You are on page 1of 58
‘1.C Yunanesa,E. Ml. ABneesa, NC. Eonna AHTAMMCKUM A3bIK B BU3HEC-MHOOPMATUKE. ENGLISH FOR BUSINESS INFORMATICS (BI—B2) YMEBHMK WA NPAKTHKYM, ANA AKAJEMMMECKOTO BAKANABPMATA Peawendosa Mete-wertuteceuwem@enow ace ofan everett pacman Bs eyemoe ac ev 000, ef yrseuuca no cowuanve orowecru nmposrei ora cryma anerpenoOunnsrewod caren ‘ibile-olinesu Moora + Hpi = 2019, a sua oogcrs8 Siena Haine Caprese foo ge toc enemas ta srt Sa ase ero su “enure eapraaemtoatreeran ile Kom eee eet ee pope “enon Bearpaw 7 777 ~~ an UN: eg re i eon eae ‘Sts decoy Reopen naroan® maven nse" ey ‘se iments Poa Seapets nine ‘nection ems Hare wanna See ae a Cte fo Oa tame never en te ae pA > {Sevan arpa es. sic aon ate =e Temonin tay At tpeomensh mare Oaea Fe ‘are the pa Oe ue Ran gS niceasn Pacer pet eee a paso ein ee ete pace ‘Speqmon sane opus meter orompestecce ‘trons eden nas Rebecca pane Samah von aares) de ‘yn sa a en nin Po ine py elo lvacorperenar sea en sans sot {0000 saietese pate, 208 Ornapnenne peaenosne. 5 Part 1 READING, LISTENING AND SPEAKING Unie Economics and Information Systems a7 Unit. Economic Systems... fs 25 ‘Unit IL, Corporate Information System (CIS) 35 ‘Unit TV. Meking Information Security Strategie to Business. 48 Unie. system Integration (SD... 54 Unit VI. Customer Relationship Management. a ‘Unit VIL. E-Business (Electronic Business) n ‘Unit VI. IT Project Management E 78 ‘Unit. Inelectual Property: Software Protection. 8 Unit X. Laptops and Tablet in Business Communication 96 ‘Unit x1. Collaboration in Cyberspace and Global Beonomy’..-107 ‘Unit XI. Digital Beonomy.. Part 2 ‘TESTS AND ADDITIONAL MATERIALS Teel Test 2 Tex 3. Tet 4. ‘Tes5.. ‘Tes. one aaron no enone tera mune mcotexmn egATINAN 135 136 137 138 139 140 aan asa 487 161 162 162 166 Tpenncnosue Alannah yyeOnnx n nparcrigyse npeaneonavert ans cryAetros Gaanaupuara yupasnenseciax cretmanocre (wenenaUetT, \ynpansenite HepcowanON) € ypoosea wae anon ma om B1n sue no uneane CEFR wnt 5,0 mstue mo mieane IELTS. Marepnama nocoGiun more Git noxesiz 21x GopMuposamnt Y o6yraemsx oftexyastypHBX H npospeccHonarDOX KoMETEH- Innit, Paora ¢ xiroR octlosana wa npuaimax aaHocrH0-optt feuponanmoro moxxaa. TlocoGe Moxer Gare neiionssoBaNO hia mpaxecenc aan NO anim ssanNy, » NacTHOETH, ta sanmrenc no nnocrpanHOMY Sneyw npogeccHONAAHO eepe, 4 Taione nnponteece canocrostexstol paGora c wean opmpo: ‘arm OutenyasrypHiX 1 popeccAoHasaanax nonaeTeMIO, pas ren KONMYINRQTIGREDE HABKIKOD MYER, MeOGronMNna 8 nposhecononasitoro o6mens ‘Akryamsiocrs coUANvD Aakworo NoCoGiet OBnstcHKETEN pocrom rrrepeca x HujopMangorsMt TeANONOFINN Hx NenMSsORa- to» pasnianion oGaacrax, # YacrHOcT#t,® GakKoDcKOM Aexe, DMenexoewenre, wapweriire Wi NNOTH apyrux. HecoMNeNAAD [poeronnternon Hint ARARETER Nap COuPEMENNELS ERCTOB TH ‘rent w aypuponatnes, a raroxe cuCrema ypaxnenat a pas- wie mgs Pevesot AereNsNOCTH,w pesyauTaTe woe rovopane eryaetrt ORRAERAIOT HpARTHVECGINH MaBMKAMpO- ‘Geccnontatnol wonnyerano Kira coeroir na anys wacred leppas wacrs mxcuowaer 12 ypo- xxop-orrron (Units). Bo wropyi acts axoast 12 recros (Tests), ‘exer va jonasiarrensioro sewn (Reade), raoccapat (Glos. ‘ary, moor eoxpamertt (Abbreviations), exsown (Answer Key), cermicox pexoutenayentolt xreparypus (Bibliography) w enncox neepniersterouuixon (Web Sources). YVpoxitonrat nepeow acti cocranmenst wa savepwae ayrenmirume Texcron t MoNOWAIOT NPoxpecCHOHDIYI NeKCINY. B roxcrax nocoSie npereransent Take TeN Kay 9KDHOANKA nx imthopuaigronine encreMts, KopHoparusrae uxtbopwanon- te enerenas,sxeerponinal Grate, saxeHocTs HNbopManOROA Geaonaenocen ant Gunes, neonisonaine ramen 8 Ae090H ‘ounajranagon,nopaasoni rxaonorin (17) went terre, upon onan exoropue apr, pont ma “ator carpet pagent Warn up Acai, Vocabulary, Listen ing Reading, Comprehension, farce, Speaking 3 pac Vocabulary sacra nope noeec OAH xoropue nerpewiret neers aro pot: Barone paste teseransen exon ax extinoro narsovanna, ropa oo pana no npinivysacrornoctn yaorpesenia aexontecart ‘eiina w nereammeceeo noe eee tne nperan Sem noctcoore cx naconenro eesap, Koopa pes ‘tonavenu aaa ognanpemoroyonpeSncn 8 nocobah pea Yuorpena soropmcutcrs woe execs ent » peat {pona,Snmapricnoe ncnowent nsuanonhx cos tapas ‘poe on acon psn cnn ate Pager Listening mows agent aon pases covey ssenernona tne syanponains, Goce sx Ee Sox un ayvorexert nuectcr 8 stersponnol GnGnmorcsnol Gncrene (O50) nagoremeras lOpat ipocy inane apo crop e apegpapnesoiol komuyicarnauoN ycrenoanol ta aerannio sontauanne (listening for detailed comprchem soa). Yponens copuuposannocar aro yen pooepe tren nowoutio sagan esTonoro tn ane, Oye tse Aon pate penuh Bap erbeT 9 Scrape mewoxena Ayaonnrepuan6 BpeACTOMAC CHYNA « mpopeccrontanoll gesremuocta. Osea S70 HOON. beac Tala myn caocobcraye nonunerone MOTB {ymemoe.Herowonaiontyaopaion Rocaymaan avast, poaettennae» cont Harepue Unie our Young People Who Make the World ter hp:// learningenglish voanews.com/conten/making world beter tech/3207753. i) Wale. Social Extreprenewship on the Rise his:// learnngenglsh vanes com content ata-eneprenehip-on the-rise/3203818.html) cae — ‘Uni I US Teh nut Blamed or gh Co of Housing Cty surly//m earingenglshveanewscm/AADDO048) Unie av. Rutan Sentened US Jor yerrime (htp:// lcarnngengish voanes.com content coure sentences forcybereine/S316916 hm) ‘Unit v. Study Finds Most Americant Get News from Social Media| (htp:/ learningenglish.voanews.com/a/most-americans-get~ hws rom-socia-media/3352165.htm) ‘Unit Vi. Online trouble (hep: //wiew.es-lounge-com/student/ listening/314-online-trouble php) ‘Unit VIL Far from the Office (husp://wowesl-lounge.com/ seudent/lstcning/3119farfromthe-officep3) ‘Walt VII. 7 Easy Steps for Web Sive Success (hitps//www. businessenglishsit.com business englishvideo4.haml) ‘Unit DX: Famous Scientist Says Artificial Intllegence (AD) Could Destroy us (http://breakingnewsenglish.com/1412/141209- stephen-hawking hem) TUnit X. Apple CEO Tim Cook Uptet ebout EU Tox Bil (htp:// learningengish,voanews.com/a/apple-eu-tax-bill/3491369.htm)) ‘Unit Xt Google Announces New Services and Products (htp:// Iearningenglsh:voanews.com/a/googleio-2016/3344946.htm) “Unit XM. Fostonn May Spend Over $10 Billion in US Expansion (ntps:/learningenglish voanews.com/a/foxconn-10-billion- united-staes-expansion/3919517. hm) ‘Paatex Reading sumnosaer ayreiewnte Tener, mpexcTann route npobeccionansuni witepec 1 cnetprameror 9 o6Racrt Imports rexnonoral, Coepxanaenn Texcrax Wbop- alin noxes jam pacuntpenta npobecenonansioro xpyrosopa ‘oiracntax, paseitrin TANI OMDYUNATIBHENC Mt ANAITEGE- ‘honk yen, ax Yann PaccyamAT® a mpoecenonammitte ‘rents ta anrtckoM Abkxe, aaaraTb m apryMesrmapopart CO: Crnennya roxy aperuus no oGeyxanenofh npoGrene, conepsen- rnonar Hania pebepiposaiien Texcrow npogecciOnAADHO; ‘anpanrennoct. 'B panaean Comprehension 1 Exercises nxoorr ypaxcienitt cenegyowtet wanpanzenwocrn Winponepea hosuaynit ocHonoro conepaannin Texera (24 ayoenn—- YeTanonnesite coorwereTmNA MeXAY TEKETOM H 38°0- eB) oitenia nonnvannn crpyicrypHocaaexonux conse rexeTa (om sanana — yeranonsetiie cooruercrani: santonietite npo- ryewon p TeKeTe npetaraeMMMO HOCKe TeNCTA NpeamoHeH NH; ‘amen nponyeson smpexsoxexn pease crue selouenia YEN NOAWOCTAIO YAH AETANNO MOWATD EMBER ‘renera (ri sain — BAGO OFBETa MS NpeAcraMneHNX m—p- sto), anee cneayer paagex Speaking. Yapaxotenis, npeaerannet vue » rou paaaere, nanpaneli ia pasetrte naBkKOD enon oromnenoit cxryarsano-oGyexomneKifl pew. irrepecitint npesecransoren aazami Ha pasoyrie Hanis kos ayguposans, a raoke enereka ympaserntt a xpyrte ei Pevenoll exremitocen, » pesyaurare manor KOTOpHX O6y Staeanie onagenaior npairecionat HaBkKaMat i YBCH, eobxogunmt ass npopeccHonaneHoh Konark. C noMo. aio nocoOia y erygeston aerusiaupyioren Haak He TosKO Paenoskapanu npopeccuonamioll xenewiat m nonveannT sa “tema Tepsonion 8 ayes neuer YraK HeTONUE ax, Nou uenansaosanuit aro Aexennit 8 yer pes. ‘Bropas vacrs saunrw cogepxaer Teeru OWL npoMeKyroWoro| xourpoan oxaaenua npodecenonannoll xexcixorl, KovOpIe ory? Gums Henamgonanis Kak na sakaTAns ® ayanTopin, a Nw npouecce casiocrorrensiol paGoru. B raoccapuit skoovena sexcuxa a9 peex paasenos nocoGiK Hamre exaccapua o6xeraer easocronremityo paGory eryaet Bce ienonsaosanie Marepisi Ht pexomensyeatie an cabo crosremuot paGonu werowtne npubeaents 9 cnHeKe mTepa ‘spa inept aon Note Noco6ws pibegesss RAMON JH canonponepr B pesymrare ocnoeis aasmoro nocoBus o6jaaestte ATM! * ocrpaninul ssa» Stent, weoSaqyyIMoN noe poeccnonanssol! HigopMaIDN Ka sapyGexak HeToNKOR Man aenosor0 : ‘+ niocrpanin asa a ocymeereHN MestmAHOCTHOTO oGmennis » npopeccronanbiol emrexbHocrt + o6uye, AexOHyIO H MpobeccnoNARsRyID nexcHHy WHO: rparmoro mata » oGpeme, HeoGxoxuoM 214 OGueNH, TEN tepesana (co crowapen); * ocHoBitne rpannarnvecete nanewie ¥ crPyryp, Hen syemue pit yeraow w nesentoN O6iteNt * “ocHomie wopu coumnaznoro novexenAe H Pevenof ITH: er, apmorral» crpane wsyaeworo su sa Doone ScTTENN MEAN MHpopuaRNON- + nomsmiinast 4 xareropnaxsniil annapar, upodecciowant vate peGosans x anexrponouy Gusecy; * UNAM coBpeMeRMBe OXON x PasburiNO HT: _meaassonars ccrpaN i Ra ® MEK THOH OBE so nprbecononannnon esrenocr ocean pana cao MEA HP Gea oHAMTS evn codecs 8 CETPAHHOW ASHE, *“Soosueswutpopuaito nt OeHOwaHIM powranworo rx ran dopuatenanroromtenoro NoqHONe=NOro BCKaSDANN, erasers pesenol ser cyan nonceaNesoTO nsuaosoro en oananneaTs i nantepasars Moan, “nepuier Gece), sana cooGuars Hippo}; e ccauare CncrenrTeponatsM knacanbuLpoRsrs ony ‘esti mopman peat nga, eMMaMHecHpMeHENEM TeopENTTecI nc a Epa 1 uouper agearie MerORh A ELINA NOGTARACOICX sonnei 250% nar caocroATeADHo OUEHKY NPOXATANNOMY 12H cayutony OH: ‘endens on feogeh 004 TERA: 1 Corpor Fexsonorinun yeni verpanoro smskant now maopManiat Ha HNOCTPAHNON ASHIK, reo6xopuaeot 9 npospeccHOMAABOTO POCT 7Pranuxaant paborst¢ y4e6KOR zirreparypol m anexrpos- mnt Narepiatasnn Towopenue u ayduposaniie CCryaena dom nianers cxenyionurn oes: Cronnnary seyauae ayTeNTICUHME TENCTE HM BAMONERTH aaa, ennsutae c npomepeo nomMaHi Wa ex; a yonpeGare ops pevesoro sTukera. Osyacnine nowonorecKoH pee cOCTOMT B ORTARENIN pas- sunt organ wonoore, WexONAR BUCKADUBAHIEA NO MOBY’ HPO- irrannoro, fa ororo npeayeararpisaeres paswirie caeayonutx ect a cooGnent,copep Hane Hannes mc 0 HOP sia no ae / poten: ake peau oeomnoe SREP, CHOBHYO MCA spouaoro nn yemasasoe. “menue poate ote ycryseiton aon chopmponaricn sweet co choapen w Gs exonopn Tecra Ho nea ocr. Tp oenoexi noweKovoro erewun ¢miiGoportnun sana ‘eroien ntubopatauon pasounacrox yacete Gwterpo wax ie ie cnenenn, onyexar Hecyutecroeime neva ‘cosine yener np akon nae renin. = onpexenim, rexy, migteante oenosryio Micrb; — aubupare ns rexcra cenosiive Gakr,onyerax wropocre = npomcanpovars conepaanne rexcra no saroxonsy, saany — Aoranuearien 0 sHa¥eHHK KAOYEBLK cn08 H OBxaRNTE Meawakostie 1098, KoTOpHe Me apelTCTayIOT NoMa ‘cwtonsoro coxepatan. Tucano Thncsato mouowaer cxeayionte wacrnue yen = wanearsrexer w coorseteraunt ¢ nocraaenoll saxavei ‘T_Mpmepamuarses saganax epyrryp u obwena rexere ‘Matepna, npeacrantewise 8 Nikon noCoGnn, Hannes, 1a 10, sT06u passitsy cryzenTon Taopuecce MuititeRMe H xp “irc nowxoR Ke ayHaeNE RENeNOIa, Haye Hx HORNETS 49 npeacranneansnx Texcro® HeoGxatnuyio Hnpopuetana, cane. ‘crontessno aenar® O60OueH H mino Kax MH) NanOeNN MeIomNOH w TeXCTE, TAK H HD coBerHeNX HaGmaxer Ha darmesecin mauxomtM Mearepianon. Hurerpxponarian pesynstarom paGomu ¢ yteGwnxox saan rea dopmuposarne u panmirie Gasonicx rouncrenl (nares oll, petenol,KonencaTopHOl, noataeaTennol, cOLMOXyANTy Holi, mpenserHon, unibopwannontol eanooGpasonareninen), cocTanAmouINX HHoNsuIUHyIO NPopeceHONamyIO KoNNeTeMT PaGors c nocoGien opwesruposana na dopunposarne o6ie- syaurypmux 1 upopecchonansicx Kovmeremni, Btacrioctn, 6 yvaenae ann — naaetokyasrypolt mismtesx, Gums enocobunne ¥ 0606: eimn0, anansy, nocnpwerine Hpoparatun, nocranonKe en biGopy nyrel ee aocrioce = nonsechi nepno erpotrr yernyro n muetaextyo peas; — netionsonaTs wanna nyGanranoi pert, weacint sucaye- —uiaers arcmicn souxow wa ypoane npospecconans- SS SRE a — ers enocodunn x noarorome x peatonpooaine Tex ros apsecononennnor catepuannas See ae ee ata eee re Sea lies nmr ge te nee re ee Se ee ei aie aiid one ae eee aa ne pee eee eee reg eer erate ae ee See ees een ee cniere Se ee rea seer reat tte a acre op ee gon oe See TS Or aprmrenancn Serie oat ee eee ee ao ; ee BR are ere es Si SS ee cyberspace. A consensual hall. ation experienced dally by lions of. Tegiimate operates, in every nation, by euldcen being taught rathemat ‘al concepts. A graphic represents tin of data abstracted from banks of frery compute i the human stem ‘Unihinkable complex. Lines of light aged in the nonspace ofthe mind, asters and contllacons of daa ike Part 1 READING, LISTENING AND SPEAKING Unit | ECONOMICS AND INFORMATION SYSTEMS Warm-up activities xercise 1, Discuse with your partner: ‘What can information systems provide fr organizations? + Storing documents, revision histories, communication records and operational data. ¥, Offering information for more efficent work. % Making better decisions by delivering all the information 10 employees. Gaining a cost advantage over competitors offering better ¥ Other Vocabulary technological advances —rexssccre zocnoxenis fiction — pasnornacin, spent Intangible — newarepuanansit rely on— nonararsot na deploy —npuniensre; mprnosurs » acicrane exert — pusnaro; amu; onastineT Aan i,m apo extranet — oxerpanter (pacipejenenian iniGopmauonnan pene, oGsegusinouan nee gusuan Kounatitk, ce naprae ow n snnett00) ergs 2, Match the words (1-10) withthe definitions (A.D) 1L. processing A. something that you try 0 achieve 2, deploy 3 puting information it a compu in order to organize it 3 imangble use something fora particular purpose, ‘specially ideas, arguments, ec. 4 target D. notable wo be touched or measured and Aifieutt wo describe or explain 5. unprecedented E, the way in which two or more people ‘or things are connected with oF involve each other 6. relationship _FL_anew idea, methed, piece of equipment, 7. innovation G. never haying happened or existed before 8. sctiicial 1H. to put information into a code (a system intelligence ‘of words, numbers, or symbols that hides its teal meaning) 9% opportunity 1. chance vo do something orasituaton in ‘which it is easy for you to da something, 10. encrypt J. the use of computer technology to make computers and other machines ‘that think and do things in the way that people do Listening [Exercise 3, Listen to the text Four Young People Who Make the World Better and answer the following questions. (htp:/ lear ningenglshvoanews.com /content/making- work betterech 3247753 him) 2 Who asthe youngest pron in Poland rece ney rom stor 0 expand hither company? ‘A. ida Tin, ae 3 Maes Mach ©. George nterahany D. Wilt Zhou 2 Why does Mach think ha eration of things wl be his pasion ‘to the end of his life? . ie ‘A Beenuse he loves eeation, 3 Reenis he very dew C. Because he hates doing nothing. DD, Because he it lazy. 3) What did ida Tin make for women from different countries? AA. She ereated birth contol pills: 1B, She made an easyto-use app called Clue . She made fashion clothes, D. She created a new operating system, 4) What is Chalk thar Wiliam Zhou created? ‘A. Chalkis a magazine B. Chalk sa superman. . Chalks a group of programs that supports individual reac. ing and learning. D. Chalk isa business. 5) What country does George Mtemahangi want to open a factory to make solar technology? A. In Tanzania, Bi. In Nigeria. ©. In Mak D. In Angola Reading Economies and Information Systems 1. Beonomie theory deals with rational decisions within and out side of markets. It provides a methodology in many fields of business economies, from finance to strategic organizations. Technologieal fsdvances in processing and communicating information facilitate ‘enormous economic transformations. Information technology has fa steat impact on markets, organization of firms, and methods of, innovation. Ie ls akering market frictions, rms competition, firms’ knowledge of thei customers, and improvements in the mecha: nisms by which prices are adjusted and information is eolleced. 2. An information system Is an integrated set of components for collecting, storing, processing data and for delivering information, Knowledge, and digital products. Business firms and other organi- zations rely on information systems to cary out and manage their ‘Operations, interact with ther customers and suppliers, and com- pete in the marketplace, Fr instance, corporations use information Sjtems to reach their potential customers wich targeted messages tver the Web, to process financial secounts, and to manage their hhuman resources, Governments deploy information systems to pro- vide serves cos efecively to ciens Digital gods, such as elec tronic books and sofware and onlin sence sui warns and social networking, are delivered with information systems, invidals lyon information systems, generally Imernet based, for socializing, su, shopping. banking, and ntrtainen 3. The global penetration of the Inernet and the Web hes cued es fran ad he rvs ated ‘he forming of elationshigs among people and oranzatins on st Unprecedented le. The progestin commer oe the Interne has revuled inn Grate growth in dial interpersonal communications (ia email and social neswors),dstibuton of Products (software, musi, e book, and movies), and business Feansactions (buying, sling, and sdvertising on the Web), Wi the emergence of snariponcs, tablets, and ther computer based tmobile devices, information ystems have been extended to support ‘moby asthe ara human condition 4 Information systems havea great influence oer sacety. These systems hae aiclened he pice of ditties alee the Strueture of organizations changed the ype of pods Dough and infsenced the nar of mek Inormaton and nwo have Beso vl eonomi rou nese dusty nov tion and aeademicreserch continual develop new opportunites Today evn the mallet rms aswell as ary owes hu out the wer own compares These ae usually mirocmputes ais called personel computer, Individuals may own mule ong i th fmf snarhons un spre devs Be organtationsrypicalyenlay dsbted computer ystems fom poner parallel proesing serves lected n dot centers Beta ompies and mobile devised nt the orga {ational information systems. 5. The lnernetis a network of networks, connecting billions of computer lated on every continent Tough nxworkng, wes {ain aces to information resources, suchas ange databases, and to other individuals, such ax coworker, censor people who share their profesional or private interests lnternec spe services {an be provided within an organization and for is excave we by “arias intranets that are accessible through browse. or exam Ble, an intranet may be deployed as an ates portal toa shared ferporate decent bes. To connet with business partners over the internet in private and secure manner, extranes are estab lished as so-called viral peace neworks (UPN by eneryptng the messages 6. The recent emergence of computerized neswoks created ext ing new opportunites forthe desig an omimeral exltation of tel ital techloges and busines processes. Relting this new Tel, any researches ae devoted to information sences, nd in purer he foundations of decison theory and game theory, {Mormaton tery andar bse rica nelgece the desi ‘electron markt, the estinaton of consumer preferences, qua fu information, social cole, and mathematial finance. Many of the results ea implicatons fr varios uses es, inclading tart design, tatqy, busines nteligenes. negation, finance, conomie networks, regulaon, and corporate governance exercise 4, Answer the following questions Wiat does econemic theory provide? ‘What fates enormovseeonomie transformations? Why do business ne and oter organizations rely on nor Hew do corporations we information stems? ‘hrs the popes econ commerce oer the Inter net resuted in?) Tew do information systems influence the nature of work? ‘ita hs reent emergence of computerized networs e mei? Comprehension [Exercse5, Match paragraph (1-6) withthe correct heading (AF): Paragraph 1 Paragraph 2 Paragraph 3 Paragraph 4 [A Electronic business transactions Business firme and other organizations widely use informa- tion systems . Information technology has brought a lr of innovations to ‘economy , New opportunities for business processes E. Intranets and extranots FF Inegration of computers into the organizational systems [Hxarcse 6, Read the text again and decide whether the following statements are tue, false or information {s not aval able in the text: A. Extranets are established as so-called virtual private net works 2. Information technology is not altering market frictions, frm ‘competition and firms’ knowledge oftheir customers. 3. Large organizations typically employ personal computers 4. Economie models carry alot of information for various bus ess fel, ‘5. Today even the smallest ems, as well as many households "hroughout the word, own or lease computers Exercises xesise7, Complete each sentence 1-10) witha word or phrase from Co sleeronic beaks Information echnlo software - we franc acount fem competion Algal goods Pree ions |. Intangible goods that exist in digital form are Examples include webinars, vieo rutrialy digital media such 0k, downloadable man, Interne ae he 2 is the apleain of computers and telecommunica tions equipment to store, rive transmit snd manipalae dat, fin inthe context ofa busines or ocher enterprise. vrs afe Publications in a dial form, consisting of it images th eda on compat oer Si 4 Scholars generally agree that a turning point fr the Wor Wide Web began with the introduction of the Mesae ‘rose a 1993, 5, Inmodern economies, are generally expressed in unit of some farm of carrency. 6, Our everyday lives are fall of various microeconomic 1 ndvances ate altering ws 8 ‘an be defined as something original, more effective and new, 9, The. feootds an economy’ transaction in external financial assets and libiltes. 10, Computer fs any set of machine-readable instruc tions that directs computer's processor ro perform specific operations. [xercise 8, Match (1-10) with (ad) to make up sentences: 1. Computers and microchips a. in nanometres. Ihave become 2. Why isa computer called b. tiny microprocessors with 3. Computers speed up very popular? 4. Nanodevices ate measured d._ overa home area network, 5. All home devices willbe e.@ personal communicator? connected 6. Apart fom computers, what fuse microchips? ‘other devices 7. Chip makers will make. computer systems to operate? 8. Which wo components financial calculations. allow 9. Why ae video games i. produce photo-realistic Images 10, Gesture recognition systems j- part of our everyday lives, Speaking xerise 9, Discuss the following questions with your partner ~ Suppose you are applying fr ab in software company. ‘hat question willbe asked dung a job imerview? What qualifications and skills do you need fr different posi- tions within a software company? Imagine you have sart-up capital. Would you start your own, business? What kind of Business would you like to have? Use the following phrases: In my opinion . As far as know ‘The way see things i that Nevertheless. By the way Unit Il ECONOMIC SYSTEMS Warm-up activities Exercise. Discuss with your partner: ‘Can you imagine a new economic system? ‘Will there be an economy as we understand it? % Will there be any money? Y Who wil run societies? How many hours a day will people work? Other Vocabulary hierarchically —nepaporvecni decision making — nprasrnne peutenns {industrial councils — nponantnewsaie covert sub-economies —cyOoxonownn ‘nomadie peoples — xovesne naposts ‘ state-conceived economie demand — uporsosnpyexi rocy TmaperBon e1ipoc i 8 koHosAKe ‘oppress — yricrars; nogsuourns; preci lavishly — teapo: pacrowrressio; ypesoepHo Tmxercise 2, Match the words (1-10) withthe definitions (A) 1 a decision-making A. a government policy of becoming involved in the economy, of of tying to influence economic and other social ‘saves in another country determine _B. someone who uses money to start bus- nesses and make business deals entrepreneur. to contol what something will be 4 counel D. the process of deciding what todo about something, especially mn an organization 5. hierarchy . the elected officials who govern a local area such as a city or county, ete 6. centralization F._asystem for organizing people according to ther status in a society, organization, orother group 7% attempt . the process by which the activities of ‘an erganlzation, particularly those regarding planning and decision-mak- ing, become concentrated within & par- ticular location or group, keeping all of the important decision-making powers within the head office or the centre of the organization 8. scarcity H, aneffort w do something 9. accumulation 1 a.stuation in which the supply of some thing not enough for the people who ‘want it or need it 7 10, inteventionism J the process by which something increases in amount oF is collected together over Listening Hyer 3, LUsten tothe text Social Entrepreneurship onthe Rise _and answer the following questions. ” (ups: earangeglsh voanevs.com/a/socal- sntrepreneuahip-ontherie/208818tml) 1) What are sci entrepreneurs? 4 Soa eareprenc are people who ete soar compe 3. Social entrepreneur are people who crest star.up com ‘ics that would help the emronment, health eave or agi C. Social entrepreneurs are people who create fastfood compa . Social entrepreneurs are people who ereate charity compa- 2) What do socal entrepreneurs use to tackle important economic and social problems? [A Social entrepreneurs use innovation ‘Soria entrepreneurs use their savings . Social entrepreneurs use capital D. Social entrepreneurs use help of various agencies, 3) Can they be forprofit or non-profit entities? A. They canbe for prot ents B. They can be non-profit entities. ©. They can be for profit or non-profit entities. . They cant befor profi or non-profit entities 4) Where i the funding coming from? ‘A. Punding is coming only from foundations Bi. Panding is coming ftom foundations, institutional investors, and individual, ¢. Funding is coming from individuals. D. Funding is coming fom insticutional investors. 5) What does the Schwab Foundation for Social Entrepreneurship jn Geneva search each year? ‘A. Each year the Schvrab Foundation for Social Entrepreneur ship searches for more capital 'B, Each year the Schvrab Foundation for Social Entrepreneur. ship searches for outstanding social innovators, with bust fess models that are proven to drive socal and environmen tal change. Cc. Bach year the Schwab Foundation for Social Entrepreneur. ship searches for Sinaia reurns. 1. Bach year the Schwab Foundation for Social Entrepreneur ship searches for reinvestng the profits. Reading ‘Economie Systems 1. An economic system isa system of production and exchange of goods and services as well a8 allocation of resources ina soci ty. Ie includes the combination ofthe various institutions, agen- cis enttes an consumers that comprise the economic structure of e given communiy. An economic system can be considered a5 2 pat ofthe sal sytem and hierarchically equal othe law sys te, political system, ealtral ee. There ae multiple components in economic systems. Desbon-making structures of an economy determin che use of econome inputs ihe factors of production), Sistrbuton of utp, the evel of contalzation in decon mating nd who makes these desons. Declsons might be cried out by inhi uci by gerne pt, Oy pate re in one view, evry economic sytem represents an atempe (0S thre fundamental end interdependent problems: * What goods and services shoul be produced and In what vont * Tow will zoos and series be protced? Tats, by whom nd with what resources and technologies? +" Whom wil goods and services be produced for? That, who isto enjoy the benefits ofthe goods and services and how isthe ‘rl produto ded among india an rope he 2. Thus, every economy iss system that allocates resources for exchange, production, disufbutin, and consumption, There are several bse questions that must be answered in ode fran ‘conomy to run ssfatorly. The sary problem, fr example, Fequires answers basic questions, sch a: what to produce, how to produce it and who ges what fs produce An economic stem ‘sa way of anowering these base questions, a diferent econo systems answer them different Many irene ebectves ay be Sen as desirable for a economy, lke eseny, growth ety, And xual. Tere ae four ema type of economic sites the word: traditional planned, market and med, Each economy has its stenghs and weakneses, ts sub-economes and tendencies, '3-A traditional economic system isthe most ancient type of ‘economy inthe world. Tadonal economies sl produce pro ict and seviees hat at a eer result ofthe bly custome, lwadions, religions, ec. Vast portions of the wotkd stl fanetion under a wadional économie system. These areas tend to be rural and closely ded tothe land, erally through farming. However, ‘here ian increasingly small population of nomad peoples, and while thelr eeonomtes are certainly traditional, they often inter ‘ct with ater economies inorder to sell tad, barter, ee Tr divonal econemies would never see the typeof proto surplus that resus fom s market or med economy In oneal, sup is rare thing. A third-world country doesnot have the necessary esources (ri they do, they ae cotrlled by wealthier econo Ines often by force, and in many cases any surplus is either de tributed, wasted, or paid to some authority that has been given pomes Certainly, one ofthe ost oDvious advantages is that rah Ton and custom is preserved while iti virtually nonexistent in tmariet or mixed economics. There i alo the fact chat exch mem Ber of traltonal economy has 0 more specifi ole, and these Societies are often ery close-knit ae socal satisied- The main flsnvanage i that trdiional economies do ne enjoy the things ther economies take for granted: western medicine, centralized Aes, technology, et BU as anyone it Ameren can test, these {hing donot garanie happiness, peace, Soc or, most oncally ‘all econame sabi. “in terms of economic advancement, the planned economic system is the nex step up fom atadtonal eeonomy. This by no trea ndleates hat fuer or an exact improvement. There are many things findametally wrong with planned economy. The tne able fate ofa plans economy i that lrg prt ofthe tconomi sytem is contalled by eenralized power, often federal foremment This Kind of economy tends wo develop when a county Fcststrin posession of avery large amount of vluble resources ‘The government then eps in atd regulates the resources. Often the gorernment wil own everyting involved inthe industrial proces, frm the ecpmen the faces Bu che ae ata aera etal advantages, a8 Yong asthe government uses intligent egulations. A planned economy capable of eating a healthy sup Ply ofits own resouree andi generaly rewards its own people with Mordable prices. Ae regulated by the overnen lima Priced bythe goverment Sl thee fen no shortage of obs a the government functions sina to.a market economy in that it ‘wants to grow and grow upon is populace. In soca economics {em production came ut to full panned-economy objetivs Decktons reparing the seo the means of production ae adjusted {o sats ctme-concelved economic demand, Investment i carried fut throgh ste quid mechanisms The means of producion ste ther pblity owned, or are owned by the Workers cooperatively. econemi stem that is based on the process of epi ‘cumulation but seeks to contol or dest that process though ae comeship or cooperative control ensue sabi, equality or tcp decison making owe ia marker Sooalist system, Socialist, conomie syste (lof whch etre soial ownership othe means of production) can be subdivided by thc coordinating mechanism (planing snd marie) io planned socal and mares socialist Syms loa ol canbe ded beeen thse that arebased on public ownership, worker or consumer cooperaves and commen ones 5 Ina market economic system production scarred out for private prof Decisions regerding investment and theese of the ‘neans of production are determined inthe markt pace by ed {tas corporations and business owners, The means of production are owned primarily by private enterprises and decisions requrdng Production and investment determined by private owners capt fal markets, The market economy is very sina ofc market. ‘The government doesnot contol vital resources, aka ood of any her major segment ofthe economy nth way orzaniations tun by the people determine hw the economy runs, how supply is fencrated, what demands are necessary et, No truly fee market ono cis in the word. or example, while America eae {ast nation, our goverment sil rates far ade, goernneat Programs, eral business, monople, ee. Thesevatape of ca falism i tha you can have an explosive economy that very well Controlled and relatively safe. Ths would be contrasted to sci ism, in which the government consol and own the most poi able and val industries but allows the resto the mathe to. ope. ae freely rice is allowed to fvctuate freely based on supply and demand, The biggest advantage to a mates economy ith separa tion ofthe marke and the government. Tis prevents the govern neg om bcoming ppm a conoid sna {0 the governments ofthe word that oppress their people while living lavishly on controlled resources. a eet There sno precise definition ofa ‘mixed economy. Theo- reccally it may refer an economic tem tat combines one of thre characterises: public and private ownership of Inds, mast bd allocation wih economic plang. or fee-mahts with stat inerventonism. tn practic, mixed economy’ general Teles to mate cooomies wih subtanal Ste nervios and dominant private sector, ‘Armixed econome system is «combination of economic sys- tems, but it primarily refers to a miature of market and planned conony. AS you can imasine, many varaton exis, with some ‘mined economies being primarily free markets and ocers being Suronglycontlled by the government. tn the most common (pes of mised economic, the ane sore o les ee of goverment omership except for few hey reas. These areas are usally not theecues ta oman sonomy con nen 4 Amerie, they are the government programs such a education, Cransporao, ei, While al of thes nds aso exis inthe private sector i Americ, tis snot alae the ase for a mixed Economy, While mixed economy’ ean Jed o incredible results an algo sufer rom snilardownflls found in other exnomies. 1 Thee often a song cotelton beeen certain dealoges, pollical systems and certain economic systems. Many economic ‘uta evap each othr invaiou rear. The study of economic ‘Yetems tncudes how these various agencies and insitaions are Ted to one another, how informadon flows between them, and the social relations within the system (including property rights tha the structure of managemen). Tay the dominant form of conomie organization the glabal lvl based on marker oned mised economics Exertise 4, Answer the following questions: What fan economic tem? ‘What do decisionmaking structures ofan economy deter nine? ‘Whar problems does economic system temp to slve? How can economy be un? Do thid-word counties have necessary resources? Why sa planed economy capable of ereating a heathy sup ply ofits own resources? ‘Whats te purpose of production carried out in a market eon system? 5. Whrean amined economy lead oinereible results? ‘Why do many economic ystems oveap each ther invari. Comprehension [Exercice 5, Match paragraph (1-7) with the correct heading (A-G): graph 1. i Paragraph 2 Paragraph 3 Paragraph 4 Paragraph 5 Paragraph 6 Paragraph 7 ‘combination of economic systems A free market on Primary types of economic systems zonomis that don enjoy the thing ther economies for granted a ae Economic systema part ofthe social tem ‘he most notable feats of planned economy ‘he dominant foro econo organization othe pool Exercne 6, Read the text again and decide whether the following statements are true, false, or information isnot aval. able: 1, An economic system can be considered as apart ofthe social ‘system, ‘Thece are not any multiple components in economic systems. Traditional economies produce a lot of products and ser. 4. Soon a market socialise economic system will be in every ‘county. “The marker economy i ery similar toa fee markt, ‘A mixed economic system doesnt refer to a mixture of mar ‘et economy and planned economy. Globalization wil lead t single economic system, epee Exercises ‘Exercee 2, Put the words in (1-7) n the corret order to make up 1. worry, about, much, viruses, Dont, too. 2. are, two, of antivirus, There, programs, actualy, kinds 3. more, equipment, geting, Computing, sophisticated, is. 4. use, Beople, tables, fr, mainly, pubithed, viewing, content, Such, video, and, news, Ec 5. economic, advances in, and, Technological, information, fac tate, processing, enormous, transformations, communicating, 6. is coud commonly in, to, large, agglomeration, of objects, The expression, used, science, deseribe 7. ia. curtenty, operating, developed, system, by, Android, mo- bile, Googe. [Exercse 8, Match (1-10) with (a4) to make up questions: 1, Do mainframe computers a. focuson? 2. Why is Android b. for? cloud computing a kind of ¢. designed for office use reach internet-based computing, marker? 4, What does a Menagement d._ being used in computers? Information System 5. Isa virtual keyboard designed primarily for tuch- software component screen mobile devies? 6. Whydo business fms and that allows @ user t0 enter ‘other organizations characters? “7. When did the fist aser——g._rely on information systems? printer 18 Whyarenano tools and ih where shared resources and processes Information ae provided to computers and other devices ‘on-demand? 9. What are chief technology produce high-quality text offers responsible land graphics? 410. How does laser printing j,_ usually process. several application programs concurrently? 4 ‘Speaking [Exercise 9, Discuss the following with your partner: Sometimes we can't afford buying what we want. What ‘would you do if your ineome is low but you realy want to buy something expensive? What do you do © manage your time property? ‘Have you ever tried to find another Job to get a better post tion and salary? Use the following phrases: Ie goes without saying ‘Strange it may seem By the way Moteever Frankly speaking Unit Ill CORPORATE INFORMATION SYSTEM (CIS) Warm-up activities [ercige 1. Discus the following with your partner: ‘What are the main features ofthe corporate information system? "Compliance with the company's need. Conformity withthe company’s busines. Consistency of nancial structure ofthe company. Openness and scalability ¥ Other. Vocabulary backbone — ocwons procurement —nocrassa sama, Transparency and traceability —npospayioert npocex receipt of requisitions — noxyerme sannox ‘customer invoicing — whcranente creros eenrant ‘ost accounting — yer sarpar, seqente orveTsiocet shrinking budget — coxpattente Grsnwera Tialson — ssamuaneiierane; come Exercise 2, Match the words (1-10) withthe definitions (A 1. infrastructure A.-work thats done to keep something architecture uch ae a balding, machine, or piece ff equipment cepaiced and in good condition 2. maintenance __B the senior manager responsible for fverecing the financial activities of an entre company as 3. warehousing the process of storing large amounts ‘of goods in a warehouse 4. environment D. the conditions and influences in ‘which people carry on a particular actvy" 5. cater B, to provide food and drinks at an event 6. disseminate F. to make something such as informa. tion or knowledge available toa lot of people 7. Chief Financial —_G. a job title commonly given to the Officer ‘mast senior executive in an enterprise ‘pone forthe formation ec ology and computer systems thet ‘spear entree ls 8 Chief tformaion —H. the process of obtaining something. Officer especially with effort or difficulty - 9. procurement the process becoming fall member of gros or odes and becoming involed completly as actives 10. integration J. introduction toa new branch of erchi- tecture that is urgently needed to support modern organizations, and ‘eteed to help architecture to mature asa whole Ustening [Exercise 3. Listen to the text US Tech Industry Blamed for High Cos of Housing and answer the following questions. (tp: /surly/o/m.Jearningenglsh-voanews.com/ ‘AA00OOI8) 1) Why are housing cots rising in northern California? ‘A. Because of «smal supply of renal apartments. B. Because of growing demand for rental apartments by tech nology workers. (¢. Because ofa small suply of rental apartments and growing, ‘demand for them by technology workers 1, Because of infation. 2) Why are the workers in many high-tech companies in San Fran- ‘sco Bay Area willing to pey more for housing? IR Because there isa very good climate in the area. 1B, Because the workers don't want to move to another area. CC. Because the workers don't want to lose thei jobs. 'D. Beeause the area fs home to many high-tech companies '3) Where are some investors buying up buildings and then turning them into high-priced apartments? AA. In New York. B InSen Jose, . InSan Francisco, D. Across the bay in Oakland, 4) What puts high demand for hotels, apartments, single-family homes, an office space in San Francisco? ‘A. Son Francseo's fame a8 a popular stop for both U.S. and, oversees travelers. 8, San Francisco's popularity ae a good ci. Technology industries in San Francisco. D. Friendly atmosphere in San Franciseo. 5) What are the top of most expensive US. cites for renters after San Franesco and New Yor? ‘A. Houston and Austin, B, Mesa and Buffalo, Boston and Washington, D.C. . Kent and Richmond, Reading Corporate Information System (CIS) 1 NSPAs (NSPA — NATO Support and Procurement Agency) corporate information system is an Enterprise Resource Planning ERP) system hased on SAP ECC 6.0, whic is the most recent ver sion of SAP's (SAP-— System Applicatons and Prodets) enterprise resource planning softare, which in general wenms provides end: tovend software support fr a business. The ERP system i the back bone ofthe IS application architecture and integrates the financial loglsties, procurement, and human resources (HR) components on «uniform platform. NSPAs computing and infrastructure archi- tecture is composed of loal and wide area networks, commun. ‘ations, security, and office automation components The costs of the IS developments and services are distributed between their users vi Service Level Agreements (SLAs) providing transparency and traceability. Twenty-two core business processes cover NSPA ‘complete range of supply, maintenance, warehousing, and trant- portation scuvities as well as those of procurement, finance, and. HR management. The processes are fully integrated and support [NSPA’s activities from the beginning (receipt of requisitions) tothe fend (customer invoicing). 2. NSPA's business and oper capabilities, performance, and a tion Systems Master Plan) (NISMP) establishes and constantly Updates the Agency's IS strategies, polleles, and architecture as well as long term IS developments and investments. Continuous improvements allow NSPA' information systems and support structure to adapt to constantly evolving environmental and Bus ness requirements, 3. The Agency's information system covers a large range of applications extending more and more tots business partners and uses the Internet infrastructure in addition to dedieated and secure ‘communications links. These applications eaterin particular forthe 'NSPA Business Application Portal (e-Poral), the NATO Logistics Stock Exchange (NLSE) incorporating Electronic Bidding (eBid). NNSPA is in the process of optimizing and extending is 18 resources and capabilities through the implementation ofan Enterprise Archi tecture. The development of an Enterprise Applicaton Integration platform includes e-Business integration and implementation of 4 Business Intelligence envizonment. IT departments are contint- ally pressured to do more with less — more service with less money and fewer people. This s achleved through increased productivity, itis about results. Inthe traditional workforce, the worker serves the system. In a knowledge workforce where the individual work ers productivity makes the system productive, the system must serve the worker. 4, ACCIS employees work with thelr elient to develop results| based resource solutions that maximize the value in what they do, ‘They service a range of organisations including hospitals, govern- ‘ment departments, manufacturing & retail companies which need high-performing IT departments on a shrinking budget. Today's reality is that their IT Services are more critical than ever before for he fanning oftheir buses. I's Ison / Oso tty eta pence them wth nar tothe rnoures they a ten they ee them, and hsp lower cst and neenre mona The xon ofthe Office of Corporate Information Systems (tags mnie gad pocngaia lagee deere ee [Grand tantanne ofthe Deparvent gt Managemen: Xvigtion ana.) progam and pee: ese np trent busines proces automation nave: provide sche oper for lpi arena eperedans al nomena; proige «cal spre for we een, development and mattenanee thange cer scury and eerie acecrre ates red sets he inno 1 Chie Infermtion Ofer for Inermaton ‘echnology sie The fancins af the Oe of Corporate Information Systems * pan and manage the design, negro, and implemen son ofthe Departments coporte bse stems tough the ‘Moog rogian euing he approved ston adres the iMpationo franca manager cos accu ge po ‘ircent human sources ant prormance mene apa and measota confer fae prs unig arte conta and prope teinolgy 1 allow ot iver and seminaon olen formation: aman conpesly eso thccsprats sess yes wo fact deewoteexhege ogi ral an exeal Skt nd nnn neice wh Heater Props, Feld Orcs aed Mangement al Operating Contato reise qulifed nfroatonTecnclgy projet MANGE 1 inenage the Office of Chief Financial Offer (CFO) Cyber secur Pans + pan and manage iManage projects and CFO information schallag teense es etl mal eotere ppems documentation sod wanng eine webte sanards forthe CFO orzo and sage he CHO es eck infastocue teense compliance, ‘ih ns elton and recommend paces: srt the Cr Talson with te Chet norman Ofer (cioy'ee a0 CPO formato Technelogy sve al epee {hecr0 on he DOE Excatve coun » + direc the CHO Enterprise Architecture program; + serveas co-chair ofthe Department's Corporate Business Sys tems Configuration Control Boar, * oversee the completion of al internal and external CFO Infor. ‘mation Technology reporting; * participate on various internal and external Information ‘Technologies. Excrese 4, Answer the following questions: 1. Whats SAP EDC 6.07 2, What does the ERP system integrate? 23. What is NSPXs computing and infrastructure architecture composed off 4. What allows NSPA's information systems and suppor strue- ture to adapt to constanty evolving environmental and busi- ness requirements? ‘5. How is NSPA optimizing and extending is 18 resources? 66. What isthe mission of the Ofice of Corporate Information Systems? 7. What are the functons ofthe Office of Corporate informa- ton ystems? Comprehension ‘ad, Matchen) wh ters hendig Co Paragraph 3 Paragraph Paragraph 5 Paragraph 6 A. Adaptation to evolving environmental and business require: B. The development of an Enterprise Application Integration platform [NATO Support and Procurement Agency igh-performing IT departments Punctions ‘The mission ofthe Oice of Corporate Information Systems Exarcite 6, Read the text again and decide whether these stae- ‘ments are true fale, oF information isnot available: 1 The ERP system is the backbone ofthe IS application archi 2, Twenty-five core business processes cover NSPA's complete range of supply, maintenance, warehousing and transports 3. Continuous improvements allow NSPAs information systems and suppor structure to adapt to constantly evolving envi ronmental and business requirements. (Cloud resources are usually shared by multiple users, (Outsourcing Solutions provide employees with access to the resources they need 6, Today's realty 6 that their 1 Services are less eritial than ever before forthe functioning of theit business. 17. One ofthe functions ofthe OCIS is wo direct the CFO Enter prise Architecture program, Exercises [Exercite 7. Gomplete cach sentence (1-10) with a word or phrase from (ec): ‘management fneractions modules applications programmed accounting function an acronym purchase enterprise SAP sa for Systems, Applications and Products, SAP is a German Software company whose products allow bosinesses to track customer and business 3. SAP is especially well-known for its Enterprise Resource Planning (ERP). programs. SAP dominates the large Business... markets. ‘company can simply modiles and customize the processes to match the company’s business model 6. There are three main...» fesource planning (ERP) systems used in today’s larger businesses: SAP, Orate, and Peoplesoft 7. ERD sare specifically designed to help withthe sw... and control over other agpects of the company's business such as sales, delivery, production, human resources, and inventory ‘management. 8. Security isthe frst and foremost inany SAP audit 9. Oneof the major advantages of SAPs that team be. to perform various audit functions for you. 10. Because each company will have different... each ‘company's security structure willbe distinety diferent, Exercise 8, Match (1-10) with a) to make up sentences: 1. AService Level Agreement a, to corporate apps and GLA resources from almost any etwork 2. SLASdo not define . trend for technology to replace the functions per formed by humans 3. TheuseofSLAsisago «the reduced costs justify the common in outiourcing, capital investmens. cloud computing, and ether 4. The Company Porta 4. apps made availabe to you provides aecest by your company. ‘5. Company apps browse, how the service itself is pro- search, and install vided or delivered. 6. Examples of robotic £ in automating clerical pro- Automation include the use "cesses in services industies, of software robets 7. Robotic automation & 0 either improve quality, conresponds ro an emerging "eu costs of production or (0 achieve both of these things 8. The motive fordeploying —_h, where the responsibility ofan robo is Organization is transferred ‘ut to another supplier. 9. Where robots replace 4. across many industries. ‘human labor in high volume repetitive tasks ata Tower price point, 10. The advent ofthe Internet. contract between a service thas enabled a new trend provider and the end user towards self-service that defines the level of ser ice expected from the ser- vice provider. ‘Speaking [Exercise 9, Choose the poster fora campaign against raising com- ppany’s eoets and discuss t with your partner: L FIT COST Unit IV MAKING INFORMATION SECURITY STRATEGIC TO BUSINESS. mA Worn-ap acts Eoeeeeaear adsa ac Tarslos ehamenee cr bars tor ne ihn ee poe ‘times faster than be innovations? Boyan 6 ee or ag cipal ‘in many ertcal innovations. Because of digital warfare where information is put a isk everyday. 1 Bocauseof safeguarding trademarks, copyrights, and patents ¥ Other. Vocabulary undergo —nogseprarses; vemmiusae; tepenocies hindrance — nowexa; npenrerane align — agervsars; mipantamars; Cran» PRA fluid exchange — Guerpult owen warfare — socimoe Aen prerequisite — npeanocnuna; oSmparemoe yenone strive — npiarare yout; Gopovscx; craparten per se — np yi; Kak raxosoit cao no cee Teak — yrewavaxpopmatuit vulnerability — yannncoers malicious code — ‘grasp — now; ocom [Exercise 2, Match the words (1-10) with the definitions (A.J); 1. tical ‘A. a failure co do something that you have promised to door that people expect you todo 2 advancement B. very important ‘3 intellectual _€, combination of internal and external fac: property tors that nunc companys operas 44 information. tel private oF secre information to jour security nalists or tothe public 5. leak E. progress in society, science, human Knowledge, ee 6. breach FF. something that someone has created or invented and that no one else is legally allowed to make, ep, or sell 7. business G. defending information from unautho. environment rized access, use, dislosute, disruption, ‘modification, perusal, inspection, record ing, or destruction involving people or groups working together to produce something 8. digital warfare HL 9. collaborative 1. risks, threats, and dangers 10.vulnerabiliies J. militarization of Cyber Operations by {governments and corporations, often through monetary relationships between computer programmers in private com panies and the military to combat the threat of eyber terrorism and warfare Listening Exercise 3 Listen to the text Russian Sentenced in US for Cyber: crime and answer the fllowing questions. (tps: /learningenglish voanews.com/a/us-court- sentencesrssianfor-eybererime/S316916 html) 1) Wha did Russian man create ten years ago? A. Amalicious code, 1. Amalicious software program. . Anew IT security system, D. Anewiab, 2) How was the program called? A. Most B. Gori, C. Frozei, D. Cosy. 4) How did the program come o a user's computer? AA. Through email. B Through fle. C. Through a cloud, D. Through a cyberspace. 4) What can the software do? A. The software can collec all information. BB. The software een collect information, such as a bank user ‘name and password, and send the data back to hackers. CC. Thesoftware can gain accesso someone's creditcard numbers. D. ‘The software ean gan access to someone's bank account 5) How many computers dd the program infec? [AL The program infected more than 3 milion computers. ‘The program didnt infect any computers. CC. The program infected more than 2 million computers. . The progeam infected more than 1 million computers Reading ‘Making Information Security Strategic to Business 1. Information security i undergoing transformation. Security strategy aligns to busines priorities and enables innovation. While the recent economic downturn wil certainly drive security teams to focus on finding operational efiionces, eis important to note ‘hat efficiencies alone will ot be tuicient to get us out ofthe eco: ‘nomic crisis the world is facing. Political and business experts agree ‘hat business innovation isthe key tothe return of global economic ‘ability and growth, Information secarity has a ertical role play inthe drive toward innovation. Why? Beeause atthe hear of many ‘innovations isthe secure and fluid exchange of information. We are ‘an information centric economy, heavily dependent on the infor: ‘mation we crete and share. We Find ourselves in an age of digital warfare where that information s put at risk every day. The goal of the security organisation must be to enable the busines to manage risk safely to gain maximum business advantage. 2. What does this mean for today’s businesses? It is mportant to note thatthe way how organisations innovate has changed over tie from internal groups working side-by-side ereating new products in 4 lab to geographically dispersed teams collaborating across orga nisational and physical boundaries. Innovation now requires open collaboration, direct interaction with customers, tighter integration ‘with partners, the incorporation of external talent and resources. It demands sharing intellectual property, infrastructare and ideas, wile atthe same time safeguarding trademark, copyrights and patents. Security leaders have made grea progress driving tighter linkages between business innovation goals and security actions. A critical clement has been taking a more structured and strategic approach to organisational risk assessment. Without the right security sta ‘egy, business innovation could put the organisation at grea isk. AS the business and security teams operate in separate silos, secutty is often applied as an afterthought. This lack of security planning ere- ates unnecessarily high costs and project delays, Generally, costs far less to “build security in” than t does to "bot ton” at the end. Le is imperative that security teams understand key business priorities and ensure thr they ae brought into the planning proces eacy, To ‘dothisthey will need to speak the language of business, not secur ‘3. There has been recertly a growing recognition ofthe need (0 take a riskebased approach to security Different organisations are at different stages along this progression, based not only on bow they view information security and is importance to the business ‘but also on the maturity oftheir enterprise risk management pro: ‘ram, There are some preconditions that ae esental to the sucess fof any security teams efforts. Fast, the organisation must alteady be using the construct of risk” in how they make investment and ‘operational decisions. Some organisations may not have the culture for a iskebased approach as their strategy is stil 10 tactical ora seted opportunity” focused, The other key prerequisite i that there has to be sustained attention from the top I there is no attention for enterprise risk management or at least some nation of asessing risk at che board or senior leadership level, then trying to be effec: tive in information risk management is likely beyond the organiza tion's curren capably 4. Alley component of building a security program that enables innovation is moving from “information securig” to “information risk management (IRM). IRM must incorporate the idea that infor ‘mation security is striving for an acceptable level of sk. The goal is vo mach rsk exposure to risk appetite, not wipe out all isk. Having specific expertise in information security per se is still a crucial ‘art ofthe program asi is essential for determining the optimum Security contro. Managing information risks must be conducted in ‘ray that meaningful othe business and is based on how other ‘Categories of tsk are discussed and calculated 5: IRM must be integrated ino the enterprise risk management framework. Asan example, le’ look at risk management ad inno vation in the context of daca loss prevention. Many organisations ane increasingly using Web-based collaborative tools to facilitate information and knowledge sharing among various user groups in order to improve productivity and eliminate the duplication of efforts. If there isa weakness in your IT security sytem, wouldn't ‘you prefer to find i efore someane else does? Imagine waking up to discover that your IT systems have been hacked. Your compan’s Financial results have been leaked to the media; your confidential business plans have been compromised; your employees’ personal Ales have been posted on the Internet. The market loses confidence In your organisation, your share price takes dive, and your direc tors are found tobe personally responsible fr inadequate risk man: !igement practices, Does i sotnd seary? But even a smal scale secu rity breach could leave your busines Without acces its rita TT systems for hours or days 6. Every organisation uses information. Information isan asset that, like other important business assets, is essential to your business and consequently needs to be suitably procected. This, is especially important in the inereasingly Interconnected busi ness environment where information is now exposed to a grow ing number and of threats. Causes of damage sich as malicious code, computer hacking and denial of service attacks have become ‘more common, more ambitious and increasingly sophisticated, Information security is not an “IT problem itis a business issue. Obviously, compliance with legal and regulatory requirements i important. I provides avery good reason for reviewing your infor mation security practices, Buri should not be the main driver. If 2 business wishes to survive and prosper, must grasp the impor tance of information security and pur in place appropriate mea- sures snd processes. aarsae4, Answer the fllowing questions: 1. Why si crea hat security statgy align busines pr ‘Why does information secur have a key role to playin the drive towards innovation? mt What the goal of he scary organisation? What does nnevaton equi? ‘What does the lack of security planning create? What arekeypreregubes thar are eset tothe success of any sceurty team's efforts? Tow must managing Information risks be conducted? Why is nformation sect important? Sede? ss Comprehension ‘ere S, Match paragraph (1-6) withthe corect heading (A): Parag79Ph Ber ut x Paragraph 2 Paragraph 3 Paragraph 4 A. Data os prevention 3B. Determining the optinum security contol Balancing oft D, Grea oe of information security Taking rk based appreach wo seurgy F. Information security tra busines nue xerise6, Rond the ext agin and deci whether the folowing statements are ease, o information otra the 1, Business innovation i the key to the run of global eco nome stay and growth 2 The goal of th seu onansacon sto enable the busines to manage isk sae 1 gain maximum busines advantage 2 Tana doen eure oper clarion ae diet 4 ley component of building a sectty program s movin fino sk ‘management f0 information sec Infomation secury tno anITprblen isa business TT scurty experts are alot ays found in any major erpis due to the nature end vale of he data within larger businesses Ia busines wate cstv, gras the inportance ‘lntormadon secur. Exercises ‘Exercise 7, Complete each sentence (1-10) with a word or phrase from (23). protection experienced ew Tr field profession ‘iferent forms maintaining and assuring ‘yulnerable point frown and evolved Mos people have. software tack f some sot Micse mors, phishing attacks, and trojan horses are oes common examples of stare tacks sik cl of mllecunl property as ls een an extensive infor many basins the Imelectual property the ownership of propery usualy consisting of ome frm of in IT basi. “Theft of software is probably the most. nesses today “The field of information security has... significantly in recent years. Tn information security, data ineegrity means the ‘accuracy and completeness of data ove it entire life-eyele, Information security isa stable and growing Computer system threats come in many P ‘The research has shown that the most... {9 most Information systems i the human use, operator, designe, for ther hvan xercite 8, Match (1-10) with (a) to make up sentences: L ‘Thelnvernet isan increasingly attractive hunting ground 2. Today's cybercriminals are b. highly skied and equipped |. Most governments have already created regulations ‘that impose conditions The patchwork nature of re d. {ulation around the world is ely Organizations of all sizes e. reed to think about the con Sequences of a supplier pro- viding accidental, Infosec programs are £ important Many large enterprises g. employ a dedicated security ‘group Many organizations do not h. follow a lite eyele approach {in developing, implementing, and mintaining Without applying a lifecycle i. approach to a information security program and the security management that maintains the program, an ‘organization is doomed 10.4 information security pro: j. ‘gram is the set of controls, to treating security as a project. that an organization must govern. for criminals, activists and terrorists motivated to make money. to become an increasing Durden on organizations ‘with very modern tools, bur harmful, access 0 tele intellectual property cus- tomer or employee informa: tion, commercial plans oF negodations. their information security management program, fon the safeguard and use of Personally Identifiable Information. to implement and maintain the organization's infosce program. for maintaining the eon. fidentiality, integrity and availability of IT systems ‘and bosiness dat, Speaking sxeese 2, Discuss the following questions with our partner: Executives think that security eeems to worsen as spend {ng increases The oct cause ual the same: te ack i well designed, enterprise-wide security sratey. What ther easone canbe mentioned?” Yew shoud companies work o improve enterprise prod ty? How are mobile devices changing the customer experience? ‘ae they forcing organtatone to rethink bow they engage ‘eth tir eustomers and employees? Use the flowing phrases: As fas know Steely speaking ‘here eno doubt that Moreover Tauppose Unit V ‘SYSTEM INTEGRATION (SI) Warm-up activities [Bxereise 1, Discuss the following with your partner: ‘What St methods are used in different fields of software and hardwate engineering? ¥” Horizontal integration ¥, Vertical integration. % Star integration % Common data format. Y Other Vocabulary align — o6seaumars;comteutars off the-shelf software — rorosce nporpannce obecneyeue tncompatiliy ~ necomiccrinct:necomercre — sacTanars; pmnyaaare; AoGithcn value-added solutions — oGocnosaimute pemerna hhodge-podge of disconnected functional systems — wems- bottleneck — yaa npoxon ‘transcend —npesociaitr npesiaare ‘xercise-2, Match the words (1-10) with the definitions (AS): 1, integrator A. the set of systems within a place or orga zation that affect how well t operates, for feample the telephone and transport sys. tems ina country 2 vendor Ba component whose output signal is the {ime integral of is input signal 8, infrastructure. the fact that different picces of computer equipment and software can be used together 4. compatibility D. sicularidea, politician, organization, etc. 5. mppon company operon ht sl paar 6, fulfilment accomplishment 7. extraction G. theprocest oration of extracting something 8, success “Hi the achievement of something that you planned to do or attempted todo 9, consolidation 1. combining or merging of elements to per forma common or related function 10, performance J. manner or quality of functioning Listening sxerise3, Listen tothe eat Study Finds Most Americans Get News {from Sock! Media and answer the folowing questions hte /erningengh vanes cmon man gene rom soldi 2252065) 1) What does the Pew Research Center research? A Ie researches issues and trends affecting Canada and the world B, It researches issues and trends affecting America and the worl . Itrescarehes trends affecting the worl. D. Izesearches sues and trends affecting only Ameria. 2) How many people did the Pew Research Center survey in Janu ary an February? 1A. 5.650 people. B. 4.654 people. C. 6 654 people. D. 4 754 people 3) What isthe most popular social media website for news as re cent study shows? ‘A. Facebook. B. Twitter. ©. Reddit. D. YouTube 44) How many percent of all US. adults get news from Facebook? A. 54 per cent B. 49 per cent GC. 44 per cent D. 34 per cent. 5) How many per cont ofall U.S. adults get news from Reddit? A. 5 percent, B. 2 percent C7 percent D. 4 percent Reading System Integration 2. Asystemn integrator (St) is an individual or business that builds ‘computing systems for elients by combining hardware and sofware products from mulkiple vendors. Using a system integrator, a com any can align cheaper, pre-configured components and offe shel software to meet key business goals, as oppose more expensive, ‘customized implementations chat may require orginal programming ‘or manufacture of unique components. Creation of these information systems may include designing or building a customieed architecture ‘oF application, integrating i with new or existing hardware, pack- ‘aged and custom software, and communications infastuctre 2. Organizations often have informatioa systems belonging to diferent computer generations. These systems contain mich vali able data tothe organizations concerned. However, these systems are often unable ro communicate with eachother, due to ineompa- tibiltes. Moreover, replacing these systems with new systems Is also very cost therefore the latest trend is integrating the existing systems with each other with the help of differen system integra: tion technologies. When the systems are integrated with new tech- nology they bring about various effects to the organizations. ‘3: In today’s highly competitive and constantly changing world izations are compelled to find ways of functioning effectively and cost efficiently for their survival and success. Moreover, the Competitive arena has also changed dramatically, thus erganiza ‘ions can no longer depend on traditional methods of competing. [Asa result, companies seek ovt latest technologies. Many orga rizations use several generations of systems that rely on a bread range of technologies developed over many years. These technolo sles both new and old provide enormous support to organizations. Unfortunately, many of these busines-rical systems ae difficult to adapt to allow them to communicate and share information ‘with eachother and more advanced systems. There is alrays the ‘option of replacing these old systems with new ones but iis very ‘costly and time constiming. In addition, they contain lots of data land information, which ae of grea value to organications. System Integration is seen as a way of solving most of these problems. In carler days system Integration was confined to technical aspects Such as for connecting computer hardware components. AS know edge on information technology evolved integration came into use {in software, data and communication a well 4. To keep your business growing at the dramatic rates you plan for, itis essential to have your business software applica tions integrated around a single codebase, database and business process, The advantages of designing your systems in this manner Yield tremendous cost savings and improved business product ‘ty. There are several key processes that you may encounter in your daily operations, such as order management, fulfilment, Invoicing, cash collection, expense approvals, and financial con- solidation, co name & few Aulomating Such processes enables you {avoid new hires that would otherwise be required to manage these processes, and redeploy staff to higher-value activities t0 help your business innovate and grow. When information can be aécessed instantly from almost anywhere, without wast- ‘ng resources on data extraction and tying data from different sources together, employees are better Informed and can make more accurate, faster decisions 5, Evergtlay business users are able to apply thelr functional expertise to tailor processes and applications ina way that improves performance. Meanwhile, Ts liberated co focus on strategic initia- tives that can ad value tothe bottom line by building innovative value-added solutions. Today, companies in vistually every industry fare tsing sophisticated business software to fuel their growth but ‘many are stil struggling to keep up with thelr growth and manage Costs effectively because of hodge-podge of disconnected func tional systems causing process bottlenecks and employee produc: tivity issues, Integrated business software suites are transforming the way how companies run, and enabling them to transcend grow ing pains that previously were holding them back from taking thet business tothe nex level of profitable growth aercite 4, Answer the following questions: 1. What isa system integrator? 2, Whac ean a company do using a system integrator? 3. What ean ereation of information systems include? ‘4. What do the systems that are integrated with new technol- ‘ogy bring tothe organizations? 5. Why do companies seek out latest technologies? 66. When can employees make more accurate and faster deci sions? 7. Why do companies use sophisticated business software in every industry? Comprehension ia, Match peng) wth comer beding A Paragraph 1. : Paragraph 2 Paragraph 3 Paragraph 40 Paragraph 5 1A. Seking ot net technologies 1B. Integrating the existing systems . Asystem integrator D. Advantages of integrated software applications E. Applying fonetional expertise Comprehension [Excite 6, Read the text again and decide whether the fllowing, statements are true, false, or information is not aval- able: 4. Organizations don't have information systems belonging to Liferent computer generations. 2. Replacing old systems with new systems is not very costly 23, The latest trend is integrating the existing systems with each cer with the help of diferent system integration technologies. “4 I is essential to have your business software applications integrated around a single codebase, database and business pro 'S. Busines critical systems were created in1990. 6, Everyday business users are notable to apply their functional expertise to tailor processes and applications n'a way that improves performance. 7, Integrated business software suites are transforming the way companies run, Exercises [xercce7, Complete each sentence (1-10) with a word or phrase from (a3). a. aggregation by interface © process 4. range f itegraced subsystem fg. Inegration 1. functionalities 1 eansformation iL equipmene 1. The st thas always been at the nearend of the development ec 2. The nnn Of different component systems or subsystems that cooperate to deliver a whole functionality has been the cus of industries that use technology. 3. A'S engineer must have a broad»... of skills and breadth of knowledge. 44. Horizontal Integration involves the ereation ofa unique sub system that is meant to be the single ‘berween all other subsystems, 5, In Vertical Integration subsystems are ...-.- according to functionality by ereting*sllos” of functional ences. 6. Vertical uw Very qulck method and involves a few vendors and davelopers but becomes mote expensive over * 7. Ima Star integration each ‘is connected to multiple subsystems, so thatthe diagrams ofthe interconnections Took like a star 8. Systems using Common Data Format seta common or appl catlon-independent format, o they provide a service that foes the tw or from one application into the cm: ‘mon application, 9, Thesystem unk inludes the electronic that interacts simultaneously in order to perform eaiclations and transfer the results tothe corresponding input and outpu devices, 10, Enhanced software capability requirements force developers to enhance developed systems with new [Bxorcise 8, Match (1-10) with (a) to make up sentences 1, The competiveness of most a. 10 track, store, manipulate companies is based and distribute the informa tion from gathered data to appropriate persons when necessary. 2. Information systems are b. on the effective use of infor. used imation technologies and information systems. 3. ‘The efficient usage of infor. c. to be open anytime any imation systems will give — where all over the globe Alot of opportunities 4. By implementing infor. . tothe companies and adva mation. systems, sharing tages 0 their business. the information, know- Jedge, communication and relationships 5. Information systems e, between different countries has made it possible for becomes much ease Dusineses 6. One of the best advantages f the creation of new and ‘of fnformation systems is Interesting jobs. 7. Computer programmers, g. as since technology keeps on Systems analyzers, Hard: changing with each day ware and Software develop- fers and We designers are 8. Implementing he informa hj sme of he many ae tion gems an save Employment opportunites = created with the help of IT. 9. indasy expen bite chat 1, a great dea of ime during the Incener has mae jo the completion of tasks and Secutty aise some labor mechanic works 10.The hackers distribute the j, to damage the company's infermaton over the Inter image ne sel te el companies ‘Speaking ercise®, Discuss the following questions with your partner: ‘What does the system integrator bring together in informa: tion technology? / Isthere any international standard that would submit unam- biguous recommendations about ensuring the management system integration? Should every organization cope with ignment on is own? What are the methods of sytem integration? Use the folowing phrases: I guess Basically Definitely, bu . Inreality On the other hand Unit VI CUSTOMER RELATIONSHIP MANAGEMENT Warm-up activities [xercise1. Discuss the following with your partner Whot can customer relations management prove for organisa “Managing and analyzing customer interactions ¥ Compiling information on customers. ¥ Assisting in customer retention and driving sales gro, ‘Handling customer requests in order to cut down the time of calls and simplify customer service processes + Other, Vocabulary customer interactions — nsauasoelicrvte ¢wanerann ‘customer retention — ygepanie mena consolidate information — roucaauauponars nnopaauiao ‘rack — orexexainare Contact center — korea uenrp provide feedback — o6cenewnnare oGpamsy cans [Bxerese-2, Match the words (1-10) with the definitions (A): 1. customer 4. a computerized system for iden ing, targeting, acquiring, and retaining the best mix of customers 2. cloud computing _b. a party that receives or consumes Droduets (goods of services) and has the ability to choose between ‘iffrent products and suppliers 2. customer relationship management 4. flowehart 6. cyberlaw 7. system administrator {8 customer satisfaction 9. data 10.UNIK a group of interconnected (via fable and/or wireless) comput- ers and peripherals that is capable of sharing software and hardware esourees between many users process where a task Is solved by Using a wide variety of technolo gies, including computers, net- ‘Works, servers, and the Internet powerful, mul-user, multkasking, and extremely stable 32:bie com: puter operating system and the platform on which Internet was Dull and concnves to work the degree of satisfaction provided by the goods or services of a com: pany as measured by the number of repeat customers symbols or signals that are input, stored, and processed by a com: puter, for output as usable Information person responsible for running and ‘maintaining the nerworked compu ters, peripherals, and the network inset rapidly evolving area of civil and criminal law as applicable to the tse of computers, and activites per- formed and transactions conducted ‘over internet and other networks pletorial summary (graphical algo- rithm) ofthe decisions (such as pro ‘duction, storage, transportation) and flows (morement of informa- ‘on and materials) that make up procedure or process from begi- ring to end ee Prodi by: apany see Byeorn eee FE gale dn ate sree: rEe Bee om ems? oo oe oo season eis 3 Sati pee hepa o BAe Reading Ccastomer Relationship Management (CRM) 1, custome ltnip managment (HYD 2 em tha refs to pracics,rateper and teehnloges tat combats Use {Smunage and anaes cstomer iterntons and data troushout {hecanomerecyel, withthe goa of improving business eaion- ‘hips with customers, assting in cistomer retention and driving IE growth CRM tems are designed to compile information on ‘Somers across diferent channels o points of contac between ‘he'eatemer andthe company — whieh could inle the compa te webste, lope, ve cade mal marketing materi, “hd socal media, CRM systems can also give casomer facing stall

You might also like