intelligent language than HTML?
_____________________________________________________________________
7. What does the HTML markup tag <p> indicate?
_____________________________________________________________________
8. Why are search engine able to do a better job with XML documents?
_____________________________________________________________________
9. What type of website is particularly likely to benefit from XML?
_____________________________________________________________________
Task 2. Read the text again to mark the following statements as True or False:
1._____ HTML is no longer useful for creating webpages.
2._____ SGML is more complex than XML.
3._____ XML files can only be used on Unix systems.
4._____ XML files can only be read by browser programs.
5._____ HTML is a markup language.
6._____ Internet searches will be better with XML files.
-121-
FURTHER PRACTICE 5
A biological virus is a very small, simple organism that infects living cells, known
as the host, by attaching itself to them and using them to reproduce itself. This often causes
harm to the host cells.
Similarity, a computer virus is a very small program routine that infects a computer
system and uses its resources to reproduce itself. It often does this by patching the operating
system to enable it to detect program files, such as COM or EXE files. It then copies itself
into those files. This sometimes causes harm to the host computer system.
When the user runs an infected program, it is loaded into memory carrying the virus. The
virus uses a common programming technique to stay resident in memory. It can then use a
reproduction routine to infect other programs. This process continues until the computer is
switched off.
The virus may also contain a payload that remains dormant until a trigger event
activates it, such as the user pressing a particular key. The payload can have a variety of
forms. It might do something relatively harmless such as displaying a message on the
monitor screen or it might do something more destructive such as deleting files on the hard
disk.
When it infects a file, the virus replaces the first instruction in the host program with
a command that changes the normal execution sequence. This type of command is known
as JUMP command and causes the virus instructions to be executed before the host
program. The virus then returns control to the host program which then continues with its
normal sequence of instructions and is executed in the normal way.
To be a virus, a program only needs to have a reproduction routine that enables it to
infect other programs. Viruses can, however, have four main parts. A misdirection routine
that enables it to hide itself; a reproduction routine that allows it to copy itself to other
programs; a trigger that causes the payload to be activated at a particular time or when a
particular event takes place; and a payload that may be a fairly harmless joke or may be
very destructive. A program that has a payload but does not have a reproduction routine is
known as Trojan.
Source: Oxford English for Information Technology
-122-
Read the text and answer the questions.
1. How are computer viruses like biological viruses?
_____________________________________________________________________
2. What is the effect of a virus patching the operating system?
_____________________________________________________________________
3. Why are some viruses designed to be loaded into memory?
_____________________________________________________________________
4. What examples of payload does the writer provide?
_____________________________________________________________________
5. What kind of programs do viruses often attach to?
_____________________________________________________________________
6. Match each virus routine to its function.
Routine Function
1. misdirection a. does the damage
2. reproduction b. attaches a copy of itself to another
program
3. trigger c. hides the presence of the code
4. payload D decides when and how to activate the
payload
7. How does a Trojan differ from a virus?
_____________________________________________________________________
-123-
FURTHER PRACTICE 6
Task 1 . Work in groups of three, A, B and C. Read the text extracts and complete
parts 1 and 2 of this table.
1. Area of IT
2. Predictions
3. Comments
Text A
Telecoms applications will soon be bundled Electronic money will be very secure but
together in much the same way as office much more versatile than physical
application suites are today. A major alternatives. E-cash can be completely
example is the electronic marketplace, global and could be used as a de facto
which will bring customers and suppliers standard. It does not have to be linked to
together in smart databases and virtual any national currency, so can be
environments, with ID verification, independent of local currency fluctuation.
encryption and translation. It will then Its growing use on the Net will lead to its
implement the billing, taxation and acceptance on the street and we may hold
electronic funds transfer, while a large proportion of our total funds in this
automatically producing accounts and global electronic cash. People will
auditing. The whole suite of services will be increasingly buy direct from customised
bases on voice processing, allowing a manufacturers. Shops will be places where
natural voice interface to talk to the people try on clothes, not buy them. Their
computer, all the AI to carry out the request, exact measurements can be sent instantly
and voice synthesis and visualisation to the manufacturer as soon as they have
technology to get the answer out. chosen an outfit. The shops may be paid
by the manufacturer instead.
Text B
Employment patterns will change, as many Of course, workers can be fully mobile, and
jobs are automated and new jobs come into we could see some people abandon offices
existence to serve new technologies. Some completely, roaming the world and staying
organisations will follow the virtual in touch via satellite systems. Even in trains
company model, where a small core of key and planes there may be infrared
employees is supported by contractors on a distribution to each seat to guarantee high
project by project basis, bringing together bandwidth communication. One tool they
the right people regardless of where they may have in a few years is effectively a
live. The desks they will use will have communicator badge. This will give them a
multiple flat screens, voice interfaces, voice link to computers across the network,
computer programs with human-like faces perhaps on their office desk. Using this
and personalities, full screen voice link, they can access their files and
videoconferencing and 3D sound email and carry out most computer-based
positioning. All this will be without any work. Their earphones will allow voice
-126-
communication cables since the whole synthesisers to read out their mail, and
system uses high capacity infrared links. glasses with a projection system built into
The many short-term contractors may not the arms and reflectors on the lenses will
have enough space in their homes for an allow a head-up display of visual
office and may go instead to a new breed of information. Perhaps by 2010, these
local telework centre. glasses could be replaced by an active
contact lens that writes pictures directly
onto the retina using tiny lasers.
Text C
Finally and frivolously to the very long Athlete and a brain literally the size of the
term. By around 2030, we may have the planet, the whole global superhighway and
technology to directly link our brain to the every machine connected to it. Over time,
ultra-smart computers that will be around this new form may converge with the
then, giving us so much extra brainpower machine world, as more and more of his
that we deserve a new name, Homo thoughts occur in cyberspace. With a
Cyberneticus. In much the same time complete backup on the network, Homo
frame, geneticists may have created the Hybridus would be completely immortal.
first biologically optimised humans, Homo Ordinary biological humans would
Optimus. It would make sense to combine eventually accept the transition and plain
this expertise with information technology old Homo Sapient could become
wizardry to make something like the Borg, voluntarily extinct, perhaps as early as
Homo Hybridus, with the body of an 2200.
Olympic
Adapted from Oxford English for information technology
Task 2. Now exchange information with others in your group to list all the predictions
made in the text. Discuss with your group the predictions made and add your own
comments on the predictions in the last section of the table.
-127-
FURTHER PRACTICE 8
The technology needed to set up a home network is here today. It is just a matter of
connecting a number of PCs equipped with Ethernet adapters to a hub using twisted-pair
cabling which uses sockets rather like phone sockets. Special isolation adapters can be fitted
to allow existing mains lines to be used instead of twisted-pair cabling. Most future home
networks, however, are likely to be wireless network systems, using tuned transmitter and
receiver devices. The simplest networks allow basic file-sharing and multi-player gaming
as well as sharing of peripherals such as printers. Most advanced home networks are
likely to have a client/server structure, with low-cost terminals, or “thin” clients, connected
to a central server which maintains the system’s storage capacity and, depending on whether
the terminals are dumb or processor-equipped network computers, its processing power. To
make the most of such a network, it must become part of an integrated home entertainment
and control system. To the user, the desktop becomes just one of many features accessible
throughout the house. Tired of working in the study? Pop down to the living room and
reload it into the terminal there. Before you start work, call up the hi-fi control program and
have the music of your choice pumped through the living room speakers. Computer and
entertainment networks can be separate but linked by the server to allow control of the latter
from the terminals. Future home networks are more likely to have the entire system based
on a single loop.
Now read the text and the diagram of a simple home network setup. Match the
diagram key to the components of the network.
-129-
FURTHER PRACTICE 9
Read these hints on choosing a free ISP. Then decide which of the options available
offer the best deal to these users. Be prepared to defend your choice.
1 a household with a young family
2 a small home-based business
3 someone who enjoys online gaming
4 someone who doesn’t want a lot of spam in their email
Choosing a free ISP
Using a free ISP requires no new technology-all you need is a computer, a modem,
a telephone line, and the appropriate software (which is available free of charge when you
sign up with the service). Once installed on your PC you can access the Internet as normal,
but your connection costs only the price of a local call, and you pay nothing else- not even
for features such as an unlimited number of email addresses, unlimited Web space and
original content.
Most of the services are very similar, but it is still worth looking around for a service
that offers at least the following features:
E-mail
Having several email accounts is very useful-you can separate business and personal
email for example, or provide an address for each member of your family. Many free ISPs
also offer only Web-based mail which is great if you need to get into your computer on the
move as you can access it from any computer with Internet access. POP3 email however is
faster and more efficient and can be downloaded to your PC to read offline- a combination
of the two is ideal.
-130-
Newsgroups
Newsgroups are huge discussion forums on the Internet that are an amazingly rich
resource of information and a brilliant way to communicate with other Internet users.
Unfortunately they are also the home to some of the most unsavoury content on the Internet
(they are largely unmoderated) and as a result many free ISPs restrict access to some or all
newsgroups.
Customer support
Check support line charges; many free ISPs use their support lines as a source of
revenue relying on your ignorance to make money from the call.
The target audience is generally Net novices and, as a result, support lines are pretty much
jammed all day with queries and connection problems.
Most use premium rate telephone line charges. However, there are a few free ISPs who only
charge local or national rates for their telephone helplines.
Reliable Service
Of course all the features in the world won’t make a scrap of difference if the ISP is
unreliable and you find it impossible to log on. Look out for recommendations from friends
and shop around. Interestingly many of the more popular services have become saturated
and seem to be in a constant “upgrading the network” phase.
There is nothing to stop you having more than one free ISP account. Windows will
even enable you to run a number of different free ISP connection set-ups on the same PC
so you can easily have multiple accounts and just use the best one on the day.
-131-
Option D Option E
Bun Free4all
• Unlimited email addresses • Unlimited POP3 email accounts
• 25Mb Web space • Email virus protection and junk
• Online help section email filters
• Free access to CyberPatrol for • 25Mb of free Web space with option
blocking or restricting access to to increase at £1 per Mb per month
inappropriate content on the Web • Powerful enough to create quite
advanced, functional sites
• Technical support at local call rates
-132-
FURTHER PRACTICE 10
Near-line and offline storage (often called Hierarchical Storage Management) is the modem
way of dealing with current storage needs. Hard disks are becoming cheaper, but data
storage requirements are higher, so it’s better to plan for HSM than assume disks can
continually be added to systems.
HSM is essentially the automatic movement of data between media, the media type used
depending on when it was last accessed. Many software and hardware vendors have HSM
solutions, and all are based on the same basic techniques.
The most common HSM setup is where there’s online storage (the hard disk), near-line
storage (some sort of fast media from where a file can be quickly retrieved), and offline
storage (slower media that might take some time for files to be recovered, but it is cheaper
for a long-term storage). This arrangement is the major thrust of today’s systems. Most of
the time these systems will comprise optical media for near-line and tape media for offline
storage.
Data is automatically moved from the online disk to the near-line optical media if it hasn’t
been accessed for a definable period of time. This is typically three months (depending on
your business). This near-line system is likely to be erasable optical disks in some form of
jukebox.
The system has to operate on the basis that a user won’t know that a file has been moved
into near-line storage. Therefore some marker is left in the directory structure on the disk
so that the user can still see the file. If the user the tries to open it, the file will automatically
be copied from near-line to online storage, and opened for the user. All the user notices is
a slight time delay while the file is opened.
Moving data from near-line to offline storage can be done using a similar mechanism, but
more often the marker left in the directory for the user to see will just contain a reference.
This gives the user the facility to request the file back from the systems administrator, and
could have information like “This file has been archived to offline media” and a reference
to the tape number that the file is on. This is then sent to the system administrator and the
file can be recovered from tape in the usual way.
Some modern systems have the ability to keep multiple tapes in a tape changer or jukebox
system, so retrieval from offline to online storage can be automatic. However, it is more
likely that when a file goes into offline storage it will never be recovered, as it has probably
been untouched for several months (again depending on the business). Therefore the
requirement to recover from offline to online is reasonably infrequent.
The choice of storage media type is a crucial aspect of HSM. The cheapest is undoubtedly
tape (be it digital, analogue or digital linear), so this tends to be used for offline storage.
However, tape has no guarantee of data integrity beyond one or two years, whereas optical
systems, such as CDs, WORMs and MO disks, have much better data integrity over a longer
period of time.
-133-
Depending on the precise application, archiving systems are usually based on the media
type that has the best integrity. The major suppliers within the HSM market are totally open
about the media that can be used with their software.
Current HSM systems support most hardware devices, so you can mix and match media to
suit requirements. Given the fact that media choice depends on the length of time you want
your data to remain intact, and also the speed at which you want to recover it, the choice
for many system managers is as follows.
Tape is used for backup systems where large amounts of data need to be backed up on a
regular basis. Tape is cheap, integrity is good over the short to medium term, and retrieval
from a backup can be made acceptable with good tape storage practices.
Near-line storage should be based on erasable optical disks. This is because access is
random, so the access speed to find and retrieve a particular file needs to be fast, and data
integrity is also good.
Archiving systems should probably be CD-or WORM-based, as again access speeds are
good, media costs are reasonably cheap and importantly, the integrity of the media over the
medium to long term is good.
One important thing to remember with archiving systems is the stored data’s format. The
data might be held perfectly for 10 or 15 years, but when you need to get it back, it’s
essential that you maintain appropriate hardware and software to enable you to read it.
Adapted from Oxford English for information technology
Task 2. Read the text again and mark the following statements with True or False:
1__________ Hard disks are still very expensive.
2__________ Near-line storage needs to have a quick access speed.
3__________ Near-line storage is usually some form of jukebox.
4__________ Offline storage needs to have a fast access speed.
5__________ Users are aware that their files have been moved to near-line storage.
-134-
6__________ The movement of files between near-line and online storage is automatic.
7__________ The user sometimes has to request files from the systems administrator.
8__________ Files are frequently recovered from offline storage.
9__________ Tape has much better data integrity than optical media.
10__________ It is usually possible to use whatever media you want in an HSM system.
-135-
GLOSSARY
UNIT 1
UNIT 2
-137-
gather V Tập hợp
hard drive N Ổ đĩa cứng
hardware N Phần cứng
heat sink N Bộ tản nhiệt
information N Thông tin
input/output device NP Thiết bị đầu vào/ đầu ra
insert V Chèn
instruction N Hướng dẫn
integrate V Tích hợp
keyboard N Bàn phím
main memory NP Bộ nhớ chính
mechanic ADJ Thuộc về cơ học
memory N Bộ nhớ
monitor N Màn hình
motherboard N Bo mạch chủ
operating system NP Hệ điều hành
output N Đầu ra
partition V,N Chia tách
perform V Hoạt động, thể hiện
peripheral N Thiết bị ngoại vi
permanent ADJ Cố định
plug V Cắm vào
port N Cổng
power supply NP Nguồn điện
pre-emptive multitasking NP Đa nhiệm ưu tiên
press V Ấn nút
printer N Máy in
processor N Bộ xử lý
RAM N (Random Access Memory) bộ nhớ khả
biến, bộ nhớ truy xuât ngẫu nhiên
reboot V Khởi động lại hệ thống
ROM N (Read-only memory) bộ nhớ chỉ đọc
scanner N Máy scan
screen N Màn hình
server Máy chủ
settings N Cài đặt
socket N ổ điện
software N Phần mềm
-138-
storage device N Thiết bị lưu trữ
switch off V Tắt máy
Symmetrical N Đa xử lý đối xứng
multiprocessing
turn on V Bật lên
unplug V Rút phích cắm
user account N Tài khoản người sử dụng
utility software N Phần mềm tiện ích
virtual reality goggles NP Kính thực tế ảo
UNIT 3
UNIT 4
UNIT 5
-142-
Units of measurement (np) Đơn vị đo lường
Virtual Private Network (np) Mạng riêng ảo
UNIT 6
UNIT 7
UNIT 8
UNIT 9
-146-
REFERENCES
[1]. Eric H.Glendinning & John McEwan, Oxford English for Information Technology,
Oxford Univesity Press, 2002.
[2]. Maja Olejniczak, English for Information Technology, Pearson Longman, 2011.
[3]. Santiago Remacha Esteras, Infortech English for computer users, Cambridge, 2007.
[4]. Virginia Evans, Jenny Dooley, Stanley Wright, Information Technology, Express
Publishing, 2014.
[5]. https://databasetown.com/relational-database-benefits-and-limitations/
[6]. https://www.javatpoint.com/types-of-databases
[7].https://www.matillion.com/resources/blog/the-types-of-databases-with-examples
[8]. https://bus206.pressbooks.com/chapter/chapter-4-data-and-databases/
[9]. https://www.learncomputerscienceonline.com/how-to-design-database/
[10].https://slideplayer.com/slide/8325296/#:~:text=2%20Data%20Base%20A%20databa
se,%2C%20sound%2C%20video%20and%20hyperlinks.
[11]. https://en.islcollective.com/english-esl-worksheets/skill/speaking/what-artificial-
intelligence/98088
[12]. https://www.englishclub.com/efl/listen-learn/science/artificial-intelligence/
[13]. https://eslflow.com/wp-content/uploads/2021/06/AI-2021.pdf
[14].https://breakingnewsenglish.com/1402/140226-artificial-intelligence-m.pdf
[15]. https://www.eslprintables.com/printable.asp?id=987982
[16]. https://www.liveworksheets.com/cv1000345gh
[17].https://www.techtarget.com/searchnetworking/definition/network
[18]. https://www.ibm.com/cloud/learn/networking-a-complete-guide
[19]. https://www.youtube.com/watch?v=4_zSIXb7tLQ
[20]. hhttps://www.liveworksheet
[21]. https://www.liveworksheets.com/ey1454881ru
[22]. https://www.youtube.com/watch?v=4uk1qrCPlts
[23]. https://www.liveworksheets.com/yz1367607bp
[24]. https://www.liveworksheets.com/xh1487514kl
[25].https://www.eslprintables.com/vocabulary_worksheets/communication_worksheets/
Electronic_Communication_416287/
[26].https://www.liveworksheets.com/yz1367607bp
[27].https://www.elprocus.com/electronic-communication-and-its-types/
[28]. https://searchcio.techtarget.com/definition/ICT-information-and-communications-
technology-or-technologies
-147-