You are on page 1of 159

ESP

ENGLISH FOR SPECIFIC PURPOSES

English for
INFORMATION TECHNOLOGY

Nguyen Thi Thao


Le Thi Binh
Cao Thi Thu Nga
Pham Thi Bich Ngoc

December 2021
nN
ii
PREFACE
In the era of globalization, it is crucial that students should be equipped with not
only the specialized knowledge but also the language communication skills prior to
their starting out on professional career. For that reason, “English for Information
Technology” is designed as an English for Specific Purposes (ESP) course for
information technology (IT) majors at the University of Transport Technology (UTT).
With the attempt to develop students’ English communication skills in the context of
information technology, the course introduces UTT’s undergraduate students to
fundamental IT knowledge together with a wide variety of language focuses related to
various topics in this area. Hopefully, the course will create opportunities for the
enhancement of students’ language skills (reading comprehension, listening
comprehension, speaking, writing, etc. ) in general, and those in IT field in particular.
The book “English for Information Technology” is tailored to build students’
terminology range in the IT field as well as their abilities to absorb IT texts, audios,
videos, write reports, deliver presentations, translate ESP materials, etc. It comprises
nine (9) topic-based units addressing significant concepts and aspects of IT industry
with clear, concise structured tasks. The book is featured by
- extensive vocabulary range that effectively supports students in comprehending
IT materials;
- diverse reading texts adapted from profound reliable sources;
- interactive video, listening activities that bring about interesting IT knowledge
- simulated speaking situations and ample opportunities to deliver presentations
- practical writing task that must be useful for students during their IT studies and
future careers
Notwithstanding compilers’ considerable effort, unintended shortcomings are
unavoidable. Therefore, all reader’s comments and contributions are welcome to
improve this book and make it an useful reference for IT students, teachers and
practitioners.

Ms. Nguyen Thi Thao


Ms. Le Thi Binh
Ms. Cao Thi Thu Nga
Ms. Pham Thi Bich Ngoc

iii
iv
TEXTBOOK CONTENTS
CONTENTS DESCRIPTION TEXTS

UNIT 1 WORKING IN THE INFORMATION


TECHNOLOGY INDUSTRY
In this unit, students will be given an overview of jobs and activities in information technology
industry.

PART 1 JOBS IN IT

Starter An introduction to jobs in IT • List of jobs


(P.1) • Team introduction

Listening A brief introduction to IT jobs • Self-introduction


and activities.
(P.2)

Speaking Expressing frequency • Adverbs of frequency


(P.3) • Time expression
• Roleplay

PART 2 IT WORKPLACE

Reading 1 Introduction to IT department’s • IT Department Restructuring


section
(P.4)

Speaking Talking about the rules • IT security


(P.5)

Reading 2 An introduction to activities in an • Futachiba


IT company • IBGroup
(P.6)
• Digital World

Writing A guideline for writing company • Our company and what we do


description and job advertisement
(P.8)

Translation Vietnamese translation • Translate into Vietnamese

(P.9)
Further Advantages and disadvantages of • Is Information Technology a
working in IT industry Good Career Path?
reading
(P.10)

v
CONTENTS DESCRIPTION TEXTS

UNIT 2 COMPUTER SYSTEMS


In this unit, students will be given an overview of computer systems, computer hardware and
software. An overview of the operating system will also be introduced.

PART 1 WHAT IS COMPUTER?

Starter A discussion of computer • Name the pictures


(P.12)

Reading An introduction to the computer • What is a computer?


(P.13)

Listening A brief introduction of computer • Label the pictures


components
(P.16)

PART 2 COMPUTER HARDWARE

Brief introduction to computer • Computer elements


Vocabulary elements
(P.18)

An overview of types of hardware • Hardware elements


Listening and hardware elements
(P.18)

Describing the function of an item • Present simple


Language work
(P.19) • Emphasizing the function

Writing an email explaining a • Connecting a projector


Writing process
(P.19)

PART 3 COMPUTER SOFTWARE

An overview to computer software • Computer software


Listening
(P.21)

Discussion about software • Application software


Speaking
(P.22)

PART 4 OPERATING SYSTEM

An introduction to operating system • A conceptual Diagram of an


Reading
Operating System
(P. 23)

vi
CONTENTS DESCRIPTION TEXTS

Describing an operating system • Writing a description


Writing
(P.24)

Vietnamese translation • Translate into Vietnamese


Translation
(P.26)

UNIT 3 DATABASES
In this unit, students will be given an introduction to databases, types of databases and data
processing.

PART 1 DATABASE BASICS

Starter An introduction to database • Terminologies related to


databases
(P.27)

Reading 1 An overview on databases • Understanding databases


(P.27)

Listening An instruction of how to design a • Database Design Planning


database process
(P.30)

An introduction to types of • Types of database


Reading 2 database
(P.32)

Language focus Asking people to do things • Using can/could/would you + V


(bare infinitive)
(P.35)

PART 2 DATA PROCESSING

Vocabulary An introduction to data • Data processing steps


processing steps
(P.36)

Listening Describing steps • Describing data processing steps


(P.36)

Speaking An introduction to database • Talking about database software


software
(P.37)

Speaking and Talking about advantages and • Relational Database Benefits and
disadvantages Limitations
writing
(P.38)

vii
CONTENTS DESCRIPTION TEXTS

Translation Vietnamese translation • Translate into Vietnamese


(P.42)

UNIT 4 ARTIFICIAL INTELLIGENCE


In this unit, students will be given an overview of artificial intelligence

Vocabulary Terminologies related to • Understanding terminologies


artificial intelligence related to artificial intelligence
(P.43)

Listening 1 A brief introduction of artificial • Understanding what is artificial


(P.43) intelligence intelligence

Reading 1 Artificial Intelligence or Machine • Definition of AI


Learning • The role of AI in modern life
(P.44)

Vocabulary AI apps • An introduction of some AI apps


(P.47)

Advantages and disadvantages of • Make comparison of some AI


Listening 2 some AI apps
(P.49) apps

Discussion on AI apps • Discuss different kinds of AI


Speaking
apps
(P.50)

Benefits and Limitations of AI • Write a paragraph of benefits and


Writing
limitations of AI
(P.50)

Robots in the future • The future of robots by 2029


Reading 2
(P.51)

The world of AI • How AI change the world


Translation
(P.53)

Artificial Intelligence May Doom • The future of AI


Further The Human Race Within A Century
Reading
(P.54)

viii
CONTENTS DESCRIPTION TEXTS

UNIT 5 Network Systems


In this unit, students will be given an overview of network systems

Vocabulary An introduction to some • Names some of some popular


popular kinds of network kinds of network
(P.56)

Listening 1 Network solution for a flower • An overview of some networks


shop • Give solutions for a flower shop
(P.57)

Speaking Making recommendation of a • Using language to give


network for a large corporation or recommendations
(P.58) organization, a small business • Explain reasons
and a family home

Reading 1 Network devices • Understanding what is network


(P.59) • Computer networks types

How to set up a computer network • The process of setting up a


Listening 2
computer network
(P.62)

Describe a process • Write a paragraph to describe the


Writing
steps in setting up a computer
(P.63)
network

Network topologies • Understanding different kinds of


Reading 2
network topologies
(P.65)

Network range and speeds • Understanding network range and


Listening 3
(P.67) speeds

Vietnamese translation • Translate into Vietnamese


Translation
(P.68)

UNIT 6 COMMUNICATION SYSTEMS


The students will be given an overview of automation and controls and study different
components of industrial automation and control systems.

Vocabulary Providing some terminologies • ICT terminologies


related to ICT
(P.69)

Reading 1 Channels of communication • A review of


telecommunication
(P.69)
• Means of digital
communication

ix
CONTENTS DESCRIPTION TEXTS

Listening 1 Introduction to ICT • What is ICT


(P.71) • Role of ICT in modern life

Discuss the advantages and • Talk about the advantages and


Speaking disadvantages of ICT in social life disadvantages of ICT
(P.72)

Write about the advantages and • Write about the advantages


Writing disadvantages of ICT in social life and disadvantages of ICT
(P.72)
Reading 2 Electronic communication • Description of different types
of electronic communication
(P.73)

Listening 2 Voice Over Internet Protocol • An introduction of VOIP


(VOIP) • The role of VOIP in digital
(P.77)
communication and business

Translation ICT in Vietnam • The development of ICT in


Vietnam
(P.79)

Further Reading COVID-19: Consequences and • Consequences and


(P.80) opportunities for the ICT sector opportunities for the IT sector
in Covid-19 Pandemic

CONTENTS DESCRIPTION TEXTS

UNIT 7 WEBSITES
In this unit, students will be given an overview pf website, types of website and webpage design.

Starter An introduction to websites • List of websites


(P.83)

Vocabulary Brief description of purposes of • Purposes of website


website • Website analysis tools
(P.83)

Reading A brief overview of webpage • Web page design


design
(P.84)

Listening A guideline to designing a website • Describing how to design a


website
(P.86)

Describing a process • Website development process


Writing
(P.88)

x
CONTENTS DESCRIPTION TEXTS

Vietnamese translation • Translate into Vietnamese


Translation
(P.89)

UNIT 8 NETWORK SECURITY


In this unit, students will be given an overview of network security in IT industry

Starter An introduction to network • Network problems label


security issues • Network problems definition
(P.90)

Reading 1 A brief introduction to Internet • What is Internet security?


security
(P.92)

Listening 1 A programme about cybercrime • Kinds of cybercrime (cyber


bullying)
(P.95)

A discussion about bad • What is the worst behavior?


Speaking behaviors
(P.96) • Feeling towards bad behaviors

Reading 2 A description of some causes and • cybersecurity threats and


solutions to cybercrime solutions
(P.97)

Writing Writing about problems and • Write a cause-solution essay.


solutions
(P.99)

Listening 2 Expertise opinions about internet • Interview with a member of


risks to kids and solutions Internet Safety Foundation
(P.100)
Translation Vietnamese translation • Translate into Vietnamese
(P.101)

Further An introduction on network • Security and privacy on the


security and privacy Internet
reading
(P.103)

UNIT 9 THE FUTURE OF IT


In this unit, students will be given an overview of network security in IT industry

PART 1: THE FUTURE OF IT

Starter A brainstorm to future trends of • Future trends


IT
(P.105)

xi
CONTENTS DESCRIPTION TEXTS

Reading Some predictions of the future IT • Future of information technology


(P.105)

Writing Writing predictions about future • Predictions: Future perfect and It


IT in subject position
(P.106)

PART 2 FUTURE TRENDS OF


NEW TECHNOLOGY

Reading A brief introduction to trends in • Trends in ICT


Information and Communications
(P.108) Technologies

Listening and A description of a typical day in a • A day in the Life of A smart


smart home and a discussion home
speaking about your future smart home
(P.110)

Translation Vietnamese translation • Translate into Vietnamese


(P.111)

Further Practice ............................................................................................ 112


Glossary ....................................................................................................... 136
References ................................................................................................... 146

xii
WORKING IN THE
UNIT 1 INFORMATION TECHNOLOGY
INDUSTRY

PART I JOBS IN IT
STARTER
Task 1. Work in groups. List the IT jobs you know.

Web designer

Jobs in IT

Task 2. Read this team introduction. Complete the descriptions 1-4 with the IT job
in the box.

-1-
Database analyst IT support officer network administrator network architect
1. Sylvia is a ____________________________________
2. Isabelle is a ___________________________________
3. Andrew is an __________________________________
4. Mark and Latika are _____________________________

LISTENING
Task 1. (Track 1.1) Listen to six people introducing themselves. What jobs do they
do? Complete the sentences. Then compare answers with a partner.
database administrator helpdesk supervisor project manager
software developer support technician systems analyst

Task 2. Listen again. Complete the following collocations.


E.g. write software
a. supervise______________
b. have______________
c. be responsible______________IT projects

-2-
d. look______________computers
e. install______________
f. diagnose______________
h. design______________
i. maintain______________
j. write______________for software

Task 3. Work in pairs. What does each person in listening do in their job? Use the
collocations above.
E.g. An IT project manager is responsible for IT projects.

SPEAKING
Language work: expressing frequency

Adverbs of frequency (usually, sometimes, Zafia almost always checks her


hardly ever, etc.) normally go before the main email first thing in the morning.
verb. Some adverbs (eg. Sometimes,
occasionally, normally) can also go at the I have to call a support technician
beginning or end of a sentence. occasionally.

Time expression (once a week, from time to Pawel takes training courses two or
time, all the time, etc.) go at the beginning or end three times a year.
of the sentence

Roleplay. Make a conversation to know more about your partner.

Student A: You are an employee in FPT Group. Your position is a network


administrator. You are responsible for setting up firewall, security levels, wireless
connection, usernames and passwords.

Student B: You are a software developer from Hipt Group. You are in charge of
designing and managing software programs, training users, maintaining and upgrading
existing software systems.

Suggested questions:
Greeting & introducing: Hello/ Hi/ How do you do/
My name….What’s your name?
I’m from……….(company’s name)
Nice to meet you…..
Asking about job: What do you do? What position do you hold at work?
What are your duties every day?
How often do you…..?

-3-
PART 2 IT WORKPLACE
READING 1
Task 1. Read the statement from the DataPro Inc. CEO. Then, mark the following
statements as true (T) or false (F).
F
1. __________The IT Department is increasing.
F
2. __________ Data Processing employees now encode data.
T
3. __________ Supervisors know the employees’ new assignments

4 Technical support
IT Department
Restructuring
1 Data processing DataPro Inc. is going, and so our
workload is increasing. But our IT
department is not dealing with this
increase effectively. So I am dividing the
IT department into three sections: Quality
assurance, data processing and
information security. The
responsibilities of each section are:
Quality Assurance
Testing hardware 5 Hardware
Providing technical support
2 Information security Data Processing
Writing code
Organizing data
Information security
Encoding online data transfers
Updating security software
These changes are not simple or easy. But
smaller groups deal with tasks more
effectively than larger ones. See your
supervisors for your new section
assignment.
6 Software
3 Online
Thomas Jenkins,
CEO DataPro Inc.

Adapted from Information Technology

-4-
Task 2. Match the words (1-10) with the definitions (A-J).
1. _____ software a. Put secret information into code
2. _____ code b. the physical parts of a computer
3. _____ hardware c. connected to the Internet
4. _____ data processing d. numbers entered/held in a computer
5. _____ information security e. checking products for problems
6. _____ online f. the act of using information
7. _____ technical support g. programs/instructions added to computers
8. _____ data h. helping people use/understand technology
9. _____ quality assurance i. program language
10. _____ encoding j. the act of protecting information

SPEAKING
Task 1. Read the memo below and find words that match these definitions. Then
compare answers with a partner.
a. person in charge of IT______________
b. keeping something safe______________
c. information such as numbers and details about people______________
d. a secret word that you type into a computer before you can use it______________
e. a group of connected computers______________
f. having only letters and numbers______________
g. letters, numbers, punctuation marks, etc. ______________
h. people you work with______________

Language work: Talking about the rules


We use must, mustn’t and have to show Passwords must be at least eight characters
strong obligation and to express rules long. I have to go to the canteen to eat! I
We can also use should, shouldn’t, can’t can’t even have an apple at my desk!
and need to talk about rules.
-5-
We also use imperatives to give rules. Keep your password secret.
Use them carefully because they can Don’t share your password with other
sound impolite people

Task 2. Work in pairs. Follow the instructions.


Case 1: Student B is new employee in your company. Student A explain these IT
workplace rules to him or her.
⚫ use company equipment for personal reasons
⚫ install software
⚫ change password frequently
⚫ use Facebook
Case 2: Student A is new employee in your company. Student B explain these IT
workplace rules to him or her.
⚫ start work by 8 a.m.
⚫ eat at desk
⚫ keep desk clean
⚫ connect own devices

READING 2
Task 1. Working in pairs. Choose an IT company and list activities the company
carries out.

-6-
Adapted from English for Information technology 2
Task 2. Read the company profiles and find words that match these definitions.
a. a company or companies that sell things (Futachiba) _________
b. companies that make things to sell (Futachiba) _________
c. factories (Futachiba) _________
d. things a company sells (Futachiba) _________
e. using software that runs and stores information on the Internet (IBGroup) _________
f. customers (IBGroup) _________
g. start selling a new product (Digital World) _________
Task 3. Read the company profiles again and answer these questions. Then compare
answers with a partner.
Which company or companies:
a. is getting bigger?___________
b. develops software? ___________, ___________
c. makes things in more than one country? ___________
d. has a new product to launch? ___________
e. sells software for use on the internet? ___________

-7-
WRITING
Task 1. Complete the company description and job advertisement with the words in
box. Then, compare answers with a partner.
Client diagnosing from time to time installing launch
Maintaining provide service centers spreadsheet and database
supplies

Adapted from English for Information technology

-8-
Task 2. Look again at the company description and job advertisement. Which one of
these patterns do they follow?
a. a mixture of general and detailed information throughout
b. general information first and more detailed information later
c. more detailed information first and more general information later
d. only detailed information
Task 3. Write a job advertisement for an IT job you would like to work. Use pattern
you identified in task 2.
Suggested ideas:
- Search for the company’s information (possibly choose one of the three company in
READING)
- Write a brief description about the company (What the company specializes in, how the
employees are, what products and services the company offers, what the strong points of
the company are)
- Think about a proper job vacancy in the company (describe the features of the job, why
the job is needed, what people do in the job, etc).
- Find out the requirements for the job (qualifications, experience, skills, etc.)
- If possible, add information about benefits (salary, insurance, paid vacation and sick
time, holiday, etc.) and method of application (who to contact, how to contact, etc.)

TRANSLATION
Translate into Vietnamese.
1. The company is among the top five suppliers internationally of servers and among the
top ten manufacturers of laptop computers.
……………………………………………………………………………………………..
……………………………………………………………………………………………..
2. We have production facilities in six countries and we sell our products to almost every
country in the world. With service centers in all our major markets, we provide a very
high level of customer service.
……………………………………………………………………………………………..
……………………………………………………………………………………………..
……………………………………………………………………………………………..
3. Information technology (IT) professionals are responsible for helping organizations
maintain their digital infrastructure and providing troubleshooting assistance to technology
consumers.
……………………………………………………………………………………………..
……………………………………………………………………………………………..
……………………………………………………………………………………………..
4. IT employees are in demand to help others keep up with technological advances and
security procedures.
……………………………………………………………………………………………..
……………………………………………………………………………………………..

-9-
5. If you are interested in developing skills in programming and problem-solving, you may
consider a career in IT
……………………………………………………………………………………………..
……………………………………………………………………………………………..

FURTHER READING

Is Information Technology a Good Career Path?

Task 1. Read the following features, decide which ones are the advantages (pros) and
which ones are the disadvantages (cons) of working in IT industry.
a. Jobs in IT provide great job security
b. Time management is difficult
c. Jobs in the IT industry are stressful
d. Constant learning is required
e. Other people’s annoyance
f. Jobs in the IT industry are well paid
Task 2. Now, read the text, give each paragraph a title from task 1.
Like any other industry, IT is not some sort of perfection, and it has its own series
of advantages and disadvantages. To that end, we’ve put together a list of pros and cons, so
you can decide for yourself whether Information Technology careers are right for you.
(1)_________________

-10-
When it comes to computer and information technology jobs, the average wage is
way above the median annual wage for all other occupations. According to the Bureau of
Labor Statistics (BLS), the average annual wage for tech jobs in 2018 was $86,320. By
comparison, for all other industries, the average was at $38,640. Obviously, these salaries
will vary based on skill, seniority, and geographical location, but even an entry-level Help-
Desk professional can earn around the $38,000 mark.
(2) _________________
Stress will probably be part of the job description when working in IT If you’re in a
Help-Desk position, you’ll likely have to deal with all sorts of people who’ve already lost
their patience with their computers. Systems Administrators, Network Administrators, or
anyone who has anything to do with cybersecurity will also be under a great deal of stress.
The nature of their job will always keep them on high alert, while even the smallest mistake
can cause big problems. .
(3) _________________
The tech industry is growing at an accelerated rate. According to the same BLS data
from above, the number of IT jobs are projected to grow by 12% from 2018 to 2028. That’s
an additional 546,200 new jobs over the coming years. In the cybersecurity sector alone,
there is a global shortage of two million skilled professionals. Every year in the U.S.,
40,000 jobs for information security analysts go unfilled.
Because of this widening skill gap in cybersecurity, only 1% of organizations can
say that their security demands are met, while 85% find themselves understaffed. As such,
earning a certificate in information security can make you pretty hard to replace. And while
this sector is the most affected, all other IT occupations are in a similar position.
(4) _________________
An annoying part of working in the IT Industry that you’ll probably run into are your
coworkers who’ll likely ask you to fix all sorts of issues with their personal gadgets and
computers. It won’t really matter if this is part of your job description or not since less tech-
savvy people won’t be able to see the difference between the different technology careers
out there.
(5) _________________
Most IT jobs work on deadlines, which makes time management difficult as it is.
Another thing to keep in mind here is that security breaches, crashed servers, or other such
problems won’t keep track of your schedule. This means that you could be called upon to
deal with an emergency at any given moment, day or night. You’ll be similar to an on-duty
firefighter or paramedic in this regard.
(6) _________________
The IT industry is a quickly evolving organism. What is relevant today may become
obsolete tomorrow. Tech professionals are, therefore, required to constantly keep
themselves up-to-date on the latest trends and developments, learn new skills, and fall into
the common trap of thinking they know enough. Not even those in apparently stable
professions, like health care or human resources, can afford to stagnate, let alone people in
tech

-11-
UNIT 2 COMPUTER SYSTEMS

PART 1 WHAT IS COMPUTER?


STARTER
Task 1. Work in pairs, discuss these questions.
a. Have you got a computer at home, school or work? What kind is it?
b. Can you name some components (parts) of your computer system?
Task 2. Use the words in bold in “Assembly instructions” to name the following
pictures.

a.___________________ b. ___________________ c. ___________________

d. ___________________ e.___________________ f.___________________

-12-
g. ___________________ h. ___________________ i___________________

Task 3. Look at the following assembly instructions. Answer the questions beside
them.

1. What is the guide mostly about?


A. putting together a computer
B. problems with computer parts
C. uses of expansion cards
D. repairing a broken computer
2. When should the hard drive be
installed?
A. Step #1
B. Step # 3
C. Step # 5
D. Step # 6
3. According to the guide, what is
NOT an assembly step?
A. collection parts
B. opening the case
C. connecting the drives
D. installing the RAM card

READING
Task 1. Read the text and then explain the diagram in your own words.
What is a computer?

A computer is an electronic machine the computer performs a set of


which can accept data in a certain form, instructions and processes the data.
process the data, and give the results of Finally, we can see the results (the output)
the processing in a specified format as on the screen or in printed from (see Fig.
information. 1 below).
First, data is fed into the computer’s A computer system consists of two parts:
memory. Then, when the program is run, hardware and software. Hardware is an
-13-
electronic or mechanic part you can see or memory. The most common input
touch. Software is a set of instructions, devices are the mouse and the keyboard.
called a program, which tells the Output devices enable us to extract the
computer what to do. There are three finish product from the system. For
basic hardware sections: the central example, the computer shows the output
processing unit (CPU), main memory on the monitor or prints the results onto
and peripherals. paper by means of a printer.
Perhaps the most influential component is On the rear panel of the computer there
the central processing unit. Its function is are several ports into which we can plug
to execute program instructions and a wide range of peripherals – a modem, a
coordinate the activities of all the other digital camera, a scanner, etc. They allow
units. In a way, it is the “brain” of the communication between the computer
computer. The main memory (a and the devices. Modern desktop PCs
collection of RAM chips) holds the have the USB ports and memory card
instructions and data which are being readers on the front panel
processed by the CPU. Peripherals are the
physical units attached to the computer.
They include storage devices and
input/output devices.
Storage devices (hard drives, DVD
drives or flash drives) provide a
permanent storage of both data and
programs. Disk drives are used to read
and write data on disks. Input devices USB port and connector
enable data to go into the computer’s

-14-
Input Processing Output
Data is collected and entered Data is manipulated The results are shown on the
monitor or print form

Storage
Files and programs are held on disk
Balance

Expenses
(E.g.
payroll,
services,
Publicity)
Income
(E.g.
sales,
Stocks,
Interest)

Adapted from Infotech English for computer users

Task 2. Match these words from the text (1-9) with the correct meanings (a-i).
1. Software a. The brain of the computer
2. Peripherals b. Physical parts that make up a computer system
3. Main memory c. Programs which can be used on a particular computer
4. Hard drive (also known system
as hard disk) d. The information is presented to the computer
5. Hardware e. Results produced by a computer
6. Input f. Input devices attached to the CPU
7. Ports g. Section that holds programs and data while they are
8. Output executed or processed
9. Central processing unit h. Magnetic device used to store information
(CPU) i. Sockets into which an external device may be connected

Task 3. Read the text again and answer the following questions.
a. When does a computer process the instructions?
_____________________________________________________________________
b. What are hardware and software?
_____________________________________________________________________
c. How many types of hardware are in a computer system? What are their functions?
_____________________________________________________________________
-15-
d. How can devices connect to a computer?
_____________________________________________________________________
e. According to the reading, one change in the modern design of a computer is mentioned,
what is that? What do you think about the change?
_____________________________________________________________________
_____________________________________________________________________

LISTENING
Task 1. (Track 2.1) Watch the video and answer the following questions.
a. What are some examples of computers?
_____________________________________________________________________
b. What exactly is a computer?
_____________________________________________________________________
c. How do the computer make a photo, movie, etc.?
_____________________________________________________________________
d. How can hardware and software be defined?
_____________________________________________________________________
e. List all types of computers you can see.
_____________________________________________________________________

Task 2. Watch again. Fill in the blank with suitable words.


Computers are all around us, from laptop computers to (1)____________ to
(2)____________. They’re changing the way we live our lives. But have you ever asked
yourself what exactly is a computer.
A computer is an (3)____________device that manipulates information or
(4)____________. The computer sees data as (5)____________ and (6)____________, but
it knows how to combine them into much more complex things such as a photo, movie,
(7)____________ game and much more.

-16-
Computers use a combination of (8)____________ and software. Hardware is any
physical part of the computer which includes the internal components and the
(9)____________ parts like the monitor and keyboard.
Software is any set of (10)____________ that tells the hardware what to do such as
a web browser media player or word processor.

Task 3. Label the pictures (a-e) with words from the box.

Desktop PC Tablet PC Laptop

Mainframe PDA
Task 4. (Track 2.2.) Listen to a recording and decide whether these sentences are true
or false. Correct the false ones.
a. ____________A mainframe computer is less power full than a PC.
b. ____________A mainframe is used by large organizations that need to process great
amount of data.
c. ____________The most suitable computers for home use are desktop PCs.
d. ____________A laptop is not portable
e. ____________Laptops are not as powerful as desktop PCs.
f. ____________Using a stylus, you can write directly onto the screen of a tablet PC.
g. ____________A Personal Digital Assistant is small enough to fit into the palm of your
hand.
h. ____________A PDA does not allow you to surf the Web.

-17-
PART 2 COMPUTER HARDWARE
VOCABULARY
Label the elements of this computer system. Then compare your answers with those
of your partner.

LISTENING
Task 1. (Track 2.3) Watch a video introducing types of hardware and answer the
questions after it.
Task 2. Work in pairs. Match the items in Column A with their function in Column
B. Then describe their function.
A. Item B. Function
1. RAM a. Controls the cursor
2. Processor b. Inputs data through keys like a typewriter
3. Mouse c. Displays the output from a computer on a screen
4. Clock d. Reads DVD-ROMs
5. 3.5” floppy drive e. Reads and writes to removable magnetic disks
6. Monitor f. Holds instructions which are needed to start up the computer
7. Keyboard g. Holds data read or written to it by the processor
8. DVD-ROM drive h. Provides fast access for sections of a program and its data
9. Cache i. Controls the timing of signals in the computer
10. ROM k. Controls all the operations in a computer
Task 3. (Track 2.4) Now, listen to a technician describing the motherboard to a new
trainee. Match these words to A-G in the photo below.

1. audio socket____ 3. DIMM slot____ 5. graphics card socket____


2. CPU socket____ 4. Ethernet connector____ 6. SATA socket____
7. USB port____

-18-
LANGUAGE WORK
We can describe the function of an item in some ways. Study these examples.
- Using the Present simple
ROM holds instructions which are needed to start up the computer
- Used to-infinitive, Used for + -ing form
ROM is used to hold instructions which are needed to start up the computer
ROM is used for holding instructions which are needed to start up the computer
- Emphasizing the function
The function of ROM is to hold instructions needed to start up the computer
Task 4. Work in pairs. Who might use each of the items in 2? What might they use them
for?

WRITING
Task 1. Read this email quickly. What does Kamal want to do?

Task 2. Read the email again.


- Mark the features below.
a. the greeting b. a paragraph c. signing off
-19-
- What other forms of greetings and signing off can you think of?
- List all the linking words in the email.
Task 3. Write an email explaining how to transfer photographs from a digital
camera to a computer. Give instructions for the steps below.
• card reader → computer
• open software
• select card reader/ drop down menu
• select destination folder
• “OK” button
Note: - Include the features above in your email.
- Use linking words to connect the steps logically

-20-
PART 3 COMPUTER SOFTWARE
LISTENING
Task 1. Work in small groups.
a. Make a list of all the computer software you use in your work or study.
b. How are computer software classified?
c. Look at the pictures below, what kind of software are they?
Task 2. (Track 2.5) Now, watch the video about types of software. Watch for the first
time and fill in the diagram with suitable words.

COMPUTER SOFTWARE

(1)……………………………………………… (2)………………………………………………

(3)………………………………………… (4)………………………………………

Task 3. Look at the icons below, write the name of the icons, then arrange them in
proper categories. Then, watch the video again and check.

-21-
Application software Operating system Utility software

SPEAKING
In pairs, find out as much as you can about the software your partner uses at home or
at school. Ask about spreadsheet programs, databases, word processors, video
conferencing, business accounting, email, and web browsers. Look at the Useful
language to help you.
Useful language
- What kind of spreadsheet program do you use?
- What do you use it for?
- Do you use it at home or at work?
- What’s your favorite…?
- What features do you like most about it?
- How do you…?

-22-
PART 4 OPERATING SYSTEM
READING
Task 1. Match the labels to the four layers of this diagram with the help of the
diagram caption
(1) applications programs
(2) user
(3) hardware
(4) operating system

A Conceptual Diagram of an Operating System

Closest to the user are applications programs


-software that helps a user compute a payroll
or play a game or calculate the trajectory of a
rocket

The operating system is the set of programs


between the applications programs and the
hardware

Task 2. Read the following Memo and circle the correct answer below it.

MEMO
To: All Employees
From: IT Supervisor
Subject: OS Update
Date: 27 May
All company computers in the Melbourne and Victoria offices require an
update to the operating system. This update will prepare our computers
for the new version of our accounting software, which should arrive in
the first Week of July. Technicians will install the new operating system
beginning on 3 June. We expect the process to be completed around 16
June, providing time to work out any bugs with the operating system
before the accounting software is uploaded.
Completing the entire process will require you to log in so that we can
verify the system is working as anticipated. Therefore, if you plan to go
on holiday during this period, please inform IT Support immediately of
the dates you will be out so that we can plan an alternate date to
accommodate your schedule.
If you have any questions, please contact IT Support staff at extension 48.
Adapted from Toeicexamstore.com
-23-
1. When is the installation of the operating system expected to be finished?
A. in the first week of June
B. In the middle of June
C. At the end of June
D. In the first week of July

2. Who is asked to contact IT Support?


A. Employees who do not need the accounting software
B. Accountants already using the new operating system
C. Staff who work outside the offices
D. Employees who are taking time off
Task 3. Work in pairs. Put these steps in reinstalling an operating system in the correct
order.

During the process, the computer will restart by itself several times.
Near the end of the process, you can partition the hard drives.
In the BIOS, set the first boot drive to DVD. Then reboot again.
At the end of the process, the operating system will ask for the product
key, time, date, network type and details for user accounts.
First, put the installation DVD into the optical drive. Then reboot the
computer while you press the “F2” key. The BIOS will now start.
This time, the computer will boot from the DVD and installation will
begin.
1 Before you start, back up everything.
Near the start of the process, it will ask you to agree to the license term

Task 4. Find words in exercise 3 that match these definitions.


a. start again________________
b. split a hard drive into parts that act like separate drives________________
c. software built into a computer that controls how it starts up________________
d. the drive that the computer reads first when starting up________________
e. software comes with this to show you are the owner________________
f. settings for a user________________
g. switch a computer off and on again________________
h. a series of actions to do something________________
i. copy data to another place so that you don’t lose it________________
j. rules about how you can use software________________

WRITING
This description of the Mac OS X is drawn from the table below. Write a similar
description of Linux.
-24-
Criteria Mac OS X Linux
type Unix-based Unix-based
computer Apple Mac wide variety
features memory-protection, pre-emptivemulti- variety of
tasking, symmetric multiprocessing distribution kits
support available

graphics engine Quartz XFree86


standard support advanced-PDF, OpenGL, Quicktime

user interface type GUI command line, GUI


user interface Aqua KDE, Gnome
source code not available freely available
availability

Mac OS X is a Unix-based operating system designed for use on Apple Mac


computers. It includes memory-protection, pre-emptive multitasking and symmetric
multiprocessing support. Graphics are provided by a graphics engine known as Quartz.
It has advanced-PDF standards support, OpenGL and Quicktime integrated into the
OS. The operating system features are accessed through a graphical user interface
called Aqua.

………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………

-25-
TRANSLATION
1. A computer is an electronic machine which can accept data in a certain form, process
the data, and give the results of the processing in a specified format as information.
………………………………………………………………………………………………
………………………………………………………………………………………………
2. The role of the operating system is to communicate directly with the hardware.
………………………………………………………………………………………………
………………………………………………………………………………………………
3. One task of the supervisor program is to load into memory non- resident programs as
required.
………………………………………………………………………………………………
………………………………………………………………………………………………
4. The success or failure of any computer system depends on the skill with which the
hardware and software components are selected and blended.
………………………………………………………………………………………………
………………………………………………………………………………………………
5. A mainframe is used by large organizations that need to process great amount of data.
………………………………………………………………………………………………
………………………………………………………………………………………………
6. A computer system consists of two parts: hardware and software. Hardware is an
electronic or mechanic part you can see or touch. Software is a set of instructions, called a
program, which tells the computer what to do
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………

-26-
UNIT 3 DATABASES

PART 1 DATABASE BASICS

STARTER
Task 1. Fill in the gaps.
Record Sort Database Search Fields

A stores data in tables.

Database can be used to and data easily.


Task 2. Work in pairs and decide the following statements are True (T) or False (F).
1. __________ Databases can store large numbers of records about most things.
2. __________ It’s quick and easy to find information in a database.
3. __________ Data in databases is always secure and can’t be stolen.
4. __________ Databases can keep information organized and give you the power to use it
how you like.
5. __________ Electronic databases can never accidentally get deleted or go wrong.

READING 1
Task 1. Look at the illustration, which represents a database file. Can you identify a
record and a field?

-27-
Task 2. Read the text and check your answer to task 1.
Databases
A database is a collection of related data, and the software used in databases to store,
organized and retrieve the data is called the Database management system, or DBMS.
However, we often use the word database to cover both meanings. A database can manage
any type of data, including text, numbers, images, sound and video and hyperlinks (links to
websites).
Information is entered into the database via fields. Each field holds a separate piece
of information, and the fields are grouped together in records. Therefore, a record about an
employee might consist of several fields which give their name, address, phone number,
date of birth, salary and length of employment with the company.
Records are grouped together into files which hold large amounts of information.
Files can easily be updated- you can always change fields, add new records or delete old
ones. An electronic database is much faster to consult and update than a card index system
and occupies a lot less space. With the right software, you can keep track of stock, sales,
market trends, orders and other information that can help your company stay successful.
A database program lets you create an index- a list of records ordered according to
the content of certain fields. This helps you to search the database and sort records into
numerical or alphabetical order very quickly. Modern databases are relational- that is, they
are made up of related files: customers and orders, vendors and purchases, students and
tutors, etc. Two database files can be related as long as they have a common field. A file of
students, for example, could include a field called Tutor ID and another file with details of
tutors could include the same field. This key field can be used to relate the two files.
Databases like Oracle, DB2 and MySQL can manage these relationships.
A database query function allows you to extract information according to certain
conditions or criteria. For example, if a managing director wanted to know all the customers

-28-
that spend more than €8,000 per month, the program would search on the name field and
the money field simultaneously.
The best database packages also include network facilities, which can make
business more productive. For example, managers of different departments can have direct
access to a common database. Most aspects of the program can be protected by user-defined
passwords and other security devices. For example, if you wanted to share an employee’s
personal details but not their commission, you could protect the commission field.
Adapted from https://slideplayer.com/slide
Task 3. Answer the following questions.
1. What does DBMS stand for?
_____________________________________________________________________
2. What types of data can a database manage?
_____________________________________________________________________
3. How is Information entered into the database?
_____________________________________________________________________
4. What can be done to update files?
_____________________________________________________________________
5. What is an index?
_____________________________________________________________________
6. When can two database files be related?
_____________________________________________________________________
7. What would the program do if a managing director wanted to know all the customers
that spend more than €8,000 per month?
_____________________________________________________________________

Task 4. Match the terms with their appropriate definitions or explanations.


1. Database a. a number of computers that are
connected together so that they can share
information.
2. Database management system b. a collection of fields.
3. Field c. a list of records ordered according to the
content of certain fields.
4. Record d. the software used in databases to store,
organized and retrieve the data.
5. File e. a secret word or combination of letters
and numbers that you use to prove who you
are when you use a computer, website, etc.
6. Index f. a division of a database (a collection of
similar information on a computer) that
contains a particular type of information,
such as names or numbers.
7. Network g. is a collection of related data.
8. Password h. information stored on a computer as one
unit with one name.

-29-
9. Security i. to look for information on a computer, the
Internet, etc.
10. Search k. the protection of information against
being stolen or used wrongly or illegally.

Task 5. Complete the puzzle.

1. A collection of data stored in a PC in a systematic way.


2. A unit of a database file made up of related fields.
3. A single piece of information in a record.
4. A_____________ database maintains separate, related files, but combines data elements
from files for queries and reports.
5. Some companies have several computers sharing a database over a _____________
6. To look for specific information, for example the name of an employee.
7. To classify records into numerical or alphabetical order.
8. A tool that allows you to extract information that meets certain criteria.

LISTENING
Task 1. Planning the database is an important step. A well planned database design is
crucial for building a robust database that meets user data requirements. Work in
pairs, try to match the steps in Database Design Planning Process with their planning
activities.
1. Step 1 a. Mapping Business Processes, Rules and Policies.
2. Step 2 b. Defining the User Data Requirements.
3. Step 3 c. Defining the Database Objectives.
4. Step 4 d. Creating Data Models.
5. Step 5 e. Defining the Database Requirements Specifications.
6. Step 6 f. Database Normalization.
7. Step 7 g. Database Design Team and Stake holders.
8. Step 8 h. Creating Conceptual Data Model.
-30-
9. Step 9 i. Creating Logical Data Model.

Task 2. Database Normalization is an important step in Database Planning. Work in


groups to discuss the main objective of this step.

Task 3. (Track 3.1) Watch a video about Database Normalization and check the
answers to task 2.
Task 4. Watch the video again and complete the talk by choosing ONE of the words
in the box below.
decomposing enrolled invented root multiple
redundant solution present duplicate entity

Welcome to learncomputerscienceonline.com and in this video we are going to


discuss one of the most important topic in the database design that is database
normalization.
The term database normalization is used in the context of relational databases. The
relational database model was (1) __________and proposed by a British computer scientist
Ef Cod. In relational database, the logical structure of the database consists of number of
interrelated tables and each table represents a single database (2)__________. The database
normalization is simply a process of (3) __________ the large tables into as small but more
meaningful tables. The large tables essentially means a table that combines the data of
multiple database entities however the duplication of data at multiple places becomes a
major problem with large tables. The presence of duplicate data in the multiple records is
referred as (4)__________ data. Let us first understand the problem of redundant data with
one simple example. Let us consider an example of a student table. This single table stores
the data related to the students course (5) __________ by the students and the instructor
-31-
details for each course. The problem with this table is the presence of (6) __________ of
data present in the (7) __________ records. For example, the data of course enrolled by
the each student and the data of instructor details are (8)__________ in multiple records as
redundant data. The redundant data is the (9)__________ cause of many potential problems
and therefore the database designers must fix the problem of data redundancy while
designing the database. The database normalization process provides (10)__________ to
the problem of data redundancy and the database anomalies caused due to the problem of
redundant data in the database tables.
Adapted from: https://www.youtube.com/watch?v=nAWvs8z5h4o&t=25s

READING 2
Task 1. There are various types of databases used for storing different varieties of
data. In groups of three or four, complete the following diagram.

Task 2. Read the first paragraph of the text and answer the following questions.
1. How are databased closely defined?
2. What is a database system referred to?
Introduction to Types of Database
Basically databases are data warehouses. Since we also have a book store in a public
library, we can assume that a database of books is a library. However, closely defined,
databases are computer frameworks which store, organize, protect and supply data. A
database system is referred to as a system for the management of a database or DBM.

-32-
1. Distribution Database
In comparison to the centralized database idea, there are inputs from the general
database and the information collected from local computers. The data is not accessible in
a single location and is distributed to various company sites. These sites are connected to
each other through communication links that enable access to the data distributed.
A distributed database in which various parts of a database are located in different
physical locations along with databases replicated and distributed between different points
in a network can be imagined. Heterogeneous and homogenous are the two kinds of
distribution database. Databases with the same base hardware and running on the same
operating systems and applications are known as homogeneous DDBs. In different sites of
the DDB defined as a heterogeneous DDB, operating systems, the underlying hardware and
application procedures can be different.
2. Relational Database
Such databases are classified by a set of tables, in which data falls into a predefined
classification. The table is made up of rows and columns with data input for a certain
category and rows, with the example of the data identified by the category. The Structured
query language is the standard interface of a relation-database user and application
program. There are several basic operations which can be added to a table that enables the
expansion of these databases, joining two commonly-related databases and modifying all
existing applications.
3. Object Oriented Database
An object-driven database is an object-driven and relational database collection.
There are different items, such as java, C++, that can be saved in a relational database using
object-oriented programming languages, but object-oriented databases are suitable for these
components. An object-oriented database will be organized instead of actions around
objects and data instead of logic. In contrast to an alphanumeric value, for example, a
multimedia record in a relational database can be a definable data object.
4. Cloud Database
Nowadays, data are actually stored in a public cloud, a hybrid cloud or a private
cloud, also known as a virtual environment. A cloud database is an automated or built-in
database for such a virtualized environment. A cloud service offers various advantages,
including the ability to pay per user storage capacity and bandwidth and provides scalability
on request, as well as high availability. In addition, a cloud platform allows companies to
support enterprise applications in the delivery of software as a service.
5. Centralized Database
The data is stored centrally and users from various locations can access this data.
This database includes hiring processes that help users even from a remote location to
access the data. For verification and validation of end-users, various types of authentication
procedures are applied, and the application processes keeping a track and record of data
utilization also provide registration numbers.
6. End User Database
The end-user is generally not worried about purchases or transactions at different
levels and only understands the commodity that is a program or application. It is, therefore,

-33-
a collaborative database that is designed specifically for the end-user as do the managers at
various levels. This database offers a list of all the details.
7. NoSQL Database
These are used for large data sets. There are certain big data performance problems
that are handled effectively by relational databases, and NoSQL databases can easily
address such problems. The analysis of large-size, unstructured information can be done
very efficiently on several cloud virtual servers.
8. Commercial Database
These are the paid versions of the enormous databases, designed for users who wish
to access the information for assistance. These databases are specific subjects and such huge
information cannot be maintained. Commercial links provide access to such databases.
9. Personal Database
Data is collected and stored on small and easily manageable personal computers.
The data are usually used by the same company department and are viewed by a small
number of individuals.
10. Operational Database
In this folder, information on a company’s operations is stored. These databases are
needed for functional lines such as marketing, employee relationships, customer service,
etc.
Adapted from https://www.matillion.com/resources/blog/the-types-of-databases-with-examples
Task 3. Read the text and decide the following statements are True (T) or False (F).
a.____________ Heterogeneous and homogenous are the two kinds of Relational
database.
b.____________ An object-oriented database will be organized instead of actions
around objects and data instead of logic.
c.____________ A cloud platform allows companies to support enterprise applications
in the delivery of hardware as a service.
d.____________ The analysis of large-size, unstructured information cannot be done
very efficiently on several cloud virtual servers.
e.____________ Data is collected and stored on small and easily manageable personal
computers.
Task 4. Match the terms with their appropriate definitions or explanations.
1. Homogeneous DDBs a. is an automated or built-in database for such a virtualized
environment
2. The Structured query b. are needed for functional lines such as marketing,
language employee relationships, customer service.
3. A cloud database c. a collaborative database that is designed specifically for
the end-user as do the managers at various levels.
4. Operational Database d. databases with the same base hardware and running on
the same operating systems and applications.
5. End User Database e. is the standard interface of a relation-database user and
application program.
6. Centralized Database f. are used for large data sets.

-34-
7. NoSQL Database g. The data is stored centrally and users from different
locations can access this data,

LANGUAGE FOCUS
Asking people to do things
Could you help me, please?
Sure.
Please could you help?
We can use can/could/would No problem.
you + infinitive without to when Can you explain what a database is, please?
we ask somebody to do I’m afraid I can’t.
something for us. Please can you explain what a database is?
I’m sorry, I can’t.
Would you explain that, please?
Could you come back a bit later? I’m busy right now.

-35-
PART 2 DATA PROCESSING

VOCABULARY
Match the headings in the box to the data processing steps a-f.
data coding data collection data entry data sorting
data tabulation data validation

a._________________ Gather the raw data which you want to process.


b._________________ Arrange and systemize the data.
c._________________ Clean the data and double-check for faults and inconsistencies.
d._________________ Enter the data into a system.
e._________________ Arrange the data into table format so that it can be analysed.
f._________________ Create categories to organize the data into relevant groups.

LISTENING
Task 1. Put the data processing steps in Vocabulary into the correct order.
Task 2. (Track 3.2) Listen to an IT expert describing the data processing steps to a
colleague. Check your answers to task 1.

Task 3. (Track 3.3) Listen and mark the syllable stress in these nouns and verbs. Then
listen again and repeat the words.
1. entry 7. gather
2. collection 8. create
3. tabulation 9. arrange
4. validation 10. enter
5. sorting 11. double-check
6. coding 12. format

-36-
SPEAKING
Task 1. Pair works: Explain the data processing steps from Vocabulary in your own
words.
Task 2. Look at the examples of database software below. What database software do
you know? What is it used for?

-37-
SPEAKING AND WRITING
Task 1. Work with a partner to read the advantages and disadvantages of Relational
Database and prepare a five-minute presentation explaining those advantages and
disadvantages. Give your presentation to the class.

Talking about advantages and disadvantages


One great advantage is…. A major drawback/disadvantage is…..
I think the…..is a big plus point. I can see problems with the…..
One point in favour of the …..is….. The downside is…..
The limitation is…..

Making presentation:
+ Introducing yourself and your talk + Referring to visual
For those who don’t know me, my name As you can see in this slide,…
is… This (next) slide/ transparency show…
I’m here today to talk about/ tell you + Concluding
something about… To sum up…
I’m going to speak about… In conclusion…
Feel free to ask questions as we go I’d just to repeat my main points.
along. Are there any questions?
There’ll be time for questions at the end.
+ Structuring the presentation
Firstly/ Secondly/ Thirdly/ Finally…
Let’s now look at…
Moving on, I’d like to say something
about…

-38-
Now we come to…
That brings me to my next point.
I think that covers everything about…

Relational Database Benefits Relational Database Limitations

1 – Simplicity of Model 1 – Maintenance Problem


In contrast to other types of database The maintenance of the relational database
models, the relational database model is becomes difficult over time due to the
much simpler. It does not require any increase in the data. Developers and
complex queries because it has no query programmers have to spend a lot of time
processing or structuring so simple SQL maintaining the database.
queries are enough to handle the data.
2 – Ease of Use 2 – Cost
Users can easily access/retrieve their The relational database system is costly to
required information within seconds set up and maintain. The initial cost of the
without indulging in the complexity of the software alone can be quite pricey for
database. Structured Query Language smaller businesses, but it gets worse when
(SQL) is used to execute complex queries. you factor in hiring a professional
technician who must also have expertise
with that specific kind of program.

3 – Accuracy 3 – Physical Storage


A key feature of relational databases is A relational database is comprised of rows
that they’re strictly defined and well- and columns, which requires a lot of
organized, so data doesn’t get duplicated. physical memory because each operation
Relational databases have accuracy performed depends on separate storage. The
because of their structure with no data requirements of physical memory may
duplication. increase along with the increase of data.

4 – Data Integrity 4 – Lack of Scalability


RDBMS databases are also widely used While using the relational database over
for data integrity as they provide multiple servers, its structure changes and
consistency across all tables. The data becomes difficult to handle, especially
integrity ensures the features like when the quantity of the data is large. Due
accuracy and ease of use. to this, the data is not scalable on different
physical storage servers. Ultimately, its
performance is affected i.e. lack of
availability of data and load time etc. As the
database becomes larger or more distributed
with a greater number of servers, this will
have negative effects like latency and
-39-
availability issues affecting overall
performance.

5 – Normalization 5 – Complexity in Structure


As data becomes more and more Relational databases can only store data in
complex, the need for efficient ways of tabular form which makes it difficult to
storing it increases. Normalization is a represent complex relationships between
method that breaks down information objects. This is an issue because many
into manageable chunks to reduce applications require more than one table to
storage size. Data can be broken up into store all the necessary data required by their
different levels with any level requiring application logic.
preparation before moving onto another
level of normalizing your data.
Database normalization also ensures that
a relational database has no variety or
variance in its structure and can be
manipulated accurately. This ensures that
integrity is maintained when using data
from this database for your business
decisions.
6 – Collaboration 6 – Decrease in performance over time
Multiple users can access the database to The relational database can become slower,
retrieve information at the same time and not just because of its reliance on multiple
even if data is being updated. tables. When there is a large number of
tables and data in the system, it causes an
increase in complexity. It can lead to slow
response times over queries or even
complete failure for them depending on
how many people are logged into the server
at a given time.

7 – Security
Data is secure as Relational Database
Management System allows only
authorized users to directly access the
data. No unauthorized user can access
the information.

Task 2. Basing on the information given in Task 1, write a paragraph about the
advantages and disadvantages of Relational Database.
Useful structures:

Topic sentence:
- It is believed that …….has its own advantages and disadvantages.
-40-
OR
- This paragraph will present the benefits and drawbacks of…
Supporting ideas: Advantages Supporting ideas: Disadvantages
- - It can be said that…….has some positive - On the other hand, there are a number
effects. of disadvantages of…….that people
should take into consideration.
- Despite these aforementioned benefits,
several drawbacks do exist.
OR However, …….is not completely
benefit, there are several negative
aspects that should be taken into
consideration.
- The main/most important advantage/benefit• - The main/most/serious disadvantage of
of…….is that……. …….is …….
- One/ Another/ An ad ditional advantage • - One/An additional disadvantage of
of…….would be……. …….would be …….

Your writing

-41-
TRANSLATION
Translate the following sentences into Vietnamese.

1. Basically databases are data warehouses. Since we also have a book store in a public
library, we can assume that a database of books is a library.
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
2. In different sites of the DDB defined as a heterogeneous DDB, operating systems, the
underlying hardware and application procedures can be different.
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
3. There are several basic operations which can be added to a table that enables the
expansion of these databases, joining two commonly-related databases and modifying all
existing applications.
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
4. A cloud service offers various advantages, including the ability to pay per user storage
capacity and bandwidth and provides scalability on request, as well as high availability.
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
5. There are certain big data performance problems that are handled effectively by relational
databases, and NoSQL databases can easily address such problems.
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………

-42-
UNIT 4 ARTIFICIAL INTELLIGENCE

VOCABULARY
Match these words with the definitions.

1. artificial a. an internet service that provides movies, music, or TV


shows
2. digital b. to suggest something that a person might enjoy or find
useful
3. streaming platform c. made by humans; not natural
4. recommend d. someone who studies or experiments with something
5. researcher e. relating to computers

LISTENING 1
Task 1. (Track 4.1) Listen to a short talk about Artificial Intelligence, then fill in the
blank with ONE suitable word.

Artificial intelligence, or AI, is any type of (1) _____________ that can learn how to do
tasks on its own. Artificial intelligence is starting to become very (2) _____________ in
everyday life. Phones and tablets often come with (3) _____________ digital assistants.
Streaming platforms use AI to recommend content to their users. The type of AI we have
today is called narrow AI, which means it can only perform very specific tasks. Researchers
are trying to create something called general AI, which would be able to think and learn
like a human. But many scientists are concerned about the (4) _____________ digital
assistants. An extremely intelligent computer would be very good at accomplishing its (6)
_____________, but it might not care very much about human life.
Adapted from https://builtin.com/artificial-intelligence
Task 2. Listen again and choose the best answer.

1. The type of AI we have today is called

-43-
A. Narrow AI
B. General AI
C. Simple AI
2. General AI would be able to
A. recommend content to people
B. perform some specific to people
C. think like a human
3. Some scientists are concerned about AI because
A. It might not care about human life.
B. It might start to hate humans
C. It might not be good at accomplishing goals

READING 1

What is Artificial Intelligence (or Machine Learning?)

Every day, a large proportion of the population is at the mercy of a rising


technology, yet few actually understand what it is. Artificial Intelligence. Thanks to books
and movies, each generation has formed its own fantasy of a world ruled or at least served
by robots. We’ve been conditioned to expect flying cars that steer clear of the traffic and
robotic maids whipping up our weekday dinner. But if the age of AI is here, why don’t our
lives look more like the Jetson’s? Well, for starters, that’s a cartoon. And really, if you’ve
ever browsed Netflix movie suggestions or told Alexa to order pizza, you’re probably
interacting with artificial intelligence more than you realize.
AI is designed so you don’t realize that there’s a computer calling the shots. In basic
terms, AI is a broad area of computer science that makes machines seem like they have
human intelligence. So it’s not only programming a computer to drive a car by obeying
traffic signals, but that program also learn to exhibit signs of human-like road rage.
As intimidating as it may seem, this technology isn’t new. Actually, for the past half-
a-century, it’s been an idea ahead of its time. The term Artificial Intelligence was first
coined back in 1956 by Dartmouth professor John McCarthy. He called together a group
-44-
of scientists and mathematicians to see if machines could learn like young child does, using
trial and error to develop formal reasoning. The project proposal says they’ll figure out
how to make machines “use language, form abstractions and concepts, solve kinds of
problems now reserved for humans, and improve themselves.”
That was more than 60 years ago. Since then, AI has remained for the most part in
university classrooms and super-secret labs. But that’s changing. Like all exponential
curves, it’s hard to tell when a line that’s slowly ticking upwards is going to skyrocket.
During the past few years, a couple of factors have led AI becoming the next “big” thing.
Huge amounts of data are being created every minute. In fact, 90% of the world’s data has
been generated in the past two years. Thanks to advances in processing speeds, computers
can actually make sense of all this information more quickly. Because of this, tech giants
and venture capitalists have bought into AI and are infusing the market with cash and new
applications. Very soon, AI will become less artificial, and a lot more intelligent.
When it comes to AI, a robot is nothing more than the shell concealing what’s
actually used to power the technology. That means AI can manifest itself in many different
ways. Let’s break down the options. First, you have your bots. They’re text-based and
incredibly powerful, but they have limitations. Ask a weather bot for the forecast, it will
tell you it’s partly cloudy, but ask the same bot what time it is in Tokyo, it’ll get confused.
That’s because the bot’s creator only programmed it to give you the weather by pulling
from a specific data source. Natural language processing makes these bots a bit more
sophisticated. When you ask Siri or Cortana where the closest gas station is, it’s really
translating your voice into text, feeding it to a search engine, and reading the answer back
in human syntax.
Like human, a machine retains information and becomes smarter over time. But
unlike a human, it’s not susceptible to things like short-term memory loss, information
overload, sleep deprivation, and distractions. With machine learning, programs analyze
thousands of examples to build an algorithm. It then tweaks the algorithm based on if it
achieves its goal. Overtime, the program actually gets smarter. That’s how machine like
IBM’s Watson can diagnose cancer, compose classical symphonies or crush Ken Jennings
at Jeopardy. Some programs even mimic the way that human brain is structured, complete
with neural networks that help humans.
Adapted from https://en.islcollective.com/english-esl-worksheets/skill/speaking/what-artificial-intelligence/98088
Task 1. Match the bold terms in the text with the definitions.

1. at the mercy a. having great extent or expanse


2. browse b. to make up, devise, invent
3. calling the shots c. a computer program that works automatically, especially one
that searches for and finds information on the internet
4. broad d. a situation that is controlled by someone or something with the
power to harm you.
5. road rage e. a program that searches for and identifies items in a database
that correspond to keywords or characters specified by the use
6. coin f. fill, imbue, pervade

-45-
7. trial and error g. the arrangement of words and phrases to create well-formed
sentences in a language
8. infusing h. to examine casually
9. bot i. information retained in the brain and retrievable from it over a
brief span of time
10. search engine j. the process of experimenting with various methods of doing
something until one finds the most successful
11. syntax k. to be the person who makes all the important decisions and
who has the most power in a situation.
12. short-term l. a predetermined set of instructions for solving a specific
memory problem in a limited number of steps
13. algorithm m. violent anger caused by the stress and frustration involved in
driving a motor vehicle in difficult conditions

Task 2. Use the words and phrases below to fill in the blank spaces; some word forms
need to be changed.

At the mercy broad deprivation trial and error

figure out goal revenge skyrocket

break down master achieve seek

1. Artificial Intelligence is slowly making progress, but it could soon ____________ into a
new trend in technology.
2. If you want to ____________ your ____________ of learning English, you will have to
study a lot.
3. Many computer scientists are now trying to ____________ ____________ how
computers can learn to think like humans.
4. Many movies have been produced about robots ____________ ____________ on
humanity.
5. Many people suffer from insomnia, which is simply sleep ____________.
6. People today are ____________ ____________ ____________ of the rising technology
of Artificial Intelligence.
7. There are many different branches of Artificial Intelligence. It is a ____________ field.
8. To ____________ a language usually takes many years of study and exposure to the
language.
9. We learn many lesson from our mistakes. We all learn by ____________ ____________
____________.
10. You can ____________ Artificial Intelligence into 6 major branches: robotics, vision
systems, natural language processing, learning systems, neural networks and expert
systems.
-46-
Task 3. Read the text again and then answer the following questions.
1. Do many people today interact with artificial intelligent?
________________________________________________________________________
________________________________________________________________________
2. What is AI?
________________________________________________________________________
________________________________________________________________________
3. How long has Artificial Intelligence been around?
________________________________________________________________________
________________________________________________________________________
4. What has happened to AI during the last few years?
________________________________________________________________________
________________________________________________________________________
5. What has caused AI to have the ability to improve so much in recent years?
________________________________________________________________________
________________________________________________________________________
6. What is a bot?
________________________________________________________________________
________________________________________________________________________
7. What advantages does machine learning have over human learning?
________________________________________________________________________
________________________________________________________________________
8. What advantages does human learning have over machines?
________________________________________________________________________
________________________________________________________________________
9. What functions can Watson (IBM’s computer) perform?
________________________________________________________________________
________________________________________________________________________
10. Do you think Robots will eventually take over the world? What is a more likely problem
humans will face in the future if AI becomes the next big thing?
________________________________________________________________________
________________________________________________________________________
______________________________________________________________________
VOCABULARY
1. Guess the meaning of these AI apps.

autocomplete translation app social media feed robot floor cleaner

digital assistant shopping recommendations speech-to-text chatbot

facial recognition

-47-
2. Match these words with the pictures.

1. 2.

3. 4.

5.

6.

-48-
7.

8.

9.

LISTENING 2
(Track 4.2) Listen to some people talking about the benefits and disadvantages of the
above artificial intelligence apps. Then, write notes for their benefits or disadvantages.
The first example has been done for you.
AI apps Benefits Disadvantages
Facial recognition - good - had problem when
(Face ID) - improve safety and security wearing mask
Digital assistant - -
(Alexa)
Auto complete - -

Online shopping - -
recommendation

Social media feeds - -

-49-
The robot floor - -
cleaner

Translation apps - -

Chatbot - -

Speech-to-text - -

Adapted from https://eslflow.com/computing-technology-and-innovation-vocabulary-and-language-exercises.html

SPEAKING
Work in group, ask and answer these questions. You should use the useful language
recommended below.
1. Which AI apps is the most interesting for you? Why?
2. Which AI app do you use most often? Why do you use it?
3. Which AI app is the most annoying? Explain
4. Which AI app do you never use? Why?
5. What would be the dream AI app for you? Use your imagination?

USEFUL LANGUAGE
Well, my most interesting AI app is..........
I think ..... is fantastic, it can help you....
You can ......
It saves a lot of time and energy
It is so useful when you ....
I think it is quite stupid ....

WRITING
Base on the suggestions given below, write a paragraph about the benefits and the
limitations of artificial intelligence.

BENEFITS AND LIMITATIONS


One (great/main) advantage of… is… A major drawback/disadvantage is…
The most important advantage of… is… The problems with the…
An additional advantage of… is… The downside is…
the….is a big plus point. An additional disadvantage of… is…
One point in favour of the … is…. The most important drawback of… is…

Examples:
-50-
- One of the main advantages of Artificial Intelligence is that it can significantly
reduce errors and increase accuracy.
- A major drawback of AI is that can cost a great amount of money.

Your writing

READING 2
Robots smarter than humans by 2029

A scientist said robots will be more intelligent than humans by 2029. The scientist’s
name is Ray Kurzweil. He works for Google as Director of Engineering. He is one of the
world’s leading experts on artificial intelligence (AI). Mr Kurzweil believes computers will
be able to learn from experiences, just like humans. He also thinks they will be able to tell
jokes and stories, and even flirt. Kurzweil’s 2029 prediction is a lot sooner than many

-51-
people thought. The scientist said that in 1999, many AI experts said it would be hundreds
of years before a computer was more intelligent than human. He said that it would not be
long before computer intelligence is one billion times more powerful than the human brain.
Mr Kurzweil joked that many years ago, people thought he was a little crazy for
predicting computers would be as intelligent as humans. His thinking has stayed the same
but everyone else has change the way they think. He said: “My views are not radical any
more. I’ve actually stayed consistent. It’s the rest of the world that’s changing its view.” He
highlighted examples of high-tech things we use, see or read about every day. These things
make us believe that computers have intelligence. He said people think differently now:
“Because the public has seen things like Siri (the iPhone’s voice-recognition technology)
where you talk to a computer; they’ve seem the Google self-driving cars.”
Adapted from The Daily Mirror/ The Japan Times
Task 1. Read the text and decide whether these statements are True (T) or False (F).
1. _______This research is conducted by a scientist from Google.
2. _______The article says the scientist is an expert on jokes around the world.
3. _______Many people talk robots would be smarter than humans in 1999.
4. _______The scientist believes computers will be a billion times smarter than us.
5. _______Most people now think about robots more like the scientist does.
6. _______The scientist said his views about robots are more radical than ever.
7. _______The scientist said our everyday things show us computer intelligence.
8. _______The article says Siri is the name of Google’s self-driving cars.

Task 2. Match the words in column A with their synonym in column B.


Column A Column B
1. more intelligent a. mad
2. leading b. strong
3. experiences c. forecast
4. prediction d. pointed to
5. powerful e. smarter
6. crazy f. way of thinking
7. thinking g. events
8. view h. top
9. highlighted i. people
10. the public j. opinion

Task 3. Follow-up discussion.


Take turns ask and answer these questions.
1. Do you think computers will be smarter than us?
2. How scary is it to think that computers will be more intelligent than us?
3. Is it possible for computers to control all humans one day?
4. What kind of robots would you like?
5. Are robots dangerous?
6. Do you think there will be cyborgs (half-human/ half robot) in the future?

-52-
TRANSLATION
Translate these sentences into Vietnamese.
1. For decades, humanity envisioned and dreamed of a technology-enabled future. One with
autonomous transportation, flying vehicles, a clean and safe environment and a healthy,
extended life.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................

2. Although Artificial General Intelligence (machines that compare to or surpass the human
mind) still belongs in the distant future, researchers believe that machines are gradually
approaching human levels when performing simple tasks, such as understanding naturally
spoken language or evaluating unknown, new situations.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
3. One of the most common applications of AI today is speech recognition. The biggest
breakthrough in speech recognition thus far has come from IBM, which has managed to
reduce the error rate in conversational speech recognition to 5.5% (relative to the human
error rate is of 5.1%).
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................

4. Other existing AI applications include predictive technologies found in early self-driving


cars and search engines. Companies such as Netflix, Pandora are also using AI to improve
content recommendations.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
5. Despite countless advancements, machines still lack the ability to process deep emotional
intelligence.
................................................................................................................................................
................................................................................................................................................

-53-
FURTHER READING
Artificial Intelligence May Doom The Human Race Within A Century
An Oxford philosophy professor who has studied existential threats ranging from
nuclear war to superbugs says the biggest danger of all may be superintelligence.
Superintelligence is any intellect that outperforms human intellect in every field, and Nick
Bostrom thinks its most likely form will be a machine -- artificial intelligence.
There are two ways artificial intelligence could go, Bostrom argues. It could greatly
improve our lives and solve the world's problems, such as disease, hunger and even pain.
Or, it could take over and possibly kill all or many humans. As it stands, the catastrophic
scenario is more likely, according to Bostrom, who has a background in physics,
computational neuroscience and mathematical logic.
"Superintelligence could become extremely powerful and be able to shape the future
according to its preferences," Bostrom told me. "If humanity was sane and had our act
together globally, the sensible course of action would be to postpone development of
superintelligence until we figure out how to do so safely."
Bostrom, the founding director of Oxford's Future of Humanity Institute, lays out
his concerns in his new book, Superintelligence: Paths, Dangers, Strategies. His book
makes a harrowing comparison between the fate of horses and humans. Horses were
initially complemented by carriages and ploughs, which greatly increased the horse's
productivity. Later, horses were substituted for by automobiles and tractors. When horses
became obsolete as a source of labor, many were sold off to meatpackers to be processed
into dog food, bone meal, leather, and glue. In the United States, there were about 26 million
horses in 1915. By the early 1950s, 2 million remained.
The same dark outcome, Bostrom said, could happen to humans once AI makes our
labor and intelligence obsolete. It sounds like a science fiction flick, but recent moves in
the tech world may suggest otherwise. Earlier this year, Google acquired artificial
intelligence company DeepMind and created an AI safety and ethics review board to ensure
the technology is developed safely. Facebook created an artificial intelligence lab this year
and is working on creating an artificial brain. Technology called "deep learning," a form of
artificial intelligence meant to closely mimic the human brain, has quickly spread from
Google to Microsoft, Baidu and Twitter. (...) In an interview about his book Bostrom points
out that there are few people working full time on AI control problem. They need more
brilliant brains to this technical work. His hope is that his book will do something to
encourage that. ‘How to control super-intelligent AI is really the most important task of our
time -- yet, it is almost completely ignored.’ says Bostrom.
Adapted from: http://www.huffingtonpost.com
Read the article and choose the correct answer.
1. Superintelligence
A is a substitute for the human intellect.
B will possibly take form of a machine.
C is a machine replacing the human intellect.
D is any intellect which is better than the human one in some fields.
2. According to Bostrom artificial intelligence
A is going to kill all the humanity.
B will probably do us more good than harm.
-54-
C could be a solution for major problems.
D improves the humanity’s intelligence.
3. Bostrom’s advice is
A to stop developing superintelligence for good.
B for people to join forces and improve superintelligence.
C the best way would be to give up developing superintelligence.
D to find some ways of controlling the superintelligence
4. The problem with the horses was that
A they were not productive any more.
B they were more useful for humanity for their meat than for their labor.
C they were a source of labor for meatpackers.
D their labor was taken over by cars.
5. Bostrom says
A controlling the AI is an urgent problem which is being ignored.
B the main task is to control brilliant brains.
C more intelligent people are needed to overtake the AI’s work.
D his book will bring the change in controlling the AI.

-55-
UNIT 5 NETWORK SYSTEMS

VOCABULARY
Match these types of computer networks with the pictures.

LAN (Local Area Network) WAN (Wide Area Network)


MAN (Metropolitan Network) CAN (Campus Area Network)
HAN (Home Area Network)

22.

1.

3.

4.

-56-
5.

LISTENING 1

Agatha is the owner of a small flower shop. Katharina is a network architect. Agatha
needs some advice from Katharina about a network solution for her company.

Task 1. (Track 5.1) Listen and answer these questions.


1. What does Agatha think she should do?
________________________________________________________________________
________________________________________________________________________
2. What does Katharina recommend?
________________________________________________________________________
________________________________________________________________________
3. What does Katharina say she will do?
________________________________________________________________________
________________________________________________________________________
4. When does Agatha want the network to be ready?
________________________________________________________________________
________________________________________________________________________
Task 2. Read Katharina’s email to Agatha. Complete this email with the words in the

-57-
box.

equipment Internet LAN recommend

remote should VPN WAN

SPEAKING

Work in group, look at the pictures below and discuss these questions. Which
network solution would you recommend for a large corporation or organization, a
small business and a family home? Why?

-58-
USEFUL LANGUAGE
I’d recommend LAN for used within households or a single building.
Typically, it includes one router, that all the computers in the network use to access the
internet. It also includes a file server; this is the computer that hosts the network.

READING 1
Warm-up
Match the words of network devices with the pictures.

Computer network

-59-
What is a computer network?

A computer network comprises two or more computers that are connected—either


by cables (wired) or WiFi (wireless)—with the purpose of transmitting, exchanging, or
sharing data and resources. You build a computer network using hardware (e.g., routers,
switches, access points, and cables) and software (e.g., operating systems or business
applications).
A network consists of:
• nodes, that is to say different computers and devices
• a connecting medium, such as cable or a wireless connection
• routers, which are special computers enabled to send messages
• switches, that is to say devices which help to select a specific path to follow
Computer network types
As networking needs evolved, so did the computer network types that serve those
needs. Here are the most common and widely used computer network types:
• LAN (local area network): A LAN connects computers over a relatively short
distance, allowing them to share data, files, and resources. For example, a LAN may
connect all the computers in an office building, school, or hospital. Typically, LANs
are privately owned and managed.
• WLAN (wireless local area network): A WLAN is just like a LAN but
connections between devices on the network are made wirelessly.
• WAN (wide area network): As the name implies, a WAN connects computers
over a wide area, such as from region to region or even continent to continent. The
internet is the largest WAN, connecting billions of computers worldwide. You will
typically see collective or distributed ownership models for WAN management.
• MAN (metropolitan area network): MANs are typically larger than LANs but
smaller than WANs. Cities and government entities typically own and manage
MANs.
• PAN (personal area network): A PAN serves one person. For example, if you
have an iPhone and a Mac, it’s very likely you’ve set up a PAN that shares and
syncs content—text messages, emails, photos, and more—across both devices.
• SAN (storage area network): A SAN is a specialized network that provides
access to block-level storage—shared network or cloud storage that, to the user,
looks and works like a storage drive that’s physically attached to a computer.

-60-
• CAN (campus area network): A CAN is also known as a corporate area network.
A CAN is larger than a LAN but smaller than a WAN. CANs serve sites such as
colleges, universities, and business campuses.
• VPN (virtual private network): A VPN is a secure, point-to-point connection
between two network end points. A VPN establishes an encrypted channel that
keeps a user’s identity and access credentials, as well as any data transferred,
inaccessible to hackers.
The exchange of information in a network is controlled by communications
protocols, which define the formats and rules that computers must follow when talking to
one another.
Well-known communications protocols are Ethernet, which is a family of protocols
used in LANS, and the Internet Protocol Suite, which is used in any computer network.
Computer networks offer many advantages. For example, they facilitate communication,
allowing people to send emails and texts, make phone/ video calls and videoconference.
Furthermore, networks allow people to share files, data and other types of information as
users may access data and information stored on other computers in the network.
On the other hand, networks may be difficult to set up and may be insecure as computer
hackers can send viruses or computer worms to the net computer. They may also interfere
with other technologies, as power line communication strongly disturb certain forms of
radio communication and access technology such as ADSL.
Adapted from https://www.javatpoint.com/types-of-computer-network

Task 1. Read the text and then answer the following questions.
1. What does a computer network consist of
________________________________________________________________________
________________________________________________________________________
___________________________________________________________________
2. What is the purpose of a computer network?
________________________________________________________________________
________________________________________________________________________
3. How can you build a computer network?
________________________________________________________________________
________________________________________________________________________
4. What is a router?
________________________________________________________________________
________________________________________________________________________
5. What is the function of communication protocols?
________________________________________________________________________
________________________________________________________________________
_______________________________________________________________________
6. What is Ethernet used for?
________________________________________________________________________
________________________________________________________________________
7. What are the advantages of using a network?
________________________________________________________________________
-61-
________________________________________________________________________
8. What are the disadvantages of using a network?
________________________________________________________________________
________________________________________________________________________
Task 2. Read the text a gain and then decide whether these statements are True (T) or
False (F).
1. _____A LAN connects computers in an office building, school, over a relatively long
distance.
2. _____The connection between devices of WLAN and LAN are the same.
3. _____A WAN connects computers over a wide area, such as from country to country
or even continent to continent.
4. _____MANs are typically bigger than LANs but smaller than WANs. Authorities and
government entities typically own and manage MANs.
5. _____A PAN serves a lot of people.
6. _____A SAN works like a storage drive which is attached to a computer.
7. _____A CAN is larger than a WAN but smaller than a LAN.
8. _____A VPN is a secure which keeps a user’s identity and access credentials, as well
as any data transferred, inaccessible to hackers.
Task 3. Match the terms with the definitions.

1. a modern a. is an entrance to another network


2. a repeater b. channels incoming data maintains the bandwidth speed
3. a bridge c. allows wireless devices to connect to the network
4. a router d. modulates and demodulates the data into a digital or an
analog signal
5. a gateway e. channels incoming data but shares the bandwidth among
the devices present on a network
6. a switch f. sends the digital signal further on in the network
7. a hub g. connects networks and sends packages of data between
them
8. a wireless access point h. connects networks that use the same protocol

LISTENING 2
Task 1. (Track 5.2) Watch a video of a technician explaining how to set up a computer
network. Then fill in the blank with ONE suitable word.

Right here, we have two of my computers. I have a MacBook here, and a PC here.
And, they both have Ethernet ports, but where do (1)_______ them to? I can't really connect
them to each other. I mean, that would work for certain things, but it's not a real network.
What I need is something like this: a router. Now, a router has a bunch of (2) _______ in
the back that I can connect to multiple computers, and it also works wirelessly, so I can
connect more computers without (3) _______ . But right now, I'm going to show you how
to connect them with cables. And to do that, we're going to need a bunch of these Ethernet
cables.
-62-
So I'm just going to get one of these, hook it up to my Mac, and the other side is
going to go to one of these ports on my (4) _______ . I'm going to do the same with my PC.
I'm going to take this port right here, and the other side will go right to my router. Now,
what the router is doing right now is giving both of the computers something called IP
Addresses, which is their (5) _______ on the network. These are the numbers that these
computers have, so that other computers can talk to them, and know how to (6) _______
them.
The third thing you could do with your router is connect it to the Internet, so that
both of these computers could also have Internet access, and the way you do it is by (7)
_______ up an Ethernet cable to the one port in the back that looks different from all the
other ports. So, if you look at the back, there are (8) _______ ports that you can use for
computers, and then there's one port usually marked as WAN, or Internet, or Uplink, that
we can take our cable to. And then, the other side goes to our DSL or cable (9) _______
and gives us Internet.
And that's basically how we set up a simple computer network. With a router, you
can connect Macs and Pc's on a (10) _______ network. And you don't really have too much
headaches and compatibility issues, because they all use the same standard, and it just
works.
Adapted from https://www.youtube.com/watch?v=IdRsWGY9zwo

Task 2. Watch the video again and re-order these re-arrange the sentences in the right
order of setting up a computer network.
a. Do the same with the PC
b. Connect the router to the Internet, by hooking up an Ethernet cable to the one port in the
back that looks different from all the other ports.
c. Prepare a Macbook, a PC and a router, a bunch of these Ethernet cables.
d. The router gives both of the computers something called IP Addresses which is their
numbers on the network.
e. Now, both of these computers have Internet access
f. Get one of the cables and hook it up to the Mac and the other side is attached to the ports
on the router
1. ____ 2. ____ 3. ____ 4. ____ 5. ____ 6. ____

WRITING
Look at the diagram below write a short paragraph to describe the process of setting
up a computer network at home. You should follow the suggestions.

-63-
There are ........... main steps in setting up a computer
network.
At the first stage, you should prepare .................
Next, .................
Then, .................
The next step is .................
Finally, .................

Your Writing

-64-
READING 2
Network Topologies

A network topology is the layout of the interconnections of the nodes of a computer


network. It depends on the distance involved, the type of hardware used and the stability
needed.
Task 1. Read the texts about the different network topologies and fill in the gaps with
the words in the box.

nodes circle network pathway affect configure

small destination star failure exchanging backbone

In a bus network all (1) nodes are connected to a


common medium, call backbone, as it happens
with Christmas lights. Information sent along the
(2) ________ travels until the destination is
reached. This kind of topology is generally used
only for (3) ________ networks, as it isn’t able
Bus network to connect a large number of computers. The
main advantage offered by this topology is that
if a computer or device doesn’t work, it doesn’t
(4) ________ the others.

Star bus topology is the most common network


used today. It combines elements of star and
bus topologies to create a more effective
network. Computers in a specific area are
connected to hubs creating a (5) ________
-65-
computer. This means that all the computers
and devices are joined together. This topology
is commonly used in businesses because it can
grant rapidity and safety in (6) ________ data.
Thanks to this topology, data is always up-to-
date and if a computer doesn’t work, it doesn’t
affect the others.
The only disadvantage to it is that if the hub
goes down, the whole (7) ________ doesn’t
work.

Star bus topology


In a ring network each node is connected to its
left in a (8) ________. There is no central hub
that holds all the data, and communication is
sent in one direction around the ring through
the use of a token. As it requires fewer cables,
this topology is less expensive. Nonetheless,
because it provides only one (9) ________
among the nodes, a single node (10) ________
may isolate all the devices attached to the ring.

Ring network
Star bus topology is the most common network
topology used today. It combines elements of
star and bus topologies to create a more
effective network. Computers in a specific area
are connected to hubs creating a (11) ________,
then each hub is connected together along the
network backbone.
The main advantage of this type of topology is
that it can be more easily expanded over time
than a bus or a star. On the other hand, this
topology is more difficult to (12) ________
than the others and if the backbone line breaks,
the whole network goes down.
Star bus topology

Adapted from https://www.eslprintables.com/printable.asp?id=987982

-66-
Task 2. Read the texts again and decide if the following statements are True (T) or
False (F).
1. _______The topology chosen depends only on the location of computers.
2. _______All topologies use many cables and are very expensive.
3. _______ In a bus topology all the buses are connected one after the other.
4. _______In a bus topology a server controls the flow of data.
5. _______In a star network data is always updated.
6. _______The hub doesn’t connect printers and other devices in a star topology.
7. _______In the ring topology each node is connected to the hub.
8. _______In the ring topology if the hub doesn’t work, the network goes down.
9. _______Star bus topology combines elements of bus and ring topologies.
10. _______In a star bus topology a backbone line failure affects the whole network.

Task 3. Read the text again and complete the table with the missing information.
Topology Connection Use Advantages Disadvantages
small network

Each node is
connected to
the central hub

ring

LISTENING 3: Network range and speed

Task 1. (Track 5.3) Listen and complete the dialogue between Karoline and Sam.
Karoline: How do you describe network speed?
Sam: In bits, kilobits, megabits and gigabits. They describe network speed. For example,
dial-up connections allow (1) ________ kilobits per second and DSL from (2) ________
kilobits per second to (3) ________ megabits per second.
Karoline: OK. I’ve got that. What about the range?
Sam: Range is the distance of network coverage, so distance units represent network range.
Most countries use metric but some use feet as units of measurement. Metres or feet usually
describe the range of a network. Home networking routers support a range up to (4)
________ feet or (5) ________ metres indoors and (6) ________ feet or (7) ________
metres outdoors.

-67-
Task 2: Listen and repeat these speeds and ranges.
1. 77 kilobits per second
2. 5 megabits a second
3. 2 gigabits per minute
4. 250 metres
5. 40 feet

TRANSLATION
Translate these sentences into Vietnamese.
1. Computer networks commonly help endpoint users share resources and communicate.
They commonly appear all over the place, such as homes, offices and government
administrations.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
2. Computer networks enable the usage and sharing of any number of applications and
services, including emails, video, audio and plenty of other types of data, over the internet.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
3. Computer networks operate using a varying set of hardware and software. All packet-
switched networks use Transmission Control Protocol/Internet Protocol (TCP/IP) to
establish a standard means of communication.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
4. Endpoint nodes, which are used for routing purposes, include switches and routers,
servers, personal computers, phones, networked printers and other peripheral computing
devices, as well as sensors and actuators.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
5. Network capacity is measured in terms of bandwidth. Bandwidth is quantified by the
theoretical maximum number of bits per second (bps) that can pass through a network
device.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................

-68-
UNIT 6 COMMUNICATION SYSTEMS

VOCABULARY
Label the pictures (1-7) with the Information and Communications Technologies
(ICT) and services in the box.

Fax GPS Call Center Digital Radio

Teletext Wearable computer Digital TV

READING 1
Channels of communication

What are telecommunications?


Telecommunications refers to the transmission of signals over a distance for the
purpose of communication. Information is transmitted by devices such as telephone, radio,
television, satellite, or computer networks. Examples could be two people speaking on their
mobile phone, a sales department sending a fax to a client, or even someone reading the
teletext pages on TV. But in the modern world, telecommunications mainly means
transferring information across the Internet, via modem, phone lines or wireless networks.
Because of telecommunications, people can now work at home and communicate with their
office by computer and telephone. This is called teleworking. It has been predicted that
-69-
about one third of all work could eventually be performed outside the workplace. In call
centers, assistance or support is given to customers using the telephone, email or online
chats. They are also used for telemarketing, the process of selling goods and services over
the phone.
Digital TV and radio
In recent years, TV and radio broadcasting has been revolutionized by developments
in satellite and digital transmission. Digital TV is a way of transmitting pictures by means
of digital signals, in contrast to the analogue signals used by traditional TV. Digital TV
offers interactive services and pay multimedia – that is, it can transmit movies and shows
to TV sets or PCs on pay-per-view basis. It is also widescreen, meaning programmes are
broadcast in a native 16:9 format instead of the old 4:3 format. Digital TV provides a better
quality of picture and sound and allows broadcasters to deliver more channels.
Digital Terrestrial TV is received via a set-top box, a device that decodes the signal
received through the aerial. New technologies are being devised to allow you to watch TV
on your mobile. For example, DMB-H (Digital Video Broadcast-Handled) can send
multimedia (radio, TV and data) to mobile devices.
Audio programs (music, news, sports, etc) are also transmitted in a digital radio
format called DAB (Digital Audio Broadcasting)
Mobile communications
Thanks to wireless connectivity, mobile phones now let you check your email,
browse the Web and connect with home or company intranets, all without wire.
The use of GPS in cars and PDAs is widespread, so you can easily navigate in a foreign
city or find the nearest petrol station. Nowadays, GPS chips are incorporated into almost
every mobile phones.
Another trend is wearable computers. Can you imagine wearing a PC on your belt
and getting email on your sunglasses? Sone devices are equipped with a wireless modem,
a keypad and a small screen; others are activated by voice. The users of wearable technology
are sometimes even called cyborgs! The term was invented by Manfred Clynes and Nathan
Kline in 1960 to describe cybernetic organisms – beings that are part robot, part human.
Task 1. Read the text carefully and find the terms which mean:
1. the device that allows PCs to communicate over telephone lines ___________
2. the practice of working at home and communicating with the office by phone and
computer ___________
3. the term that refers to the transmission of audio signals (radio) or audiovisual signals
(television) ___________
4. five advantages of digital TV over traditional analogue TV ___________
5. two systems that let you receive multimedia on your mobile phone ___________
6. the term that means without wires ___________
7. devices that deliver email and phone services to users on the move ___________
8. the meaning of the term cyborg ___________
Task 2. Complete the sentences with words and phrases from the text.
1. Digital Audio Broadcasting, or DAB is the technology behind ___________. DAB is
intended to replace FM in the near future.
2. ___________ are designed to be worn on the body or integrated into the user’s clothing.

-70-
3. Most existing TV sets can be upgraded to ___________ by connecting a digital decoder.
4. My grandfather is 75 and he is still watches ___________ on TV to find out share prices,
weather forecasts and sport results.
5. I work in a ___________. I receive incoming calls with information inquiries. I also make
outgoing calls for telemarketing.
6. Please complete this form and send it by ___________ or normal mail.
7. I have a ___________ navigation system in my car but I don’t use it very often. My town
is small and I know it well.

LISTENING 1
Task 1. (Track 6.1) Listen to a short talk about “Information and Communications
Technologies (ICT)?”. Then, fill in the blank with suitable word or phrases.

ICT– or Information Communication Technology (technologies). There is no universal


definition of ICT, ICT generally refers to all devices: (1) __________ components,
applications, (2) __________. That facilities interact with the digital world. Sometimes ICT
is used synonymously with IT (Information Technology) but ICT is more comprehensive,
including more components related to (3) __________ and digital technologies. Component
includes data, (4) __________ __________, cloud computing, software, (5) __________,
transaction and communication technology. ICT has dramatically changed how people
work, (6) __________, learn and live. It continues to revolutionize all parts of the human
experience from computer to robot. ICT contributes greatly to (7) __________
development; some have labeled the Fourth Industrial Revolution. Within the ICT market,
the advancement of ICT capabilities has made the developments and delivery of various (8)
__________ cheaper for vendors and their customers and also providing new market
opportunities. For businesses, advances within ICT have brought a slew of cost savings,
opportunities and conveniences ranging from highly automated businesses, cost cutting
business processes to the (9) __________ __________revolution that leads to new insights,
products and services. To ICT –driven transactions like online shopping, telemedicine and
social media. However, ICT is not without a downside, the digitalization of data has led to
new level of crime, automation tools and (10) __________ can displace workers. ICT has
stifled human interaction.
Adapted from https://www.youtube.com/watch?v=4uk1qrCPlts
Task 2. Listen again and answer the following questions.
1. What is ICT?
________________________________________________________________________
________________________________________________________________________
2. What does component consist of?
________________________________________________________________________
________________________________________________________________________
3. How has ICT changed our lives?
________________________________________________________________________
________________________________________________________________________

-71-
4. What are the benefits that ICT bring to the
business?__________________________________________________
________________________________________________________________________
5. What are the drawbacks of ICT?
________________________________________________________________________
________________________________________________________________________

SPEAKING

Work in group and discuss the advantages and disadvantages of ICT in social life.
Then make a presentation.
You can base on the suggestions below.

Advantages Disadvantages
• Speed/time and money can be saved • Lack of security and privacy
• Cost effectiveness • Cause high unemployment rate
• Greater availability • Social media has negative effects on
• Bridging the cultural gap the youth
• Creation of new and interesting jobs • Cyber bulling on the internet
in IT sectors • Reliance on technology
• New opportunity for further
education

USEFUL LANGUAGE

I think that one of the advantages of ICT is ....


The second benefit is ......
Another advantage is.......
However, ICT is not without a downside. First, it ......
Also, it cause .............

WRITING
Write a paragraph about the pros and cons of ICT in social life. You can base on the
suggestion below.

BENEFITS AND LIMITATIONS


One (great/main) advantage of… is… A major drawback/disadvantage is…
The most important advantage of… is… The problems with the…
An additional advantage of… is… The downside is…
the….is a big plus point. An additional disadvantage of… is…
One point in favour of the … is…. The most important drawback of… is…
-72-
Examples:
- One of the main advantages of ICT is that speed/time and money can be saved
because it is much quicker to send/share information around. Communication is
more efficient to contact either business partners or friends and family members
all over the world.
- A major drawback of ICT is lack of privacy and security. From email hacking,
phone signal interception etc. people are worried that personal information may
become public knowledge.

READING 2
Task 1. Match these types of electronic communication with the pictures.

E-mails Instant messaging Podcasting Messaging

Video conferencing Blogging Voice Over Internet Protocol (VOIP)

-73-
1. 2.

3. 4.

5. 6.

7.

ELECTRONIC COMMUNICATION
What is an electronic communication?
-74-
Electronic communication can be defined as, the communication which uses
electronic media to transmit the information or message using computers, e-mail, telephone,
video calling, FAX machine, etc. This type of communication can be developed by sharing
data like images, graphics, sound, pictures, maps, software, and many things.
Types of electronic communication
Electronic communication can be classified into different types like messaging,
voice call, e-mail, social media, etc. We know that e-communication has changed due to
the way public interact and communicate with each other for different purposes like
personal or business. By using this, it is very simple to communicate with the world.
E-MAIL
E-Mail or electronic mail is the most used type of electronic communication. By
using this communication, one can send a message to another person through a mail
immediately. For that, we need to create an account to send an e-mail, media files, photos,
documents, etc. This type of communication has replaced many conventional types of
communication due to many benefits. Therefore, this type of communication is more
suitable for different methods of communication. The benefits of this communication are
ease of usage, completely free, etc. Additionally, this type of electronic communication
doesn’t affect the surroundings.

SMS
The second oldest form of electronic communication is SMS (or short message
service). The first SMS was sent in 1992. Since the early 90s, any mobile phone could send
a short message (or SMS) to another mobile phone. Today, SMSs are rarely used for
personal communication since instant messaging and social media applications can send
the same short messages for free.

BLOGGING
The first form of one-way conversation is blogging, in which a website creator post
short, informal stories or articles on their website. It is a discussion or informational website
published on world wide web consisting of discrete, often informal diary style text entries.
The audience is generally people who are interested in the content of that specific blog.
Whenever a new story is posted, it is automatically moved to the top of the website where
it will be seen first while all the older stories move down one position.

INSTANT MESSAGING
Instant messaging is a service, like SMS, that allows people to send short messages
using their mobiles phones (or computers). However, unlike SMSs, instant messages are
sent for free over the internet and can contain multimedia items like emoji, pictures, videos
and voice recordings. In 2018, the most popular instant messaging applications are
WhatsApp, Facebook Messenger and WeChat, although newer instant messaging
applications like Snapchat and Telegram have gained many users very quickly.

VIDEO CASTING

-75-
Videocasting refers to a form of communication where videos are broadcast over the
internet. Videos can first be created and then uploaded to a website (like YouTube), or they
can be streamed live, allowing people to watch the video as it is created. One very popular
form of videocasting is vlogging. The word vlogging is a combination of two words: Video
and blogging. Vlogging (or a vlog) is like blogging but with videos. As with blogs, vlogs
show several informal, conversational videos with the most popular video appearing first.
These videos can be on any topic and are generally not professionally made. Most channels
you will find on YouTube are examples of vlogs.

PODCASTING
Podcasting (or a podcast) refers to an audio only broadcast released on the internet.
It is a free service that allows Internet users to download audio files from a podcasting Web
site to listen to on their computers or personal digital audio players. As with blogging and
vlogging, there are thousands of different types of podcasts, from novels and dramas, to
news and talk show podcasts to popular culture and documentary podcasts, which means
that there is a podcast for every type of audience.

VOICE OVER INTERNET PROTOCOL (VOIP)


VOIP is a service to make telephone calls over the internet rather than through the
traditional telephone or cell phone networks. It allows voice and multimedia data to be
transferred across a data network. To use VOIP, the signal from an old, analogue phone
system can either be converted to a digital signal or a digital phone system must be installed.
Although VOIP is much cheaper than analogue phones, VOIP systems initially suffered
from many technical problems. These days VOIP is widely used and, together with cell
phones, has caused the analogue phone system to shrink to a fraction of its original size.
VOIP is often combined with video conferencing tools and included in smartphone
applications. This gives users the convenience of making a call from their phone, without
the cost normally associated with a call.

VIDEO CONFERENCING
Video conferencing refers to a set of technologies that allow a person to make a
video call to one or more people at the same time. These calls are like phone calls but can
also include a video broadcast of the people in the call. Popular examples of video call
applications include Skype, FaceTime and Discord.
Adapted from https://www.elprocus.com/electronic-communication-and-its-types/
Task 2. Read the text, then match the terms with their definitions.

1. E-mail a. This is a type of online journal in which the user can


update daily, share, follow and post comments.
2. Messaging b. This kind of technology allows a person to make video
call to one or more people at the same time.
3. Blogging c. This is a type of communication in which videos are
created and uploaded to a website like Youtube.

-76-
4. Instant Message d. This is a free service in which audio only broadcast
released on the internet and users can download to listen.
5. Video Casting e. By using this type of electronic communication, one can
send message to others by using e-mail system.
6. Podcasting f. This is a kind of service in which users make calls over
the Internet rather than through the traditional telephone or
cell phone networks
7. Voice Over Internet g. This is a kind of service that allows people to send short
Protocol message for free.
8. Video conferencing h. This is one of the oldest form of electronic
communication in which people can send short message
with charge.
Task 3. Read the text again and decide whether these statements are True (T) or False
(F).
1. ______E-mail, telephone, video calling, FAX machine are typically used to transmit
information in electronic communication.
2. ______Messaging, voice call, e-mail, social media are examples of electronic
communication.
3. ______E-communication has remained unchanged for years. ______
4. ______Many conventional types of communication have replaced e-mailed due to their
benefits.
5. ______SMSs are no longer used for personal communication since instant messaging
and social media applications can send the same short messages for free.
6. ______When using blogs, bloggers can write informal diary style text entries.
7. ______If you want to send instant messages on Facebook Messenger, Whatsapp or
Snapchat, you will be charged a small fee.
8. ______Vlogging and Blogging are similar in delivering informal styles, however, with
Vlogging, Vloggers can post videos.
9. ______If Internet users want to download a podcast from a website, they need to pay a
fee.
10. ______There are thousands of different types of podcast available.
11. ______If you want to make a telephone call by using VOIP, your device need to connect
to the Internet.
12. ______The analogue phone system is rarely used these days due to the popularity of
VOIP service.
13. ______We can use Skype, Facetime or Discord to make video call.

LISTENING 2

-77-
Task 1. (Track 6.2) Listen to an expert from Aircall talking about VOIP (Voice Over
Internet Protocol), then fill in the blank with word/ phrases from the box below.

cost travelling electrical software order

instant transmitted hardware calling hardware

The world of business telephony is changing, from classic phone to VOIP. As


professionals working in this space, we are at Aircall will help you to understand how this
tech works and why it is cheaper and more functional for your business.
To start, let’s rewind for a half of century. At a high level, phones are great because they
can convert voice into (1) __________ signals, transmit these signals at crazy speed all over
the world and revert them back in audible noise. It makes nearly (2) __________ voical
communication possible across massive distances. Back in the olden day, calls were
expensive. That was because voice was (3) __________ along an intricate network of
copper wires, and when you were on the phone, a particular set of wire was exclusive yours.
When you call someone in New York from Los Angeles, you were literally “renting” 2,000
miles of premium (4) __________. VOIP harnesses the global presence of Internet to
achieve the same end result. When you talk on your computer or headset microphone, your
voice is converted into electrical signal using a piece of (5) __________calling an audio
driver. This electrical signal is then converted in binary or computer speak using (6)
__________ calling codec (or coder- decoder). From here, this computer speak is broken
up into small chunk of information, known as packets, which are (7) __________ from your
computer, via (8) __________ through the copper of fiber optic cable across the world to
another computer and reverse process via another codec into what you recognize as words.
Landlines had to send information in relatively slow, linear fashion, but the internet send
packets faster for doing so in any (9) __________. When you arrive at your IP address, they
are reassembled correctly. But VOIP to VOIP only describe a handful of conversation

-78-
where an internet connect device knows it’s (10) __________ other internet connect device,
example of this included Facetime audio or Google calls.
Adapted from https://aircall.io/blog/customer-happiness/how-voip-works/
Task 2. (Track 6.3) Listen to the rest of the talk and list some benefits that VOIP brings
to business.
First, the per-minute calling rate is ...................
Second, VOIP allows for much greater...................
Plus, IP technologies is accessible from smartphone, so ...................
Finally, VOIP can be intricately connected to your other ....................

TRANSLATION
Translate these paragraphs into Vietnamese.
1. One of the reasons that helps Vietnam controlling COVID-19 effectively is that the
Ministry of Health and the Ministry of Information and Communications have made a
strong collaboration with big ICT enterprises to make and deploy digital applications that
helps to control the pandemic.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
2. Not only building and deploying applications to control COVID-19, ICT industry has
promptly directed and lead big IT enterprises to build and deploy platforms that support
working and learning remotely in healthcare and education sectors.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
3. The government of Vietnam has identified ICT as a major industry and socio-economic
growth driver and is urging government agencies at all levels to apply advanced ICT
solutions towards the goals of improving operational efficiencies and providing better
governance services.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
4. Vietnam is expected to continue to import the bulk of ICT hardware, software and
services, as Vietnamese suppliers are still relatively new and may not be able to offer the
same range of solutions and services as foreign suppliers.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................

-79-
5. Electronic communication is fast, cost-effective and convenient, but these attributes
contain inherent disadvantages.
................................................................................................................................................
................................................................................................................................................
6. Devices such as cell phones with mobile communication technology and portable laptops
enable people to stay in touch with friends and co-workers at all times.
................................................................................................................................................
................................................................................................................................................
7. Electronic communication is convenient and usually instantaneous. It dispenses with the
need to mail or fax documents that can be safely backed up online or on portable electronic
devices to protect against loss or theft.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
8. Electronic communication is convenient and usually instantaneous. It dispenses with the
need to mail or fax documents that can be safely backed up online or on portable electronic
devices to protect against loss or theft.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
9. Due to the advancement of electronic media, business managers can effortlessly manage
operation transversely the world. Video or teleconferencing e-mail and mobile
communication are helping managers in this observe.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
10. Electronic communication provides the opportunity for interactive communication with
distant people. Video conferencing, for example, allows interactive communication even
though the participants are geographically dispersed.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................

FURTHER READING
COVID-19: Consequences and opportunities for the ICT sector
COVID-19 has impacted a large number of countries and is turning out to be even
worse than the critical economic, strategic, and political clashes happening around the
world. The outbreak has and still is impacting all industries, including the Information &
Communication Technology (ICT) sector.
The world has never been more interconnected, and this health crisis is affecting the
whole world. The ICT industry is already losing a lot of income opportunities, and it’s still
uncertain when the situation will contain. Amidst the uncertain scenario, many
technological areas will be the key focus and keep emerging as clear winners.
-80-
With organizations promoting working remotely, there is already an exponential rise
in video calls/phone calls, as an increasing number of people are organizing meetings via
apps or collaboration platforms. Digital media and Over the Top (OTT) content players are
benefiting while Virtual Private Networks (VPNs), cybersecurity, and data security are
other technologies that will see a surge as most workforces are operating remotely. Cloud
services will grow, boosted by higher usage of content, gaming downloads, video
conferencing, and the impact of remote access to corporate networks. There will also be an
increased focus on technologies like artificial intelligence, big data, augmented reality, and
virtual reality, among others going forward. Equipment maker, Huawei, for example,
recently posted a surge in its technological services comprising AI, video conferencing, and
wireless network coverage across the Asia Pacific, given the on-ground communication
challenges to ensure smooth connectivity.
Although the COVID-19 pandemic has certainly not triggered Industry 5.0, it has
brought home the reality of Industry 4.0. digital workflows, robots, automation are no
longer goals; they are requirements. IoT devices have offered organizations a path toward
preserving revenue streams during this pandemic.
Other areas that would see an uptick include e-learning, online education, and e-
governance. As shoppers begin to self-isolate and avoid crowded areas, the clear winner is
the e-commerce sector, with digital payment taking over a lot faster than the physical
payment options.
The media industry (both traditional broadcasters and newer streaming platforms)
are playing a vital role during the pandemic in providing correct and responsible health
information to the public with search engines and social media platforms. In terms of the
morale of those isolated, access to the wealth of quality content available is
important. (Refer to our whitepaper: Implications of COVID-19 on cable tv and streaming
business3 for a more in-depth analysis)
The current circumstances may also accelerate the adoption of 5G to meet the
demands of bandwidth, performance, and network slicing. There will be more focus on the
sufficiency of networks to carry the significantly increased traffic as working from home
continues to ramp up. Social distancing and self-isolation mean that telecommunication has
become an elevated essential service. It will be worthwhile to see how the Communications
Service Providers (CSPs) both Mobile Network Operators (MNOs) and cable operators
meet the challenge of their new critical role in the changed world.
While people are mostly using home WiFi, they would still use their mobile phones
for voice communications, and this is the area that MNOs need to keep a close eye on. With
video conference services (Skype, Zoom, and others) traffic is going through the roof right
now, the dial-in option is an alternative if video conferencing platforms are overloaded.
Also, with the need for social distancing, people are communicating more, which will drive
additional voice traffic, whether it’s on legacy circuit-switched systems or the 4G network
-81-
with Voice over Long-Term Evolution (VoLTE) calls. The strain on voice services, though,
will be helped to some extent by the convergence of WhatsApp, Messenger, Skype,
Hangouts, and FaceTime calling within the iOS and Android ecosystems. Nevertheless,
some CSPs are predicting significantly higher voice traffic growth against the regular year-
on-year increase of only 5%4.
With the potential congestion of fixed broadband service, there is a chance that
devices will fall back on mobile networks, and this will cause a significant surge of mobile
data traffic. Likewise, in areas where MNOs also provide home broadband connectivity,
one would expect a significant increase in data traffic, and in some parts of the world where
unlimited data isn’t pervasive, an increase in subscriber costs.
The cable operators, on the other hand, will be more impacted than MNOs due to the
increased activity at home – working from home and a greater demand for streaming
services. Netflix and Google have already announced that they would be reducing video
streaming quality in Europe for a month from high definition (HD) to standard definition
(SD) to prevent network overload and collapse.
With significant changes in user behavior, escalating use of telemedicine solutions
for remote diagnosis, and the corresponding data traffic shifts, it will be increasingly
important for CSPs, whether it’s a mobile or cable operator, to keep vigilant and closely
monitor their network.
Read the text and answer the following questions.
1. Can you name some sectors that are impacted by Covid-19 pandemic?
________________________________________________________________________
2. Is the ICT industry losing a lot of income opportunities?
________________________________________________________________________
3. What happens with organizations promoting working remotely?
________________________________________________________________________
4. How important is the media industry during the pandemic?
________________________________________________________________________
5. Why is it necessary to adopt 5G technology?
________________________________________________________________________
6. According to the article, what is the trend of voice communication in the pandemic?
________________________________________________________________________
7. Why are the cable operators more impacted than MNOs?
________________________________________________________________________

-82-
UNIT 7 WEBSITES

STARTER
Work with your partner to answer the questions.
1. Which websites do you use in your work and study?
2. Make a list and share it with a partner. Do you use the same sites?

VOCABULARY
Task 1. Complete these sentences about the purpose of websites with the words in the
box.
offer practise present promote read sell share
Example: The purpose of Nationalgeographic.com is to present information on topics.
1. People visit CNN.com to__________ international news.
2. Some websites want to__________ a service.
3. Companies use Amazon.com to__________ their products.
4. Thegreenshoppingguide.co.uk wants to __________ environmentally friendly shopping.
5. Students visit Math.com to __________ their maths.
6. English teachers join eltforum.com to __________ teaching resources.

Task 2. Match the website analysis tools 1-5 to the descriptions a-e.
1. traffic a. information about where the visitors to your site
are from
2. meta tag b. invisible information (e.g. a hidden keyword) on
a website
3. visitor map c. information about a user and the sites they
browse
4. user profile d. increasing the number of visitors to your site
5. page optimisation e. the movement and actions of visitors to your site

-83-
READING
Task 1. Read this text about different types of websites. Answers the following
questions.
1. Why do people visit organizational websites?
2. Why do people visit company websites?
3. Why do people visit entertainment websites?
4. Why do people visit news websites?

TYPES OF WEBSITE – A GUIDE FOR WEBSITE DESIGNERS

The purpose of an organizational website is to inform about an idea or event. Companies


develop commercial websites to sell products or services. Entertainment websites are
designed to entertain or provide fun activities. People visit news websites to obtain
information. The purpose of a personal website is to provide information about an
individual. Social networking websites help people exchange personal information.
Educational websites aim to share knowledge and enable online learning.

Task 2. Read the text and answer the questions.

Web page design


HTML and web editors
The code behind most web pages is HTML (Hypertext markup language), which
consists of commands called tags. Tags are placed around pieces of text to tell the web
browser how to display text or pictures. You can view the source HTML code of a web
page by choosing the Page Source option in your web browser. But you needn’t learn
-84-
HTML in order to build your own website. Instead, you can use a word processor with web
design capabilities or dedicated web editor like Macromedia Dreamweaver or Microsoft
FrontPage. Web editors are user-friendly and WYSIWYG (What You See Is What You
Get). Different buttons and menu items let you design a page without writing HTML.
HTML files have this basic structure:
Start with <html>
Having heading text that begins with <head>, which has a title enclosed between tags and
ends with </head>
Have body text that starts with <body>, where you place the contents of the actual
document (i.e. text, images, links, etc.) and ends with </body>
End with </html>
You can create link to other web pages by using the tag <a href = “filename”>active text
</a>
Web page elements
There are a number of different elements that you can use on a web page:
• Text – displayed in a variety of fronts and sizes. Most text files are available in two
formats: HTML or PDF (the portable document format that can be viewed with
Acrobat Reader).
• Background – the underlying colors and patterns of a web page
• Tables – with columns and rows, used to position images and text on a page
• Frames – rectangular areas that allow the display of different pages in the same
browser window.
• Cascading Style Sheets (CSS) – a mechanism for adding styles to web documents.
You could use HTML code to specify the font, text styles and background color.
Nowadays, however, it is more common to use CSS. This makes it easy to apply
presentation changes across a website.
• Graphics, clip art, icons, background templates, wallpaper and transparent
images – common formats are .jpg (joint photographic experts group), ideal for
pictures with many colors, .gif (graphics interchange format), ideal for pictures with
fewer colors, and .png (portable network graphics), which supports 16 million
colors.
• Hyperlinks – highlighted text or pictures (buttons, image maps, etc.) that act as links
to other pages. If you want to share information with people, you can use RSS feeds
and provide readers with a link to the feed. RSS allows subscribers to receive updates
of blogs, news, podcasts, etc. Before going live, you should check that all the links
work.
Audio, video and animation
Many websites now incorporate audio files, and if you’re designing a site, you may
like to insert songs, podcasts, etc. The most common audio formats are .wav (Windows
wave audio format), .ra (RealAudio file) and .mp3 (MPEG-1 Audio Player 3).
Full-motion video is stored in these formats: .avi (audio video interleave), .mov
(QuickTime movie) and .mpg (moving picture experts group).
If you want to inject something special into your web pages, you can use Adobe
Flash to include interactive animations and streaming audio. Additionally, you can insert
-85-
Java applets – small programs that enable the creation of interactive files. Animations are
made up of a series of independent pictures put together in sequence to look like moving
pictures. To see or hear all these files, you must have the right plug-in, an auxiliary program
that expands the capabilities of your web browser.
Adapted from Infotech English for computer users
1. What does HTML stand for?
_____________________________________________________________________
2. How can you view the source HTML code of a web page?
_____________________________________________________________________
3. Which software let you design web pages without writing HTML codes?
_____________________________________________________________________
4. Which format invented by Adobe is used to distribute text files over the Internet?
_____________________________________________________________________
5. Which method is used to display multiple HTML documents in the same browser
window?
_____________________________________________________________________
6. What are three common graphics formats used on websites?
_____________________________________________________________________
7. What are three popular formats used to store and play back video?
_____________________________________________________________________
8. Which programs can enable the creation of interactive files?
_____________________________________________________________________
Task 3. Match the terms with the appropriate definitions or explanations.
1. Tags a. rectangular areas that allow the display of different
pages in the same browser window.
2. WYSIWYG b. small programs that enable the creation of interactive
files
3. Tables c. are made up of a series of independent pictures put
together in sequence to look like moving pictures.
4. PDF d. are placed around pieces of text to tell the web
browser how to display text or pictures.
5. Animations e. means What You See Is What You Get.
6. Hyperlinks f. the underlying colors and patterns of a web page.
7. Frames g. a mechanism for adding styles to web documents.
8. Background h. are used to position images and text on a page.
9. Java applets i. highlighted text or pictures (buttons, image maps,
etc.) that act as links to other pages.
10. Cascading Style Sheets k. means the portable document format that can be
viewed with Acrobat Reader.

LISTENING
Task 1. Work in pairs, think about your favourite websites and discuss these
questions.

-86-
1. Do you like the way they are designed? Give reasons for your answer.
2. What elements do you think a good website should have? Make a list.

Task 2. (Track 7.1) Listen to an interview with a web designer describing how to
design a website and put these steps into the correct order.
Write and format the text

1 Decide the content and structure for the website


. Publish the website
Insert computer graphics and sounds
Keep the website updated
Link related pages to each other using hyperlinks

A web designer at work


Task 3. Listen again and decide whether these design guidelines are right or wrong.
Tick the correct box.
Right Wrong
1. Plan your website carefully.
2. Use a web editor. It will make it easier to create your pages.
3. Insert photos or animations just to make the pages look
attractive.
4. Place a large number of graphics on your pages.
5. Use very bright colours.
6. Put a lot of links on one page.
7. Check that all the links on your web pages are correct.
8. Once they are published, update your pages regularly.

-87-
WRITING
Task 1. Complete this text with the words in the box.
After that Finally First Next Secondly Then Thirdly

The steps in website development


(1)__________, discuss with the customer their requirements and the target audience.
Find out what features and number of pages they want on their site. (2)__________,
analyse the information from the customer. (3)__________, create a website
specification. (4)__________ design and develop the website. (5) __________, assign a
specialist to write the website content. (6)__________ give the project to programmers
for HTML coding. (7)__________, test the website.
After you publish the website, update and maintain it on an ongoing basis. Monitor
customer use.

LANGUAGE SKILLS
Describing a process
Firstly/ The first step is/ To After that… Finally…
begin with… Then… The last step/ stage is…
Secondly… Following that…
Thirdly…
Next…
The next step/ stage is…

Task 2. Write a paragraph describing the website development process in your own
words. Use the phrases in the language box to help you.

-88-
TRANSLATION
Translate into Vietnamese.
1. Companies develop commercial websites to sell products or services. Entertainment
websites are designed to entertain or provide fun activities. People visit news websites to
obtain information.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
2. You can view the source HTML code of a web page by choosing the Page Source option
in your web browser. But you needn’t learn HTML in order to build your own website
................................................................................................................................................
................................................................................................................................................
3. You could use HTML code to specify the font, text styles and background color.
Nowadays, however, it is more common to use CSS. This makes it easy to apply
presentation changes across a website.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
4. If you want to share information with people, you can use RSS feeds and provide readers
with a link to the feed. RSS allows subscribers to receive updates of blogs, news, podcasts,
etc.
................................................................................................................................................
................................................................................................................................................
5. Many websites now incorporate audio files, and if you’re designing a site, you may like
to insert songs, podcasts, etc.
................................................................................................................................................
................................................................................................................................................
6. If you want to inject something special into your web pages, you can use Adobe Flash to
include interactive animations and streaming audio. Additionally, you can insert Java
applets – small programs that enable the creation of interactive files.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................

-89-
UNIT 8 NETWORK SECURITY

STARTER
Task 1. Match the words/ phrases in the box with the pictures.
adware hacker Browser hijacker malware attack
spyware Trojan Phishing Ransomware

1.
2.

3. 4.

-90-
5. 6.

7. 8.

Task 2. Match the words/ phrases above with their definitions.


1. Adware a. is malicious software that changes a browser's
behavior, settings, or appearance without user consent.
2. Hacker b. is malware that employs encryption to hold a victim’s
information at ransom. A user or organization’s critical
data is encrypted so that they cannot access files,
databases, or applications.
3. Browser hijacker c. is software that displays unwanted advertisements on
your computer.

-91-
4. Malware attack d. is when attackers send malicious emails designed to
trick people into falling for a scam.
5. Spyware e. is a type of malicious code or software that can take
control of your computer.
6. Phishing f. is just a person who uses computer programming or
technical skills to overcome a challenge or problem.
7. Ransomware g. software that enables a user to obtain covert
information about another's computer activities by
transmitting data covertly from their hard drive.
8. Trojan h. is a common cyberattack where malware (normally
malicious software) executes unauthorized actions on the
victim's system.

READING 1
Task 1. Read the first passage of the article and then answer the questions below.
1. What is Internet Security?
2. Can you name some kinds of the internet security threats?
Internet Security

Internet security is a term that describes


security for activities and transactions made over the internet. It’s a particular component
of the larger ideas of cybersecurity and computer security, involving topics including
browser security, online behavior and network security. We spend a large proportion of our
lives online, and some of the internet security threats we can encounter include:
• Hacking, where unauthorized users gain access to computer systems, email
accounts, or websites.
• Viruses or malicious software (known as malware) which can damage data or make
systems vulnerable to other threats.
• Identity theft, where criminals can steal personal and financial information.

-92-
Individuals and organizations can protect themselves from these kinds of threats by
practicing internet security.

What are the most common internet security threats?


To ensure privacy and security on the internet, it’s important to be aware of different
types of internet attacks. Common internet security threats include:
Phishing
Phishing is a cyber-attack involving disguised emails. Hackers try to trick email
recipients into believing that a message is genuine and relevant – a request from their bank
or a note from a co-worker, for example – so that they click on a link or open an attachment.
The goal is to deceive people into handing over their personal information or downloading
malware.
Phishing is one of the oldest internet security threats, dating back to the 1990s. It has
remained popular to this day since it is one of the cheapest and easiest ways for criminals
to steal information. In recent years, phishing techniques and messages have become
increasingly sophisticated.
Hacking and remote access
Hackers are always looking to exploit a private network or system's vulnerabilities
so they can steal confidential information and data. Remote access technology gives them
another target to exploit. Remote access software allows users to access and control a
computer remotely – and since the Covid-19 pandemic, with more people working
remotely, its usage has increased.
The protocol which allows users to control a computer connected to the internet
remotely is called Remote Desktop Protocol, or RDP. Because businesses of all sizes so
widely use RDP, the chances of an improperly secured network are relatively high. Hackers
use different techniques to exploit RDP vulnerabilities until they have full access to a
network and its devices. They may carry out data theft themselves or else sell the
credentials on the dark web.

Ransomware
Ransomware is a type of malware that prevents you from using your computer or
accessing specific files on your computer unless a ransom is paid. It is often distributed as
a trojan – that is, malware disguised as legitimate software. Once installed, it locks your
system’s screen or certain files until you pay.
Because of their perceived anonymity, ransomware operators typically specify
payment in cryptocurrencies such as Bitcoin. Ransom prices vary depending on the
ransomware variant and the price or exchange rate of digital currencies. It isn’t always the
case that if you pay, the criminals will release the encrypted files.

-93-
Ransomware attacks are on the rise, and new ransomware variants continue to emerge.
Some of the most talked-about ransomware variants include Maze, Conti, GoldenEye, Bad
Rabbit, Jigsaw, Locky, and Wanna Cry.
Adapted from https://www.kaspersky.com/resource-center/definitions/what-is-internet-security
Task 2. Match the underline words in the text with their synonyms.
1. ______________ something that can be easily hurt, influenced, or attacked.
2. ______________ a large amount of money that is demanded in exchange for someone
3. ______________ not officially allowed.
4. ______________ from a distance.
5. ______________ to give a new appearance to a person or thing, esp. in order to hide its
true form.
6. ______________ complicated.
7. ______________ to make something legal or acceptable.
8. ______________ a form of digital cash.
9. ______________ being what something or someone appears or claims to be; real,
not false.
10. ______________ secret or private.
11. ______________ something such as a document that proves who someone is.
12. ______________ to use something in a way that helps you.
13. ______________ a digital currency produced by a public network that use cryptography
to make sure payment are sent and received.
14. ______________ to persuade someone that something false is the truth, or to keep
the truth hidden from someone for your own advantage.
Task 3. Read the rest of the text and decide whether these statements are True (T) or
False (F) .
1. ____ Phishing is a cyber-attack in which phishing emails are sent to gather users’ login
information.
2. ____The objective of phishing is to tempt users to download malware.
3. ____ In recent days, phishing is becoming more and more simple.
4. ____Hackers are always trying to attack a private network or system's vulnerabilities so
they can steal secret information and data.
5. ____ Remote access technology creates opportunities for hackers to exploit.
6. ____The security of RDP is relatively low, so hackers are easily to attack.
7. ____ Ransomware is often distributed as Trojan.
8. ____ If your computer is attacked by ransomware, you don’t have to pay any ransom to
unlock your screen and your file.
9. ____ Ransomware operators typically specify payment in cryptocurrencies because
they are anonymous.
10. ____ The number of ransomware attacks decreases steadily.

-94-
LISTENING 1

(Track 8.1) You are going to listen to a radio programme about cybercrime. Listen
to the first part of the programme and answer the question.
According to Inspector Peter, cybercrime includes ...............................
Task 1. Listen to the rest of the programme and fill in the blank with suitable word.
Christine: Can you explain what cyber bullying is?
Inspector: Embarrassing someone or spreading (1) ________ on the Internet or via text
messages to mobile phone is called online- or cyber bullying. As part of my job, I visit
schools to talk to (2) ________ about their use of the Internet. Recently, I asked a group of
kids what they did online. Most replied that I chatted, watched music (3) ________, and
sent instant messages and e-mails. Those were typical answers. But one student admitted
that he was bullied online.
Christine: How can someone be bullied online?
Inspector: There are several ways. Sometimes bullies put their victims’ (4) ________on
the Internet without their knowledge, or they send their victims nasty or frightening text
messages or e-mails. Other times, they (5) ________lies and rumors about them on the
Internet. Sometimes they send text messages threatening the victim with (6) ________.
Christine: Why do you think teenagers do this?
Inspector: Most cyber bullying don’t think that they’re doing is terrible. They think it’s(6)
________. Sometimes their friends encourage them to do it. Another reason might be that
they can bully someone and they’re sure they won’t get caught.
Christine: What happens if someone is caught cyber bullying? Are they punished?
Inspector: Well, when we (7) ________who the bully is, we make sure his or her ISP –
Internet Service Provider – is closed down.
Christine: So have you got any tips for someone that is being cyber bullied?
Inspector: Christine, cyber bullying is a serious matter. If you get a frightening text
message or e-mail, you should immediately (8) ________it to an adult that you trust, such
as a parent or a teacher. Phoning the mobile phone provider is a good idea, too. The provider
can find out who (9) ________the phone. Teenagers can get more advice at sites like
www.bullying.co.uk. In addition, many school have got systems where students can (10)

-95-
________cases of online bullying. So you see, there’s actually a lot of you can do if you
have been bullied.
Christine: Thanks for the helpful information.
Task 2. Listen again and decide whether these statements are True (T) or False (F).
1. _______ According to Inspector Peters, most teenagers use Internet for cyberbullying.
2. _______ Sending someone a threatening text message is an example of cyberbullying.
3. _______ Cyber bullies are never punished.
4. _______ Inspector Peters believes that people shouldn’t take cyberbullying seriously.
5._______ In case, you receive threatening messages, you should report police
immediately.
6. _______ Teenagers can get advices from school when they are online bullied.

SPEAKING
Work in pair and discuss the question “which is the worst behavior?”. Number these
statements from the least to the bad behavior.

-96-
READING 2
Cybersecurity threats and solutions

Most businesses are aware that a spam filter


and antivirus program are not all they need to protect themselves from the constantly
evolving landscape of cybersecurity threats.
To assist with that awareness, consider the list below of the most common web security
problems faced by businesses, and how to fix them.
Code Injection
Hackers are sometimes able to exploit vulnerabilities in applications to insert
malicious code. Often the vulnerability is found in a text input field for users, such as for a
username, where an SQL statement is entered, which runs on the database, in what is known
as an SQL Injection attack. Other kinds of code injection attacks include shell injection,
operating system command attacks, script injection, and dynamic evaluation attacks.
Attacks of this type can lead to stolen credentials, destroyed data, or even loss of control
over the server.
There are two ways to prevent code injection: avoiding vulnerable code and filtering
input. Applications can guard against vulnerable code by keeping data separate from

-97-
commands and queries, such as by using a safe API with parameterized queries. Businesses
should also use input validation, and observe the principle of least privilege, applying
controls like the SQL LIMIT function to reduce the damage from a successful attack.
A Web Application Firewall (WAF) which updates a threat database in real-time is the only
effective way to filter application input to protect against code injection.
Data Breach
The cost of data breach well documented. They are often caused by compromised
credentials, but the range of other common causes include software misconfiguration, lost
hardware, or malware.
Data breach prevention requires a range of good practices. Site traffic and
transactions should be encrypted with SSL, permissions should be carefully set for each
group of users, and servers should be scanned. Employees should be trained in how to avoid
being caught by phishing attacks, and how to practice good password hygiene. The
principle of least privilege is worth noting here, as well.
Malware infection
Most businesses are aware on some level of the security threat posed by malware,
yet many people are unaware that email spam is still the main vector of malware attack.
Because malware comes from a range of sources, several different tools are needed for
preventing infection. A robust email scanning and filtering system is necessary, as are
malware and vulnerability scans. Like breaches, which are often caused by malware
infection, employee education is vital to keep businesses safe from malware.
Any device or system infected with malware must be thoroughly scrubbed, which means
identifying the hidden portions of code and deleting all infected files before they replicate.
This is practically impossible by hand, so requires an effective automated tool.
Adapted from https://www.liquidweb.com/blog/five-common-web-security-problems/

Task 1. Read the text carefully and complete the table below.

Types of cybercrime Causes Solutions


Code Injection - Hackers exploit vulnerabilities - Avoiding vulnerable code
in applications to insert
malicious code.

Data Breach

-98-
Malware infection

Task 2. Match the sentences with its endings.

1. the vulnerability is found a. vulnerable code by keeping data separate


from commands and queries.
2. code injection attacks can lead to b. is necessary, as are malware and
vulnerability scans.
3. Using a safe API with parameterized c. in a text input field for users, such as for a
queries can avoid username.

4. A Web Application Firewall (WAF) d. compromised credential, software


misconfiguration, lost hardware, or malware.

5. Data breach are often caused by e. must be thoroughly scrubbed.


6. A robust email scanning and filtering f. is the only effective way to filter
system application input to protect against code
injection.
7. Any device or system infected with g. stolen credentials, destroyed data, or even
malware loss of control over the server.

WRITING
Write about the problems and solutions of cybercrime. You can base on the
information of the article in Reading 2.
Paragraph 1: Problems
One of the prominent reasons concerning this problem is .............
This is because + S + have/ has the propensity for + V-ING
Hence, S + be + considered as the chief culprit behind +N/ N phrase ...........
Another factor leading to this situation is + N.
This means + N
Paragraph 2: Solutions
-99-
In truth, some imperative measures ought to be taken to resolve these prospective issues.
• V-ing + be + highly + recommended/ complemented/ suggested.
• …………., which prevent + O + from V-ing/ N

In addition, S + be + encouraged to + turn to + V1-ing/ N as the alternative to + V2-ing/


N2 + to + V

LISTENING

Task 1. (Track 8.2) Listen to an interview with Diana Wilson, a member of the
Internet Safety Foundation. Which answers (a or b) best describe what she says?
1. Parents should make children aware of
a. the benefits and risks of the Internet
b. the risks of the Internet
2. A web filter program can be used to
a. prevent access to sites with inappropriate content.
b. rate web content with labels (similar to the way movies are rated)
3. If kids spend too much time online or suffer from internet addiction, parents should
a. stop them using the Internet.
b. look for help from specialists.
Task 2. Listen again and complete the interviewer’s lists.
Risks Solutions
Manipulation of children There are websites (4) __________
Invasions of (1) __________ at children.
Distribution of indecent or (2) __________ Internet (5) __________
material programs let block objectionable
Violence and racist (3) __________ websites.
Websites should (6) __________
-100-
their content with a label, from child-
friendly to over 18 only.

TRANSLATION
Translate these sentences into Vietnamese
1. The main purpose of a security policy is to inform users, staff and managers of their
obligatory requirements for protecting technology and information assets. The policy
should specify the mechanisms through which these requirements can be met the purpose
of a security policy
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
2. Another purpose is to provide a baseline from which to acquire, configure and audit
computer systems and networks for compliance with the policy. Therefore, an attempt to
use a set of security tools in the absence of at least an implied security policy is meaningless.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
3. Another major use of an AUP (Appropriate Use Policy) is to spell out, exactly, the
corporate position on privacy issues and intellectual property issues. In some countries, if
the company does not explicitly state that e-mail is not secure, it is considered to be so and
any breach could cause privacy and confidentiality liabilities.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
4. It is very important to spell out what is and is not acceptable in intellectual transfers and
storage and what the corporate privacy policies are to prevent litigation about same. An
AUP may also be part of a security policy. It should spell out what users shall and shall not
do on the various components of the system, including the type of traffic allowed on the
networks.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................

5. Once your security policy has been established it should be clearly communicated to
users, staff, and management. Having all personnel sign a statement indicating that they
have read, understood, and agreed to abide by the policy is an important part of the process.
-101-
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
6. The cost of data breach well documented. They are often caused by compromised
credentials, but the range of other common causes include software misconfiguration, lost
hardware, or malware.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................

-102-
FURTHER READING
Security and privacy on the Internet
There are many benefits from an open system like the Internet, but one of the risks
is that we are often exposed to hackers, who break into computer systems just for fun, to
steal information, or to spread viruses (see note below). So how do we go about making our
online transactions secure?
Security on the Web
Security is crucial when you send confidential information online. Consider, for
example, the process of buying a book on the Web. You have to type your credit card
number into an order form which passes from computer to computer on its way to the online
bookstore. If one of the intermediary computers is infiltrated by hackers, your data can be
copied.
To avoid risks, you should set all security alerts to high on your web browser.
Mozilla Firefox displays a lock when the website is secure and allows you to disable or
delete cookies – small files placed on your hard drive by web servers so that they can
recognize your PC when you return to their site.
If you use online banking services, make sure they use digital certificates – files that
are like digital identification cards and that identify users and web servers. Also be sure to
use a browser that is compliant with SSL (Secure Sockets Layer), a protocol which provides
secure transactions.
Email privacy
Similarly, as your email travels across the Net, it is copied temporarily onto many
computers in between. This means that it can be read by people who illegally enter
computer systems.
The only way to protect a message is to put it in a sort of virtual envelope – that is,
to encode it with some form of encryption. A system designed to send email privately is
Pretty Good Privacy, a freeware program written by Phil Zimmerman.
Network security
Private networks can be attacked by intruders who attempt to obtain information
such as Social Security numbers, bank accounts or research and business reports. To protect
crucial data, companies hire security consultants who analyse the risks and provide
solutions. The most common methods of protection are passwords for access control,
firewalls, and encryption and decryption systems. Encryption changes data into a secret
code so that only someone with a key can read it. Decryption converts encrypted data back
into its original form.
Malware protection
Malware (malicious software) are programs designed to infiltrate or damage your
computer, for example viruses, worm, Trojans and spyware. A virus can enter a PC via a

-103-
disc drive – if you insert an infected disc – or via the internet. A worm is a self-copying
program that spreads through email attachments; it replicates itself and sends a copy to
everyone in an address book. A Trojan horse is disguises as a useful program; it may affect
data security. Spyware collects information from your PC without your consent. Most
spyware and adware (software that allows pop-ups – that is, advertisements that suddenly
appear on your screen is included with “free” downloads.
If you want to protect your PC, don’t open email attachments from strangers and
take care when downloading files from the Web. Remember to update your anti-virus
software as often as possible, since new viruses are being created all the time.
Note: Originally, all computer enthusiasts and skilled programmers were known as hackers, but
during the 1990s, the term hacker became synonymous with cracker – a person who uses
technology for criminal aims. Nowadays, people often use the word hacker to mean both things. In
the computer industry, hackers are known as white hats and crackers are called black hats or
darkside hackers.
Read the text carefully and answer these questions.
1. Why is security so important on the Internet?
2. What security features are offered by Mozilla Firefox?
3. What security protocol is used by banks to make online transactions secure?
4. How can we protect our email and keep it private?
5. What methods are used by companies to make internal network secure?
6. In what ways can a virus enter a computer system?
7. How does a worm spread itself?

-104-
UNIT 9 THE FUTURE OF IT

SSSS
PART 1 THE FUTURE OF IT

STARTER
Work in pairs to list a number of trends that will define the future of Information
technology.

READING

The future of information technology


We are in the midst of convergence. At the hardware layer, computers, phones and
consumer electronics are converging. At the applications layer, we see convergence of
information, entertainment, communications, shopping, commerce, and education.
Computers have come from nowhere 50 years ago and are rapidly catching up in capability
with the human brain. We can expect human: machine equivalence by about 2030. But
after this, computers will continue to get smarter. There is a noticeable positive feedback
loop in technology development, with each generation of improved computers giving us
more assistance in the design and development of the next. Ultimately, they will design
their offspring with little or no human involvement. This technology development will push
every field of knowledge forwards, not just computing. It will be almost as through
extraterrestrials had landed in 2020 and given us all their advanced technology overnight.
But we will never get far unless we can solve the interface problem. In the near
future we may have electronic pets, with video camera eyes and microphone ears, linked
by radio to the family computer. With voice and language recognition we will have easy
-105-
access to all that the Internet can provide. We can tell the pet what we want and it will sort
it out for us. It will be impossible to be technophobic about such an interface, and the only
IT skill needed will be to speak any major language.
Adapted from Oxford English for information technology
Task 1. Gap filling: without looking at the text, fill in the missing words.
1. At the applications layer, we see ___________ of information, entertainment,
communications, shopping, commerce, and education.
2. Computers have come from nowhere 50 years ago and are rapidly catching up in
capability with the___________.
3. Ultimately, they will design their ___________ with little or no human involvement.
4. In the near future we may have electronic pets, with video camera eyes and ___________
ears, linked by radio to the family computer.
5. With voice and language ___________ we will have easy access to all that the Internet
can provide.
Task 2. Read the text and answer the questions:
1. How does the author justify his claim that we are ‘in the midst of convergence’?
_____________________________________________________________________
_____________________________________________________________________
2. What will be the difference between computers and humans after 2030?
_____________________________________________________________________
_____________________________________________________________________
3. What does he mean by a ‘positive feedback loop’ in computer development?
_____________________________________________________________________
_____________________________________________________________________
4. Why will knowledge of a major language be the only IT skill needed?
_____________________________________________________________________
_____________________________________________________________________
5. Which of the author’s predictions do you accept?
_____________________________________________________________________
_____________________________________________________________________
Task 3. Work with your partner and check the meaning of the bold words and phrases
in the text. Use the dictionary to help you.

WRITING

LANGUAGE FOCUS
Predictions: Future perfect and It in subject position

We use the Future Perfect to predict 2. By 2030 geneticsts may/might/could


actions which will be completed before a have created the first biologically 106
particular time in the future. It is often optimized humans.
used with time expressions such as by We can also make predictions using It in
2030, before the end of the century. For subject position when the true subject of
example:

-106-
1. By 2030 scientists will have developed the prediction is a that clause. For
active contact lenses example:
We can vary the strength of our predictions 1. It’s likely that computers will be used
using the certainly verbs studied instead of to develop other faster computers.
will. For example: 2. It’s possible that we’ll work from
telework centres in future.

Task 1. Write sentences similar in meaning to each of these predictions with IT in


subject position. For example:
I don’t think we’ll use cable connections in future. (unlikely)
It’s unlikely that we’ll use cable connections in future
1. I’m sure we won’t use magnetic tape. (certain)
2. We may well have electronic chips in our bodies. (probable)
3. Computers could easily be used to develop other computers. (likely)
4. I don’t think we’ll replace teachers with robots. (unlikely)
5. There’s a chance we’ll develop alternatives to silicon. (possible)
6. I really don’t think we’ll have replaced the motor car before 2020. (very unlikely)
7. I’m almost sure most people will use colour laser printers in the next few years. (highly
probable)
8. I’m definite we’ll have more virtual personalities on the Web. (certain)
9. We might adopt Bluetooth as a standard for wireless applications (possible)
10. Doctors may be able to operate on patients at a distance. (quite likely)

Task 2. Make predictions for 2030 for each of the following using the methods studied
here. You may wish to use these verbs:
develop disappear increase replace take over
1. computing power 6. shops
2. interfaces 7. machine intelligence compared to
human intelligence
3. monitors 8. the Internet
4. teleworking 9. keyboards
5. money 10. Speech recognition

-107-
PART 2 FUTURE TRENDS OF NEW TECHNOLOGIES

READING
Task 1. Match the texts (1-5) with the picture (a-e). Which trends in ICT (Information
and Communications Technologies) do you think will affect our lives in the future?

1. By all accounts, nanotechnology-the science of making devices from single atoms


and molecules- is going to have a huge impact on both business and our daily lives.
Nano devices are measured in nanometers (one billionth of metre) and are expected
to be used in the following areas.
• Nanocomputers: Chip makers will make tiny microprocessors with
nanotransistors, ranging from 60 to 5 nanometres in sizes.
• Nanomedicine: By 2020, scientists believe that nano-sized robots, or nanobots,
will be injected into the body’s bloodstream to treat diseases at the cellular
level.
• Nanomaterials: New materials will be made from carbon atoms in the form of
nanotubes, which are more flexible, resistant and durable than steel or
aluminium. They will be incorporated into all kinds of products, for example
stain-resistant coatings for clothes and scratch-resistant paints for cars.

2. Artificial Intelligence (AI) is the science of making intelligent machines and


programs. The term originated in the 1940s, when Alan Turing said: A machine has
artificial intelligence when there is no discernible difference between the conversation
generated by the machine and that of an intelligent person.” A typical AI application
-108-
is robotics. One example is ASIMO, Honda’s intelligent humanoid robot. Soon,
engineers will have built different types of android, with the form and capabilities of
humans. Another AI application is expert systems – programs containing everything
that an ‘expert’ knows about a subject. In a few years, doctors will be using expert
systems to diagnose illnesses.

3. Imagine you are about to take a holiday in Europe. You walk out to the garage and
talk to your car. Recognizing your voice, the car’s doors unlock. On the way to the
airport, you stop at an ATM. A camera mounted on the bank machine looks you in the
eye, recognizes the pattern of your iris and allows you to withdraw cash from your
account.
When you enter the airport, a hidden camera compares the digitized image of your
face to that of suspected criminals. At the immigration checkpoint, you swipe a card
and place your hand on a small metal surface. The geometry of your hand matches the
code on the card and the gate opens. You’re on your way.
Does it sound futuristic? Well, the future is here. Biometrics uses computer
technology to identify people based on physical characteristic such as fingerprints,
facial features, voice, iris and retina patterns.

4. Ubiquitous computing, also known as pervasive computing, is a new approach in


which computer functions are integrated into everyday life, often in an invisible way.
Ubiquitous devices can be anything from smartphones to tiny sensors in homes,
offices and cars, connected to networks, which allow information to be accessed
anytime and anywhere- in other words, ubiquitously. In the future people will interact
naturally with hundreds of these smart devices (objects containing a microchip and
memory) every day, each invisibly embedded in our environment and communicating
with each other without cables.

5. In the ideal smart home, appliances and electronic devices work in sync to keep the
house secure. For example, when a regular alarm system senses that someone is
breaking into the house, it usually alerts the alarm company and then the police. A
smart home system would go further, turning on the lights in the home and then
sending a text message to the owner’s phone. Motorola Homesight even sends images
captured by wireless cameras to phones and PCs. Smart homes can remember your
living patterns, so if you like to listen to some classical music when you come home
from work, your house can do that for you automatically. They will also know when
the house is empty and make sure all appliances are turned off. All home devices will
be interconnected over a home area network where phones, cable services, home
cinemas, touch screens, smart mirrors and even the refrigerator will cooperate to make
our lives more comfortable.

Adapted from Infotech English for computer users


Task 2. Read the text again and answer these questions
1. Which unit or measurement is used in nanotechnology?
_____________________________________________________________________
-109-
2. What are the advantages of nanotubes over regular materials?
_____________________________________________________________________
3. What will doctors use expert systems for?
_____________________________________________________________________
4. What features are analysed by biometrics?
_____________________________________________________________________
5. Which trend refers to computers embedded everyday devices, communicating with each
other over wireless networks?
_____________________________________________________________________

Task 3. Find words in the texts with the following meanings.


1. a microscopic robot, built with nanotechnology (text 1)___________
2. a robot that resembles a human (text 2) ___________
3. biological identification of a person (text 3) ___________
4. integrated; inserted into (text 4) ___________
5. electrical devices, or machines, used in the home (text 5) ___________

LISTENING AND SPEAKING


Task 1. (Track 9.1) Watch a video on A day in the Life of A smart home. Complete
the sentences with the suitable words.

Adapted from https://www.youtube.com/watch?v=909Nn9_hrlM


1. It is 7:15 a.m. Currently in Fort Mill it’s 69 and (1) __________ today. There will be
scattered (2) __________ with a forecasted high of 84 and a low of 65. Here’s the (3)
__________ news.
2. Make me a (4) __________ of coffee.
3. Okay. Have a great day, Michael. (5) __________ the nest guard alarm to home in
guarding.

-110-
4. Hey google, show me a (6) __________ for breaded chicken.
5. There are nine (7) __________. You can add them to the recipe.
Task 2. Watch the video again and check your answers.
Task 3. Work with a partner and think of your smart home in the future then make a
small presentation to the class.

TRANSLATION
Translate these sentences into Vietnamese.

1. Over the last few years, the landscape of IT trends has changed significantly. New
technologies arose while others are losing their momentum.
................................................................................................................................................
................................................................................................................................................
2. The latest trends in information technology clearly show that data security will continue
to be in the spotlight of attention. Keeping business data and the data of customers secure
will be among the biggest future IT trends and requirements. n
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
provide a baseline from which to acquire, configure and audit
3. Automation will prevail in the future of IT. It aims to reduce manual work and improve
business efficiency. Data science is the key sphere that is predicted to benefit from
automation the most., configure and audit
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
4. Top information technology trends also include the growth in the importance of social
media. They will continue to gain traction both among businesses and customers.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................

5. Another one of the latest trends in information technology is big data and analytics. Big
data analytics uncovers hidden patterns, correlations, and provides other important insights,
for example, on customer behavior, etc.
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................

-111-
FURTHER PRACTICE 1

OPPERATING SYSTEMS: Hidden Software

When a brand new computer comes off memory other operating system programs
the factory assembly line, it can do (called nonresident) from disk storage
nothing. The hardware needs software to only as needed.
make it work. Are we talking about
applications software such as word- An operating system has three main
processing or spreadsheet software? functions: manage the computer's
Partly. But an applications software resources, such as the central processing
package does not communicate directly unit, memory, disk drives, and printers,
with the hardware. Between the establish a user interface, and execute and
applications software and the hardware is provide services for applications software.
a software interface - an operating system. Keep in mind, however, that much of the
An operating system is a set of programs work of an operating system is hidden
that lies between applications software from the user. In particular, the first listed
and the computer hardware. function, managing the computer's
The most important program in the resources, is taken care of without the user
operating system, the program that being aware of the details. Furthermore,
manages the operating system, is the all input and output operations, although
supervisor program, most of which invoked by an applications program, are
remains in memory and is thus referred to actually carried out by the operating
as resident. The supervisor controls the system.
entire operating system and loads into

Task 1. Study this text title. What do you think it means?


Task 2. Read the text to check your answer and to find the answers to these questions:
1. What difference is there between applications software and operating systems?
_____________________________________________________________________
_____________________________________________________________________
2. Why is the supervisor program the most important operating system program?
_____________________________________________________________________
_____________________________________________________________________
3. What is the difference between resident and non-resident programs?
_____________________________________________________________________
_____________________________________________________________________
4. What are the main functions of an operating system?
_____________________________________________________________________
_____________________________________________________________________
Task 3. Complete the gaps in this summary of the text on operating systems using
these linking words and phrases
Although in addition because such as but therefore

-112-
The user is aware of the effects of different applications programs (1)
___________operating systems are invisible to most users. They lie between applications
programs, (2) ___________ wordprocessing, and the hardware. The supervisor program is
the most important. It remains in memory, (3) ___________ it is referred to as resident.
Others are called non-resident (4) ___________ they are loaded into memory only when
needed. Operating systems manage the computer's resources, (5) ___________ the central
processing unit (6) ___________, they establish a user interface, and execute and provide
services for applications software. (7) ___________ input and output operations are
invoked by applications programs, they are carried out by the operating system.

-113-
FURTHER PRACTICE 2

Task 1. Find the answers to these questions in the following text.


1. What did Linus Torvalds use to write the Linux kernel?
_____________________________________________________________________
_____________________________________________________________________
2. How was the Linux kernel first made available to the general public?
_____________________________________________________________________
_____________________________________________________________________
3. What is a programmer likely to do with source code?
_____________________________________________________________________
_____________________________________________________________________
4. Why will most software companies not sell you their source code?
_____________________________________________________________________
_____________________________________________________________________
5. What type of utilities and applications are provided in a Linux distribution?
_____________________________________________________________________
_____________________________________________________________________
6. What is X ?
_____________________________________________________________________
_____________________________________________________________________
7. What graphical user interfaces are mentioned in the text?
_____________________________________________________________________
_____________________________________________________________________

LINUX
Linux has its roots in a student project. In aid by Professor Andy Tannenbaum) Linus
1992, an undergraduate called Linus set out to write his own 'kernel' — the core
Torvalds was studying computer science in of an operating system that handles memory
Helsinki, Finland. Like most computer allocation, talks to hardware devices, and
science courses, a big component of it was makes sure everything keeps running. He
taught on (and about) Unix. Unix was the used the GNU programming tools
wonder operating system of the 1970s and developed by Richard Stallman's Free
1980s: both a textbook example of the Software Foundation, an organization of
principles of operating system design, and volunteers dedicated to fulfilling Stallman's
sufficiently robust to be the standard OS in ideal of making good software that anyone
engineering and scientific computing. But could use without paying. When he'd
Unix was a commercial product (licensed written a basic kernel, he released the source
by ATEtT to a number of resellers), and code to the Linux kernel on the Internet.
cost more than a student could pay. Source code is important. It's the original
Annoyed by the shortcomings of Minix (a from which compiled programs are
compact Unix clone written as a teaching generated. If you don't have the source code
-114-
to a program, you can't modify it to fix bugs easy to give your fixes back to the
or add new features. Most software community that most people do so.
companies won't sell you their source code, An operating system kernel on its own isn't
or will only do so for an eye- watering price, a lot of use; but Linux was purposefully
because they believe that if they make it designed as a near-clone of Unix, and there
available it will destroy their revenue is a lot of software out there that is free and
stream. was designed to compile on Linux. By about
What happened next was astounding, from 1992, the first 'distributions' appeared.
the conventional, commercial software A distribution is the Linux-user term for a
industry point of view — and utterly complete operating system kit, complete
predictable to anyone who knew about the with the utilities and applications you need
Free Software Foundation. Programmers to make it do useful things — command
(mostly academics and students) began interpreters, programming tools, text
using Linux. They found that it didn't do editors, typesetting tools, and graphical user
things they wanted it to do - so they fixed it. interfaces based on the X windowing
And where they improved it, they sent the system. X is a standard in academic and
improvements to Linus, who rolled them scientific computing, but not hitherto
into the kernel. And Linux began to grow. common on PCs; it's a complex distributed
There's a term for this model of software windowing system on which people
development; it's called Open Source (see implement graphical interfaces like KDE
www.opensource.org/ for more and Gnome.
information). Anyone can have the source As more and more people got to know about
code - it's free (in the sense of free speech, Linux, some of them began to port the Linux
not free beer). Anyone can contribute to it. kernel to run on non-standard computers.
If you use it heavily you may want to extend Because it's free, Linux is now the most
or develop or fix bugs in it — and it is so widely- ported operating system there is
[Adapted from 'Smooth Operator' by Charles Stross, Computer Shopper magazine, November
1998]
Task 2. Match the terms in Table A with the Statements in Table B
Table A Table B
a. Kernel (1) A type A type of software development where any
b. Free Software Foundation programmer can develop or fix bugs in the software
c. Source code (2) The original systems program from which compiled
d. Open Source programs are generated
e. A distribution (3) A complete operating system kit with the utilities and
f. X applications you need to make it do useful things
(4) A standard distributed windowing system on which
people implement graphical interfaces
(5) An organization of volunteers dedicated to making
good software that anyone could use without paying
(6) The core of an operating system that handles memory
allocation, talks to hardware devices, and makes sure
everything keeps running

-115-
Task 3. Mark the following statements as True or False.
a. __________Linux was created in the 1980s.
b. __________Minix was created by a university student.
c. __________Linux is based on Unix.
d. __________Minix is based on Unix.
e. __________Linux runs on more types of computer than any other operating system.

-116-
FURTHER PRACTICE 3

Artificial Intelligence May Doom The Human Race Within A Century


An Oxford philosophy professor who has studied existential threats ranging from
nuclear war to superbugs says the biggest danger of all may be superintelligence.
Superintelligence is any intellect that outperforms human intellect in every field, and Nick
Bostrom thinks its most likely form will be a machine -- artificial intelligence.
There are two ways artificial intelligence could go, Bostrom argues. It could greatly
improve our lives and solve the world's problems, such as disease, hunger and even pain.
Or, it could take over and possibly kill all or many humans. As it stands, the catastrophic
scenario is more likely, according to Bostrom, who has a background in physics,
computational neuroscience and mathematical logic.
"Superintelligence could become extremely powerful and be able to shape the future
according to its preferences," Bostrom told me. "If humanity was sane and had our act
together globally, the sensible course of action would be to postpone development of
superintelligence until we figure out how to do so safely."
Bostrom, the founding director of Oxford's Future of Humanity Institute, lays out
his concerns in his new book, Superintelligence: Paths, Dangers, Strategies. His book
makes a harrowing comparison between the fate of horses and humans. Horses were
initially complemented by carriages and ploughs, which greatly increased the horse's
productivity. Later, horses were substituted for by automobiles and tractors. When horses
became obsolete as a source of labor, many were sold off to meatpackers to be processed
into dog food, bone meal, leather, and glue. In the United States, there were about 26 million
horses in 1915. By the early 1950s, 2 million remained.
The same dark outcome, Bostrom said, could happen to humans once AI makes our
labor and intelligence obsolete. It sounds like a science fiction flick, but recent moves in
the tech world may suggest otherwise. Earlier this year, Google acquired artificial
intelligence company DeepMind and created an AI safety and ethics review board to ensure
the technology is developed safely. Facebook created an artificial intelligence lab this year
and is working on creating an artificial brain. Technology called "deep learning," a form of
artificial intelligence meant to closely mimic the human brain, has quickly spread from
Google to Microsoft, Baidu and Twitter. (...) In an interview about his book Bostrom points
out that there are few people working full time on AI control problem. They need more
brilliant brains to this technical work. His hope is that his book will do something to
encourage that. ‘How to control super-intelligent AI is really the most important task of our
time -- yet, it is almost completely ignored.’ says Bostrom.
Adapted from: http://www.huffingtonpost.com
Read the article and choose the correct answer.
1. Superintelligence
A is a substitute for the human intellect.
B will possibly take form of a machine.
C is a machine replacing the human intellect.
D is any intellect which is better than the human one in some fields.
2. According to Bostrom artificial intelligence
-117-
A is going to kill all the humanity.
B will probably do us more good than harm.
C could be a solution for major problems.
D improves the humanity’s intelligence.
3. Bostrom’s advice is
A to stop developing superintelligence for good.
B for people to join forces and improve superintelligence.
C the best way would be to give up developing superintelligence.
D to find some ways of controlling the superintelligence
4. The problem with the horses was that
A they were not productive any more.
B they were more useful for humanity for their meat than for their labor.
C they were a source of labor for meatpackers.
D their labor was taken over by cars.
5. Bostrom says
A controlling the AI is an urgent problem which is being ignored.
B the main task is to control brilliant brains.
C more intelligent people are needed to overtake the AI’s work.
D his book will bring the change in controlling the AI.

-118-
FURTHER PRACTICE 4

XML Takes on HTML


Standard Generalized Markup Language (SGML) is the language that spawned both
HTML (HyperText Markup Language) and XML (eXtensible Markup Language). SGML
is not a true language, it is a metalanguage, which is a language from which you can create
other languages. In this case, it is the creation of a markup language (a system of encoded
instruction for structuring and formatting electronic document elements).
HTML is an application-specific derivation of SGML. It is a set of codes, generally
used for webpages, that creates electronic documents according to rules established by
SGML. HTML is a language that is all about the presentation of your information, not what
the actual data is. You can, therefore, say that HTML is a presentation language.
XML is a subset of SGML, but it is also, like SGML, a metalanguage. XML defines
a specific method for creating text formats for data so that files are program independent,
platform independent, and support internationalization (able to read different languages,
etc.) In fact, because XML is an extensive language, you don’t even have to have a browser
to interpret the page. Applications can parse the XML document and read the information
without any human intervention.
XML, unlike HTML, is concerned with the identity, meaning and structure of data.
XML is extensible because it lets website developers create their own set of customized
tags for documents. This ability to define your own tags is the main feature of XML, and it
is what gives developers more flexibility.
By defining your own markup tags, you can explicitly define the content in the
document. This makes XML a more intelligent markup language than HTML. For example,
in HTML, you could have a paragraph tag <p> preceding a paragraph about baseball. Your
Web browser sees this tag and knows to present the following text as a paragraph. All your
browser knows about the text, however, is that it is text; it doesn’t know that it is specifically
about baseball. In an XML document, you could define a <BASEBALL> tag to refer
specifically to the text in the paragraph in your document. This way, when your XML
browser examines the document, the document knows what data it contains, and that makes
the content more intelligent. Search engines that make use of XML data can do a better job
of finding the pages you are looking for because of the intelligent nature of XML content.
XML, by design, does not deal with how the data is displayed to the end user. Because
HTML is a presentation language., XML documents use HTML tags to help handle the
visual formatting of the document. Also, you can use XML in your HTML documents to
provide metadata, which is data about data in the document.
XML will do to the Web and e-commerce what HTML originally did to the Internet.
XML and its associated applications have the potential to blow the roof off the Internet and
how we do business.

-119-
Source: Oxford English for Information Technology

-120-
Task 1. Read the text and answer the questions.
1. What languages were derived from SGML?
_____________________________________________________________________
2. What type of language is used to structure and format elements of a document?
_____________________________________________________________________
3. Name two metalanguages.
_____________________________________________________________________
4. What elements of data is XML (but not HTML) concerned with?
_____________________________________________________________________
5. What is meant by the term “extensible”?
_____________________________________________________________________
6. What makes XML a more intelligent language than HTML?
_____________________________________________________________________
7. What does the HTML markup tag <p> indicate?
_____________________________________________________________________
8. Why are search engine able to do a better job with XML documents?
_____________________________________________________________________
9. What type of website is particularly likely to benefit from XML?
_____________________________________________________________________

Task 2. Read the text again to mark the following statements as True or False:
1._____ HTML is no longer useful for creating webpages.
2._____ SGML is more complex than XML.
3._____ XML files can only be used on Unix systems.
4._____ XML files can only be read by browser programs.
5._____ HTML is a markup language.
6._____ Internet searches will be better with XML files.

Task 3. Match the terms in table A with the statements in Table B.


Table A Table B
a. Metadata i Extensible markup language
b. Metalanguage ii A coding system used for structuring
and formatting documents
c. HTML iii Data about data
d. XML iv An example of a page presentation
language
e. Markup language v A language from which you can
create other languages.

-121-
FURTHER PRACTICE 5

THE ANATOMY OF A VIRUS

A biological virus is a very small, simple organism that infects living cells, known
as the host, by attaching itself to them and using them to reproduce itself. This often causes
harm to the host cells.
Similarity, a computer virus is a very small program routine that infects a computer
system and uses its resources to reproduce itself. It often does this by patching the operating
system to enable it to detect program files, such as COM or EXE files. It then copies itself
into those files. This sometimes causes harm to the host computer system.
When the user runs an infected program, it is loaded into memory carrying the virus. The
virus uses a common programming technique to stay resident in memory. It can then use a
reproduction routine to infect other programs. This process continues until the computer is
switched off.
The virus may also contain a payload that remains dormant until a trigger event
activates it, such as the user pressing a particular key. The payload can have a variety of
forms. It might do something relatively harmless such as displaying a message on the
monitor screen or it might do something more destructive such as deleting files on the hard
disk.
When it infects a file, the virus replaces the first instruction in the host program with
a command that changes the normal execution sequence. This type of command is known
as JUMP command and causes the virus instructions to be executed before the host
program. The virus then returns control to the host program which then continues with its
normal sequence of instructions and is executed in the normal way.
To be a virus, a program only needs to have a reproduction routine that enables it to
infect other programs. Viruses can, however, have four main parts. A misdirection routine
that enables it to hide itself; a reproduction routine that allows it to copy itself to other
programs; a trigger that causes the payload to be activated at a particular time or when a
particular event takes place; and a payload that may be a fairly harmless joke or may be
very destructive. A program that has a payload but does not have a reproduction routine is
known as Trojan.
Source: Oxford English for Information Technology

-122-
Read the text and answer the questions.
1. How are computer viruses like biological viruses?
_____________________________________________________________________
2. What is the effect of a virus patching the operating system?
_____________________________________________________________________
3. Why are some viruses designed to be loaded into memory?
_____________________________________________________________________
4. What examples of payload does the writer provide?
_____________________________________________________________________
5. What kind of programs do viruses often attach to?
_____________________________________________________________________
6. Match each virus routine to its function.
Routine Function
1. misdirection a. does the damage
2. reproduction b. attaches a copy of itself to another
program
3. trigger c. hides the presence of the code
4. payload D decides when and how to activate the
payload
7. How does a Trojan differ from a virus?
_____________________________________________________________________

-123-
FURTHER PRACTICE 6

Computers make the world smaller and smarter


The ability of tiny computing devices to control complex operations has transformed
the way many tasks are performed, ranging from scientific research to producing consumer
products. Tiny “computers on a chip” are used in medical equipment, home appliances, cars
and toys. Workers use handheld computing devices to collect data at a customer site, to
generate forms, to control inventory, and to serve as desktop organisers.
Not only is computing equipment getting smaller, it is getting more sophisticated.
Computers are part of many machines and devices that once required continual human
supervision and control. Today, computers in security systems result in safer environments,
computers in cars improve energy efficiency, and computers in phones provide features
such as call forwarding, call monitoring, and call answering.
These smart machines are designated to take over some of the basis tasks previously
performed by people; by so doing, they make life a little easier and a little more pleasant.
Smart cards store vital information such as health records, drivers’ licenses, bank balances,
and so on. Smart phones, cars, and appliances with built in computers can be programmed
to better meet individual needs. A smart house has a built-in monitoring system that can
turn lights on and off, open and close windows, operate the oven, and more.
With small computing devices available for performing smart tasks like cooking
dinner, programming the VCR, and controlling the flow of information in an organization,
people are able to spend more time doing what they often do best – being creative.
Computers can help people work more creatively.
Multimedia systems are known for their educational and entertainment value, which
we call “edutainment”. Multimedia combines text with sound, video, animation, and
graphics, which greatly enhances the interaction between user and machine and can make
information more interesting and appealing to people. Expert systems software enables
computers to “think” like experts. Medical diagnosis expert systems, for example, can help
doctors pinpoint a patient’s illness, suggest further tests, and prescribe appropriate drugs.
Connectivity enables computers and software that might otherwise be incompatible
to communicate and to share resources. Now that computers are proliferating in many areas
and networks are available for people to access data and communicate with others, personal
computers are becoming interpersonal PCs. They have the potential to significantly
improve the way we relate to each other. Many people today telecommute- that is, use their
computers to stay in touch with the office while they are working at home. With the proper
tools, hospital staff can get a diagnosis from a medical expert hundreds or thousands of
miles away. Similarly, the disabled can communicate more effectively with others using
computers.
Distance learning and videoconferencing are concepts made possible with the use of
an electronic classroom or boardroom accessible to people in remote locations. Vast
databases of information are currently available to users of the Internet, all of whom can
send mail messages to each other. The information superhighway is designed to
significantly expand this interactive connectivity so that people all over the world will have
free access to all these resources.
-124-
People power is critical to ensuring that hardware, software, and connectivity are
effectively integrated in a socially responsible way. People- computer users and computer
professionals – are the ones who will decide which hardware, software, and networks
endure and how great an impact they will have on our lives. Ultimately people power must
be exercised to ensure that computers are not only efficiently but in a socially responsible
way.
Adapted from Oxford English for information technology
Task 1. Read the text and answer the questions.
1. Name some types of devices that use “computers on a chip”.
_____________________________________________________________________
2. What uses of handheld computers are mentioned in the text?
_____________________________________________________________________
3. What are the benefits of using computers with the following items?
a. Security systems
b. Cars
c. Phones
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
4. What smart devices are mentioned in the text?
_____________________________________________________________________
5. What are smart cards used for?
_____________________________________________________________________
6. What are the advantages of multimedia?
_____________________________________________________________________
7. What can medical expert systems do?
_____________________________________________________________________
8. How can computers help the disabled?
_____________________________________________________________________
9. What types of computing systems are made available to people in remote locations using
electronic classrooms or boardrooms?
_____________________________________________________________________
_____________________________________________________________________
10. What aspects of computing can people power determine?
_____________________________________________________________________

Task 2. Mark the following statements as True or False:


1. __________Desktop organisers are programs that require desktop computers.
2. __________Computers are sometimes used to monitor systems that previously needed
human supervision.
3. __________Networking is a way of allowing otherwise incompatible systems to
communicate and share resources.
4. __________The use of computers prevents people from being creative.
5. __________Computer users do not have much influence over the way that computing
develops.
-125-
FURTHER PRACTICE 7

Task 1 . Work in groups of three, A, B and C. Read the text extracts and complete
parts 1 and 2 of this table.

1. Area of IT
2. Predictions
3. Comments

Text A
Telecoms applications will soon be bundled Electronic money will be very secure but
together in much the same way as office much more versatile than physical
application suites are today. A major alternatives. E-cash can be completely
example is the electronic marketplace, global and could be used as a de facto
which will bring customers and suppliers standard. It does not have to be linked to
together in smart databases and virtual any national currency, so can be
environments, with ID verification, independent of local currency fluctuation.
encryption and translation. It will then Its growing use on the Net will lead to its
implement the billing, taxation and acceptance on the street and we may hold
electronic funds transfer, while a large proportion of our total funds in this
automatically producing accounts and global electronic cash. People will
auditing. The whole suite of services will be increasingly buy direct from customised
bases on voice processing, allowing a manufacturers. Shops will be places where
natural voice interface to talk to the people try on clothes, not buy them. Their
computer, all the AI to carry out the request, exact measurements can be sent instantly
and voice synthesis and visualisation to the manufacturer as soon as they have
technology to get the answer out. chosen an outfit. The shops may be paid
by the manufacturer instead.

Text B
Employment patterns will change, as many Of course, workers can be fully mobile, and
jobs are automated and new jobs come into we could see some people abandon offices
existence to serve new technologies. Some completely, roaming the world and staying
organisations will follow the virtual in touch via satellite systems. Even in trains
company model, where a small core of key and planes there may be infrared
employees is supported by contractors on a distribution to each seat to guarantee high
project by project basis, bringing together bandwidth communication. One tool they
the right people regardless of where they may have in a few years is effectively a
live. The desks they will use will have communicator badge. This will give them a
multiple flat screens, voice interfaces, voice link to computers across the network,
computer programs with human-like faces perhaps on their office desk. Using this
and personalities, full screen voice link, they can access their files and
videoconferencing and 3D sound email and carry out most computer-based
positioning. All this will be without any work. Their earphones will allow voice
-126-
communication cables since the whole synthesisers to read out their mail, and
system uses high capacity infrared links. glasses with a projection system built into
The many short-term contractors may not the arms and reflectors on the lenses will
have enough space in their homes for an allow a head-up display of visual
office and may go instead to a new breed of information. Perhaps by 2010, these
local telework centre. glasses could be replaced by an active
contact lens that writes pictures directly
onto the retina using tiny lasers.

Text C
Finally and frivolously to the very long Athlete and a brain literally the size of the
term. By around 2030, we may have the planet, the whole global superhighway and
technology to directly link our brain to the every machine connected to it. Over time,
ultra-smart computers that will be around this new form may converge with the
then, giving us so much extra brainpower machine world, as more and more of his
that we deserve a new name, Homo thoughts occur in cyberspace. With a
Cyberneticus. In much the same time complete backup on the network, Homo
frame, geneticists may have created the Hybridus would be completely immortal.
first biologically optimised humans, Homo Ordinary biological humans would
Optimus. It would make sense to combine eventually accept the transition and plain
this expertise with information technology old Homo Sapient could become
wizardry to make something like the Borg, voluntarily extinct, perhaps as early as
Homo Hybridus, with the body of an 2200.
Olympic
Adapted from Oxford English for information technology

Task 2. Now exchange information with others in your group to list all the predictions
made in the text. Discuss with your group the predictions made and add your own
comments on the predictions in the last section of the table.

-127-
FURTHER PRACTICE 8

The technology needed to set up a home network is here today. It is just a matter of
connecting a number of PCs equipped with Ethernet adapters to a hub using twisted-pair
cabling which uses sockets rather like phone sockets. Special isolation adapters can be fitted
to allow existing mains lines to be used instead of twisted-pair cabling. Most future home
networks, however, are likely to be wireless network systems, using tuned transmitter and
receiver devices. The simplest networks allow basic file-sharing and multi-player gaming
as well as sharing of peripherals such as printers. Most advanced home networks are
likely to have a client/server structure, with low-cost terminals, or “thin” clients, connected
to a central server which maintains the system’s storage capacity and, depending on whether
the terminals are dumb or processor-equipped network computers, its processing power. To
make the most of such a network, it must become part of an integrated home entertainment
and control system. To the user, the desktop becomes just one of many features accessible
throughout the house. Tired of working in the study? Pop down to the living room and
reload it into the terminal there. Before you start work, call up the hi-fi control program and
have the music of your choice pumped through the living room speakers. Computer and
entertainment networks can be separate but linked by the server to allow control of the latter
from the terminals. Future home networks are more likely to have the entire system based
on a single loop.

KEY TO THE DIAGRAM


-128-
1. Line receiver delivering home entertainment audio to speakers within the room.
2. TV set relaying digital TV broadcasts relayed from the receiver by the home
entertainment system.
3. Network modem allowing clients to access the Internet simultaneously. Ideally this
would be replaced by an ISDN adapter or DSL modem fitted inside the server.
4. Thin client comprising a display, keyboard, mouse, floppy and CD-ROM drive. If the
client is NetPC-based, it will have its own processor and memory. A dumb terminal will
simply act as an interface to the real computer, the server.
5. Network printer connected to any client.
6. Line driver connected to the home entertainment system: the cable TV player, DVD
player, etc.
7. Home server. It contains roughly 5Gb of storage per terminal and one or more
processors, depending on whether it is connected to network computers or to cheaper
dumb terminals.
8. Entertainment system delivery network. This also hooks up to the server to control the
system and receive digital audio and video from it.
9. Entertainment network control pad. While the system can be controlled by a PC, there
would be one of these per connected room to ensure that the client does not need to be
activated to use the system.
10. Data line linking clients to server.
Adapted from Oxford English for information technology

Now read the text and the diagram of a simple home network setup. Match the
diagram key to the components of the network.

-129-
FURTHER PRACTICE 9

Read these hints on choosing a free ISP. Then decide which of the options available
offer the best deal to these users. Be prepared to defend your choice.
1 a household with a young family
2 a small home-based business
3 someone who enjoys online gaming
4 someone who doesn’t want a lot of spam in their email
Choosing a free ISP
Using a free ISP requires no new technology-all you need is a computer, a modem,
a telephone line, and the appropriate software (which is available free of charge when you
sign up with the service). Once installed on your PC you can access the Internet as normal,
but your connection costs only the price of a local call, and you pay nothing else- not even
for features such as an unlimited number of email addresses, unlimited Web space and
original content.
Most of the services are very similar, but it is still worth looking around for a service
that offers at least the following features:

CD-ROM or Online sign up


Many free ISPs require you to sign up for their service online (which obviously
means you already need to have an Internet connection and some experience with setting
up a dial-up networking connection). If you are a complete beginner, you’ll need a free ISP
which can provide its sign-up software on CD-ROM that will automatically configure your
computer to access the Internet.

Local rate calls


Although using the ISP is free, you still have to pay for your online time. Nearly all
ISPs however provide local call access numbers. Any free ISP that uses a national rate
number or charges an initial set-up or administration fee should be avoided.

E-mail
Having several email accounts is very useful-you can separate business and personal
email for example, or provide an address for each member of your family. Many free ISPs
also offer only Web-based mail which is great if you need to get into your computer on the
move as you can access it from any computer with Internet access. POP3 email however is
faster and more efficient and can be downloaded to your PC to read offline- a combination
of the two is ideal.

Free Web space


A decent amount of free Web space would be around 25-50Mb. This would be
sufficient for most of your own personal website developments. Also check to see if there
are any restrictions on your use of Web space, since some free ISPs will not let you use the
space for commercial purposes.

-130-
Newsgroups
Newsgroups are huge discussion forums on the Internet that are an amazingly rich
resource of information and a brilliant way to communicate with other Internet users.
Unfortunately they are also the home to some of the most unsavoury content on the Internet
(they are largely unmoderated) and as a result many free ISPs restrict access to some or all
newsgroups.

Customer support
Check support line charges; many free ISPs use their support lines as a source of
revenue relying on your ignorance to make money from the call.
The target audience is generally Net novices and, as a result, support lines are pretty much
jammed all day with queries and connection problems.
Most use premium rate telephone line charges. However, there are a few free ISPs who only
charge local or national rates for their telephone helplines.

Reliable Service
Of course all the features in the world won’t make a scrap of difference if the ISP is
unreliable and you find it impossible to log on. Look out for recommendations from friends
and shop around. Interestingly many of the more popular services have become saturated
and seem to be in a constant “upgrading the network” phase.
There is nothing to stop you having more than one free ISP account. Windows will
even enable you to run a number of different free ISP connection set-ups on the same PC
so you can easily have multiple accounts and just use the best one on the day.

Option A Option B Option C


Bigwio Arsenal ConnectFree
• 7 POP3 email • 5 POP3 email • 5 POP3 email
accounts each with accounts addresses each
up to 1,000 aliases • Access to most password-protected
• Scans all emails for newsgroup • Full access to
viruses before they • 5Mb free Web space newsgroup
reach you • Technical support at • Unlimited Web
• 15Mb free Web 50p/ minute space
space • Free online webpage
• Access to 25,000 design service
newsgroups • Free access to online
• Technical support at multi-player games
50p/minute
• Comprehensive
online information
and easy-to-follow
help available

-131-
Option D Option E
Bun Free4all
• Unlimited email addresses • Unlimited POP3 email accounts
• 25Mb Web space • Email virus protection and junk
• Online help section email filters
• Free access to CyberPatrol for • 25Mb of free Web space with option
blocking or restricting access to to increase at £1 per Mb per month
inappropriate content on the Web • Powerful enough to create quite
advanced, functional sites
• Technical support at local call rates

For further details of ISPs try:


www.net4nowt.com
www.ispa.org.uk
www.ispc.org
Adapted from Oxford English for information technology

-132-
FURTHER PRACTICE 10

Backup HSM and Media Choice

Near-line and offline storage (often called Hierarchical Storage Management) is the modem
way of dealing with current storage needs. Hard disks are becoming cheaper, but data
storage requirements are higher, so it’s better to plan for HSM than assume disks can
continually be added to systems.
HSM is essentially the automatic movement of data between media, the media type used
depending on when it was last accessed. Many software and hardware vendors have HSM
solutions, and all are based on the same basic techniques.
The most common HSM setup is where there’s online storage (the hard disk), near-line
storage (some sort of fast media from where a file can be quickly retrieved), and offline
storage (slower media that might take some time for files to be recovered, but it is cheaper
for a long-term storage). This arrangement is the major thrust of today’s systems. Most of
the time these systems will comprise optical media for near-line and tape media for offline
storage.
Data is automatically moved from the online disk to the near-line optical media if it hasn’t
been accessed for a definable period of time. This is typically three months (depending on
your business). This near-line system is likely to be erasable optical disks in some form of
jukebox.
The system has to operate on the basis that a user won’t know that a file has been moved
into near-line storage. Therefore some marker is left in the directory structure on the disk
so that the user can still see the file. If the user the tries to open it, the file will automatically
be copied from near-line to online storage, and opened for the user. All the user notices is
a slight time delay while the file is opened.
Moving data from near-line to offline storage can be done using a similar mechanism, but
more often the marker left in the directory for the user to see will just contain a reference.
This gives the user the facility to request the file back from the systems administrator, and
could have information like “This file has been archived to offline media” and a reference
to the tape number that the file is on. This is then sent to the system administrator and the
file can be recovered from tape in the usual way.
Some modern systems have the ability to keep multiple tapes in a tape changer or jukebox
system, so retrieval from offline to online storage can be automatic. However, it is more
likely that when a file goes into offline storage it will never be recovered, as it has probably
been untouched for several months (again depending on the business). Therefore the
requirement to recover from offline to online is reasonably infrequent.
The choice of storage media type is a crucial aspect of HSM. The cheapest is undoubtedly
tape (be it digital, analogue or digital linear), so this tends to be used for offline storage.
However, tape has no guarantee of data integrity beyond one or two years, whereas optical
systems, such as CDs, WORMs and MO disks, have much better data integrity over a longer
period of time.

-133-
Depending on the precise application, archiving systems are usually based on the media
type that has the best integrity. The major suppliers within the HSM market are totally open
about the media that can be used with their software.
Current HSM systems support most hardware devices, so you can mix and match media to
suit requirements. Given the fact that media choice depends on the length of time you want
your data to remain intact, and also the speed at which you want to recover it, the choice
for many system managers is as follows.
Tape is used for backup systems where large amounts of data need to be backed up on a
regular basis. Tape is cheap, integrity is good over the short to medium term, and retrieval
from a backup can be made acceptable with good tape storage practices.
Near-line storage should be based on erasable optical disks. This is because access is
random, so the access speed to find and retrieve a particular file needs to be fast, and data
integrity is also good.
Archiving systems should probably be CD-or WORM-based, as again access speeds are
good, media costs are reasonably cheap and importantly, the integrity of the media over the
medium to long term is good.
One important thing to remember with archiving systems is the stored data’s format. The
data might be held perfectly for 10 or 15 years, but when you need to get it back, it’s
essential that you maintain appropriate hardware and software to enable you to read it.
Adapted from Oxford English for information technology

Task 1. Read the text and answer the questions.


1. What factor determines which type of storage is used to store a file in an HSM system?
_____________________________________________________________________
2. What happens to data that is not accessed for a long time?
_____________________________________________________________________
3. How does the system record that a file is in near-line storage?
_____________________________________________________________________
4. What happens when a user tries to access a file in near-line storage?
_____________________________________________________________________
5. What does the reference to a file in offline storage contain?
_____________________________________________________________________
6. To whom does the user send a request for the retrieval of a file from offline storage?
_____________________________________________________________________
7. What two factors determine the choice of storage media used?
_____________________________________________________________________
8. What items must you remember to maintain while data is stored?
_____________________________________________________________________

Task 2. Read the text again and mark the following statements with True or False:
1__________ Hard disks are still very expensive.
2__________ Near-line storage needs to have a quick access speed.
3__________ Near-line storage is usually some form of jukebox.
4__________ Offline storage needs to have a fast access speed.
5__________ Users are aware that their files have been moved to near-line storage.
-134-
6__________ The movement of files between near-line and online storage is automatic.
7__________ The user sometimes has to request files from the systems administrator.
8__________ Files are frequently recovered from offline storage.
9__________ Tape has much better data integrity than optical media.
10__________ It is usually possible to use whatever media you want in an HSM system.

-135-
GLOSSARY

UNIT 1

Term Part of Speech Meaning


Application N ứng dụng
Assignment N sự giao việc, nhiệm vụ
Available ADJ Sẵn có
Cloud computing NP Điện toán đám mây
Code N, V Mã, tạo mã
Consulting service NP Dịch vụ tư vấn
Customer service NP Dịch vụ khách hang
Data processing NP Xử lý dữ liệu
Database N Cơ sở dữ liệu
Database administrator NP Quản lý cơ sở dữ liệu
Decode V Giải mã
Diagnose V Chẩn đoán, phát hiện lỗi sai
Employ V Tuyển dụng
Employee N Nhân viên
Employer N Nhà tuyển dụng
Encode V Mã hoá
Facilities N Cơ sở, trang thiết bị
Firewall N Tường lửa
IT department NP Phòng Công nghệ thông tin
Launch V Giới thiệu, tung ra
Maintain V Duy trì
Network administrator NP Quản trị mạng
Network architect NP Kiến trúc sư mạng
Office N Văn phòng
Officer N Nhân viên văn phòng
Operating system NP Hệ điều hành
Password N Mật khẩu
Process V Xử lý
Quality assurance NP Đảm bảo chất lượng
Restructure V Tái cấu trúc
Security N An ninh
Server V Máy chủ
Software developer NP Nhân viên phát triển phần mềm
Supervise V Giám sát
-136-
Supply V Cung cấp
Support technician NP Kỹ thuật viên
System analyst NP Nhân viên phân tích hệ thống
Technical support NP Hỗ trợ kỹ thuật
Transfer V Chuyển giao
Upgrade V Nâng cấp
Username N Tên sử dụng
Wireless network NP Mạng không dây
Workload N Khối lượng công việc

UNIT 2

Term Part of Speech Meaning


access V,N Truy cập
application software NP Phần mềm ứng dụng
assembly NP Lắp ráp
attach V Gắn vào
back up V Sao lưu
cable N Cáp
cache N Bộ nhớ đệm
case N Vỏ (máy tính)
communication N Giao tiếp, sự kết nối
computer N Máy tính
connect V Kết nối
control V Điều khiển, kiểm soát
cooling fan NP Quạt làm mát
coordinate V Điều phối
CPU N Bộ xử lý trung tâm
disconnect V Ngắt kết nối
disk drive N ổ đĩa
efficient ADJ Hiệu quả
ethernet connector NP Cổng kết nối Ethernet
execute V Thực hiện, chạy
expansion card NP Thẻ mở rộng
extract N, V Trích xuất
feed into VP Nhập dữ liệu
floppy drive N Ổ đĩa mềm
format N Định dạng

-137-
gather V Tập hợp
hard drive N Ổ đĩa cứng
hardware N Phần cứng
heat sink N Bộ tản nhiệt
information N Thông tin
input/output device NP Thiết bị đầu vào/ đầu ra
insert V Chèn
instruction N Hướng dẫn
integrate V Tích hợp
keyboard N Bàn phím
main memory NP Bộ nhớ chính
mechanic ADJ Thuộc về cơ học
memory N Bộ nhớ
monitor N Màn hình
motherboard N Bo mạch chủ
operating system NP Hệ điều hành
output N Đầu ra
partition V,N Chia tách
perform V Hoạt động, thể hiện
peripheral N Thiết bị ngoại vi
permanent ADJ Cố định
plug V Cắm vào
port N Cổng
power supply NP Nguồn điện
pre-emptive multitasking NP Đa nhiệm ưu tiên
press V Ấn nút
printer N Máy in
processor N Bộ xử lý
RAM N (Random Access Memory) bộ nhớ khả
biến, bộ nhớ truy xuât ngẫu nhiên
reboot V Khởi động lại hệ thống
ROM N (Read-only memory) bộ nhớ chỉ đọc
scanner N Máy scan
screen N Màn hình
server Máy chủ
settings N Cài đặt
socket N ổ điện
software N Phần mềm

-138-
storage device N Thiết bị lưu trữ
switch off V Tắt máy
Symmetrical N Đa xử lý đối xứng
multiprocessing
turn on V Bật lên
unplug V Rút phích cắm
user account N Tài khoản người sử dụng
utility software N Phần mềm tiện ích
virtual reality goggles NP Kính thực tế ảo

UNIT 3

Term Part of Speech Meaning


Accessible adj Có thể truy cập được
Address v Giải quyết
Alphanumeric value np Giá trị gồm chữ và số
Application n Ứng dụng
Assume v Cho rằng; giả sử
Bandwidth n Băng thông
Centralized database np Cơ sở dữ liệu tập trung
Cloud database np Cơ sở dữ liệu đám mây
Column n Cột
Commercial database np Cơ sở dữ liệu thương mại
Complexity n Sự phức tạp, sự rắc rối
Database n Cơ sở dữ liệu
data coding np Mã hóa dữ liệu
data collection np Thu thập dữ liệu
data entry np Nhập liệu
data sorting np Sắp dữ liệu
data tabulation np Lập bảng dữ liệu
data validation np Xác thực dữ liệu
End-user np Người dùng cuối
Enormous adj To lớn, khổng lồ
Expansion n Sự mở rộng, sự phát triển
Framework n Khung (các đoạn code đã được viết sẵn,
cấu thành nên một bộ khung và các thư
viện lập trình được đóng gói)
Hardware n Phần cứng
Heterogeneous adj Không đồng nhất
Homogenous adj Đồng nhất
Input n Nhập liệu
Integrity n Tính toàn vẹn, tính nguyên
-139-
Interface n Giao diện
Network n Mạng
Object oriented database np Cơ sở dữ liệu hướng đối tượng
Operational database np Cơ sở dữ liệu hoạt động
Operating system np Hệ điều hành
Personal database np Dữ liệu cá nhân
Relational database np Cơ sở dữ liệu quan hệ
Replicate v sao chép, sao lại
Row n Hàng
Storage n bộ nhớ
Structured query language np Ngôn ngữ truy vấn mang tính cấu trúc
Systemize v Hệ thống hóa
Virtual environment np Môi trường ảo

UNIT 4

Term Part of Speech Meaning


Advance (n) Tiến bộ
Accomplish (v) Hoàn thành
Algorithm (n) Thuật toán
Analyze (v) Phân tích
Approach (v) Tiếp cận
Artificial (adj) Nhân tạo
Autonomous (np) Tự động vận chuyển
transportation
Autocomplete (n) Tự động hoàn thành
Bot (np) máy
Breakthrough (n) Đột phá
Computer science (np) Khoa học máy tính
Consistent (adj) Thích hợp
Digital (adj) Kỹ thuật số
Distraction (n) Mất tập trung
Diagnose (v) Chuẩn đoán
Exponential curves (np) Đường cong
Envision (n) Hình dung
Emotional intelligence (np) Trí thông minh cảm xúc
Facial recognition (n) Nhận diện khuôn mặt
Experience (n) Kinh nghiệm
Figure out (vp) Tìm ra
Human brain (n) Bộ não con người
Intimidate (v) Bắt chước
Infuse (v) Pha vào, đổ vào
-140-
Jokes and stories (adj) Truyện
Master (v) Bậc thầy, giỏi
Manifest (n) Rõ ràng, minh bạch
Mimic (v) Bắt chước
Neural networks (np) Mạng tế bào thần kinh
Obey (v) Tuân theo
Perform (v) Thực hiện
Predict (v) Dự đoán
Predictive technologies (np) Công nghệ dự đoán
Process (n) Quy trình
Revenge (n) Sự trả thù
Sleep deprivation (n) Thiếu ngủ
Sophisticated (adj) Phức tạp
Search engine (np) Công cụ tìm kiếm
Syntax (n) Cú pháp
Streaming platforms (np) Nền tảng phát trực tiếp
Skyrocket (n) Tăng vọt
Shopping (n) Gợi ý mua sắm
recommendations
Speech-to-text (n) Chuyển lời nói thành văn bản
Scientist (n) Nhà khoa học
Text-based (np) Dựa trên văn bản

UNIT 5

Term Part of Speech Meaning


A connecting medium (np) Phương tiện kết nối
A gateway (np) Cổng
A repeater (np) Bộ hỗ trợ mở rộng
A token (np) Mã thông báo
Access point (np) Điểm truy cập
Backbone (n) Xương sống
Bandwidth (n) Băng thông rộng
Cable (n) Cáp
Campus Area Network (np) Mạng khu vực cơ sở
Communications (np) Giao thức truyền thông
protocols
-141-
Configure (v) Định cấu hình
Device (n) Thiết bị
Endpoint nodes (np) Thiết bị hoặc nút điểm cuối
Endpoint users (np) Người dung điểm cuối
Exchange (v) Trao đổi
Expansion card (np) Thẻ mở rộng
Equipment (n) Thiết bị
Facilitate (n) Tạo điều kiện
Hubs (n) Cổng
Isolate (v) Tách ra
Internet Protocol Suite (np) Bộ giao thức liên mạng
Link (n) Kết nối
Modem (n) Modem
Manage (v) Quản lý
Metropolitan Area (np) Mạng đô thị
Network
Network server (np) Máy chủ
Network speed (np) Tốc độ mạng
Network range (np) Mạng
Network topologies (np) Cấu trúc liên kết mạng
Nodes (n) Nút (thiết bị thuộc mảng
blockchain)
Pathway (n) Đường
Personal Area Network (np) Mạng cá nhân
Power line (np) Truyền thông đường dây điện
communication
Private network (np) Mạng cá nhân
Public network (np) Mạng công cộng
Recommend (v) Giới thiệu
Remote (adj) Xa
Remote sites (np) Khu vực xa
Router (n) Bộ định tuyến
Sensors and actuators (np) Cảm biến và thiết bị truyền động
Storage Area Network (np) Mạng khu vực lưu trữ
Switches (n) Thiết bị chuyển mạch
Share (v) Chia sẻ
Transmit (v) Truyền

-142-
Units of measurement (np) Đơn vị đo lường
Virtual Private Network (np) Mạng riêng ảo

UNIT 6

Term Part of Speech Meaning


Analogue signal (np) Tín hiệu analog
A set-top box (np) Một thiết bị giải mã tín hiệu truyền
hình
Advancement (n) Tiên tiến
Broadcast (v) Truyền hình
Browse (v) Duyệt qua
Capabilities (n) Năng lực
Cloud computing (np) Điện toán đám mây
Component (n) Thành phần
Comprehensive (adj) Toàn diện
Company intranets (np) Mạng nội bộ công ty
Consist (v) Bao gồm
Contribute (v) Đóng góp
Conventional (adj) Truyền thống
Create (v) Tạo ra
Cyborgs (n) Sinh vật cơ khí hoá
Cybernetic organisms (np) Sinh vật điều khiển từ
Devise (v) Sáng chế, phát minh
Decode (v) Định cấu hình
Digital decoder (np) Bộ giải mã kĩ thuật số
Digital Radio (np) Radio kĩ thuật số
Digital TV (np) TV kĩ thuật số
Digital Terrestrial TV (np) TV kĩ thuật số mặt đất
Digital Video Broadcast- (np) Chuẩn kĩ thuật số nhằm cung cấp
Handled dịch vụ truyền thông
Digital Audio (np) Phát thanh kĩ thuật số
Broadcasting
Discrete (v) Rời rạc
Driven transactions (np) Giao dịch định hướng
Electronic communication (np) Giao tiếp điện tử
Informal (adj) Không trang trọng
Information inquiries (np) Yêu cầu về thông tin
Interactive service (np) Dịch vụ tương tác
-143-
Incorporate (adj) Hợp tác
Inter-medicine (n) Nội khoa
Instant messaging (n) Tin khẩn
Navigate (v) Điều hướng
Navigation system (np) Hệ thống điều hướng
One-way conversation (np) Giao tiếp một chiều
Platform (n) Nền tảng
Pay-per-view (np) Trả tiền trên lượt view
Revolutionize (v) Cách mạng
Satellite (n) Vệ tinh
Synonymous (adj) Đồng nghĩa
Telemarketing (n) Tiếp thị qua điện thoại
Teletext (v) Dịch vụ điện toán cung cấp tin tức
và các thông tin khác trên màn
hình ti vi
Teleworking (n) Làm việc qua điện thoại
Transmission (n) Đường truyền
Telecommunications (np) Viễn thông
Transmit (v) Truyền
Wearable computer (np) Công nghệ đeo trên người
Widescreen (n) Màn hình rộng

UNIT 7

Term Part of Speech Meaning


Animation n Hoạt hoạ
Background n Nền
Background templates np Hình nền
Clip art np Hình mẫu
Commercial adj Thuộc thương mại
Display v Hiển thị
Full-motion video n Video chuyển động toàn phần
Graphic n Đồ hoạ
Hyperlink n Siêu liên kết
Hypertext markup np Ngôn ngữ Đánh dấu Siêu văn bản
language
Icon n Biểu tượng
Incorporate v Kết hợp, tích hợp
Meta tag n Thẻ meta
Obtain v Thu được, đạt được
-144-
Page optimization np Tối ưu hoá trang
Page Source np Nguồn trang
Podcast n Các tệp âm thanh kỹ thuật số có sẵn
trên Internet
Promote v Quảng bá, đẩy mạnh, xúc tiến
Tag n Thẻ
Transparent images np Ảnh nền trong suốt
Wallpaper n Mẫu nền màn hình
Web editor np Biên tập viên nội dung website
Word processor np Bộ xử lý văn bản/ trình xử lý văn bản

UNIT 8

Terms Parts of speech Meanings


Access point np Điểm truy cập
Accessibility n Khả năng truy cập
Anonymous FTP n Giao thức FTP ẩn danh
Anti-Spam n Dịch vụ/ giải pháp chống thư rác
Authentication n Sự xác nhận là đúng, sự chứng minh là
xác thực
Broadband connection np Kết nối băng thông rộng
Browser n Trình duyệt
Cable modem np Mô đem cáp
Digital asset np Tài sản kỹ thuật số
Encryption n Sự mã hoá
Firewall n Tường lửa
Malware n Phần mềm độc hại
Protocol n Giao thức
Secure server np Máy chủ bảo mật
Security token np Thẻ bảo mật
Spyware n Phần mềm gián điệp

UNIT 9

Term Part of Speech Meaning


Atom n nguyên tử
Biometrics n sinh trắc học
Checkpoint n điểm kiểm tra
Convergence n sự hội tụ
Criminal n tội phạm
Diagnose v chẩn đoán
-145-
Discernible adj có thể thấy rõ/ có thể nhận thức rõ
Electronic pet np thú cưng điện tử
Equivalence n tương đương
Extraterrestrials n ngoài khí quyển
Humanoid adj có hình dáng/ tính cách của con người
Interconnect v liên kết/ nối kết
Invisible adj vô hình
Language recognition np nhận dạng ngôn ngữ
Microprocessor n bộ vi xử lý
Mount v lắp vào, được trang bị
Nanocomputer n máy tính nano
Nanotechnology n công nghệ nano
Nanotransistor n bán dẫn siêu vi
Originate v bắt nguồn
Pervasive computing np điện toán mọi lúc mọi nơi
Sync v đồng bộ hoá
Technophobic adj có chứng sợ máy tính
Teleworking n làm việc từ xa
Ubiquitous adj có mặt ở khắp nơi
Voice recognition np nhận dạng giọng nói
Withdraw v rút (tiền)

-146-
REFERENCES

[1]. Eric H.Glendinning & John McEwan, Oxford English for Information Technology,
Oxford Univesity Press, 2002.
[2]. Maja Olejniczak, English for Information Technology, Pearson Longman, 2011.
[3]. Santiago Remacha Esteras, Infortech English for computer users, Cambridge, 2007.
[4]. Virginia Evans, Jenny Dooley, Stanley Wright, Information Technology, Express
Publishing, 2014.
[5]. https://databasetown.com/relational-database-benefits-and-limitations/
[6]. https://www.javatpoint.com/types-of-databases
[7].https://www.matillion.com/resources/blog/the-types-of-databases-with-examples
[8]. https://bus206.pressbooks.com/chapter/chapter-4-data-and-databases/
[9]. https://www.learncomputerscienceonline.com/how-to-design-database/
[10].https://slideplayer.com/slide/8325296/#:~:text=2%20Data%20Base%20A%20databa
se,%2C%20sound%2C%20video%20and%20hyperlinks.
[11]. https://en.islcollective.com/english-esl-worksheets/skill/speaking/what-artificial-
intelligence/98088
[12]. https://www.englishclub.com/efl/listen-learn/science/artificial-intelligence/
[13]. https://eslflow.com/wp-content/uploads/2021/06/AI-2021.pdf
[14].https://breakingnewsenglish.com/1402/140226-artificial-intelligence-m.pdf
[15]. https://www.eslprintables.com/printable.asp?id=987982
[16]. https://www.liveworksheets.com/cv1000345gh
[17].https://www.techtarget.com/searchnetworking/definition/network
[18]. https://www.ibm.com/cloud/learn/networking-a-complete-guide
[19]. https://www.youtube.com/watch?v=4_zSIXb7tLQ
[20]. hhttps://www.liveworksheet
[21]. https://www.liveworksheets.com/ey1454881ru
[22]. https://www.youtube.com/watch?v=4uk1qrCPlts
[23]. https://www.liveworksheets.com/yz1367607bp
[24]. https://www.liveworksheets.com/xh1487514kl
[25].https://www.eslprintables.com/vocabulary_worksheets/communication_worksheets/
Electronic_Communication_416287/
[26].https://www.liveworksheets.com/yz1367607bp
[27].https://www.elprocus.com/electronic-communication-and-its-types/
[28]. https://searchcio.techtarget.com/definition/ICT-information-and-communications-
technology-or-technologies

-147-

You might also like