Professional Documents
Culture Documents
EITS
EITS
B.Jolamanova, S.Karzhaubayeva,
A.Sholakhova, Zh.Manapbayeva
ENGLISH
for IT students
Almaty 2013
УДК
ББК
Рецензенты:
PhD S.Garton, Aston University, Great Britain
Кандидат филологических наук, доцент КазНУ Т.Т.Джарасова
Кандидат филологических наук, доцент МУИТ В.А.Ермакова
Составители:
Б.Д.Джоламанова, С.Э.Каржаубаева, А.А.Шолахова, Ж.Ж.Манапбаева English
for IT students – Алматы, МУИТ, 2013. -228 с.
ISBN
Настоящее пособие предназначено для студентов ИТ специальностей,
изучающих курс профессионального английского языка в вузах технического
профиля с целью развития навыков использования английского языка как
средства профессионального общения.
УДК
ББК
ISBN
©МУИТ, 2013
The manual “English for IT students” is meant to complement the ESP textbooks for
the students of Low Intermediate - Upper Intermediate levels majoring in IT, taking a
course in Professional English. It consists of 2 parts, each containing several modules.
Each module in its turn comprises a target vocabulary list, a target vocabulary test
and 3 texts with a set of communicative vocabulary, grammar, pre-reading, while-
reading, post reading and video activities. The video materials are presented on a
special disc attached to the manual.
TARGET VOCABULARY
64pravo.ru
PRE-READING
Activity 1. As students, you are doing credit courses in your majors. Can you explain
the academic term “credit course”?
Now read the definitions below and check your ideas.
A credit course is…
A class with specified learning goals which the student is required to meet in
order to pass the course and that may be applied toward the fulfillment of
degree requirements at a college or university.
A course in which A, B, C, D, and/or G grades are awarded. Grades recognize
the achievement of a part of or the total requirements for a course or learning
module.
Extract 1
The question of which method results in the most possible learning is one that has
been debated extensively throughout the history of education. The most practiced
method is often referred to as the ‘traditional’ system, in which the main method of
teaching is still the lecture. Students do not spend much time studying independently,
but rather spend their time listening to lectures and taking notes. There are seldom
tutorials. Students are unable to make educational decisions on their own, they had no
say in the curriculum and/or methods of instruction. Outside the lectures, students are
only required to complete assignments. The traditional system does not allow the
flexibility in time management to make this the most efficient method.
Extract 2
Unlike in the traditional teaching system, credit based education is built upon a more
flexible “syllabus”, which enables students to adjust their own learning process in
order to meet the graduation requirements in an optimal time frame. The syllabus also
facilitates the division of subjects and training tasks per semester in such a way that a
student wishing to follow his own learning pattern at a normal speed can register for
any new subject only upon completing the prerequisites. Students can individually
tailor their own learning pattern based on the available courses and subjects.
However, it is strongly recommended to follow the master syllabus.
Teachers aim to help students develop learning skills and strategies to enable them to
cope with the amount of independent workload. Several useful strategies of the credit
based education are: the use of concept mapping, problem-based learning (by means
of challenging tasks for students), case studies, interdisciplinary approaches, team
participation, online learning. Altogether these strategies make a student a life-long
learner as he acquires most critical learning skills.
VOCABULARY FOCUS
GRAMMAR FOCUS
WHILE-READING
Activity 7. Make up A-B pairs and identify the lines along which the two systems are
contrasted in the text; draw a table of two columns to differentiate between them.
Activity 8. Read the statements below and decide whether they describe a credit (C) or
traditional (T) higher education system. Say what is their counterpart in the other
system. Add more statements to the issue if you have any.
The curriculum and syllabi are tailored to the needs of students. They are 1
free to choose elective courses on their own.
Teachers make decisions. Students do not decide which subjects to study; 2
they simply follow the curriculum.
There is no systematic independent study throughout a semester. Students 3
only memorize the assigned information to deliver it at exams.
Student’s ability to work regularly on self-study basis and in a team is the 4
key driver of his success in the academic studies. 70% of the knowledge is
the result of student’s independent study.
Students get marks at exams with 5 as the maximum. 5
Students earn credits for a degree. 6
The course duration is not fixed. Students keep studying until they get the 7
required number of credits for a degree.
A course duration is usually fixed for 4 or 5 years. 8
While completing self-study assignments students master different skills 9
and abilities important for their future professional career. Some of them
are: analytical and creative thinking, public speaking and presentation
skills, analytical reading and writing skills, problem-solving, decision
making and leadership skills.
Students are tied to a fixed timetable. 10
Students are free to design their timetable for most of the disciplines. 11
Students have an opportunity to choose instructors and the language of 12
instruction.
Students have no information on what topics they are going to study in the 13
subjects they are instructed in.
The assessment of students’ academic progress is based on a 100-point 14
scoring system.
In the beginning of a term students get informed on the content of 15
academic programs.
POST-READING
PRE-READING
WHILE- READING
Multinationality and multilinguality are parts of these values and one of the main
assets of our country. According to our Constitution, the Kazakh language is the state
language. The Russian language is officially used in state bodies along with
Kazakh… The planned development of the Kazakh language will not be harmful for
the Russian language… The Kazakh language, our state language, is growing and
developing. By 2020, the number of people who will have mastered the state
language will reach 95 percent. A tendency for teaching in Kazakh is present in all of
the schools and educational institutions of the country. I ask the Government to
develop a Comprehensive plan to ensure youth are instilled with these values in all
educational institutions. We do not even have the books or teachers to work with
youth on these issues. It is vital for our youth.
VOCABULARY FOCUS:
Activity 3. Explain what the following expressions mean, say why they are important
for Kazakhstan:
1) computer literacy; 2) spiritual development; 3) incentive programs;
4) vocational education; 5) qualification verification; 6) access to education;
7) functional literacy.
GRAMMAR FOCUS
Activity 5. Ask 3 types of questions to the sentences below (a general question, a tag
question, a question beginning with “What”):
1) A graduate has to prove he or she is an expert.
2) We have to develop the students’ functional literacy.
3) We have to master the state language.
Activity 6. Suppose you are in the future, 20 years from now. Make the sentences
refer to the past:
1) We must support our scientists.
2) Our education should provide not only the knowledge but also skills.
3) We ought to expand access to education for youth.
4) An innovative and intelligent cluster must be formed round Nazarbayev
University.
5) We need to fund promising research through the provision of grants to encourage
innovation.
6) We ought to instill the values of patriotism and morality in all educational
institutions.
Purpose Method
1 increase the population’s A establish independent centers for
computer literacy to proficiency testing
master information adopt a five-year national action plan
technologies
2 support the professional B fund sth through the provision of grants,
development of teachers transfer and develop new technologies
3 develop student functional C launch incentive programs
literacy
4 expand access to D develop a network of advanced institutions
education for youth of vocational education
5 encourage innovation E operate integrated centers
6 promote advanced F disseminate the experience of Nazarbayev
techniques and university and intellectual schools
technologies
7 improve the national G provide travel and accommodation subsidies
education system
8 promote spiritual H master the state language
development
9 preserve national identity I instill patriotism, morality, inter-ethnic
tolerance, respect for the law
POST-READING
Activity 9. Complement the table above with additional methods and purposes.
Activity 10. Imagine you have the opportunity to speak to the President of
Kazakhstan. Offer some other measures to improve the educational system in the IT
sphere of our country.
Activity 11. Hold a debate on the resolution “Kazakhstan is successfully reforming its
education system”.
blogseitb.us
PRE-READING
Activity 1. What do you know about Steve Jobs? Is he an authority for you? Why/not?
Activity 2. Write out the unknown words and learn them to prepare for the class
discussion of the text.
I am honored to be with you today at your commencement from one of the finest
universities in the world. I never graduated from college. Truth be told, this is the
closest I've ever gotten to a college graduation. Today I want to tell you three stories
from my life. That's it. No big deal. Just three stories.
I dropped out of Reed College after the first 6 months, but then stayed around as a
drop-in for another 18 months or so before I really quit. So why did I drop out? It
started before I was born. My biological mother was a young, unwed college graduate
student, and she decided to put me up for adoption. She felt very strongly that I
should be adopted by college graduates, so everything was all set for me to be
adopted at birth by a lawyer and his wife. Except that when I popped out they decided
at the last minute that they really wanted a girl.
So my parents, who were on a waiting list, got a call in the middle of the night asking:
"We have an unexpected baby boy; do you want him?" They said: "Of course." My
biological mother later found out that my mother had never graduated from college
and that my father had never graduated from high school. She refused to sign the final
adoption papers. She only relented a few months later when my parents promised that
I would someday go to college.
And 17 years later I did go to college. But I naively chose a college that was almost
as expensive as Stanford, and all of my working-class parents' savings were being
spent on my college tuition. After six months, I couldn't see the value in it. I had no
idea what I wanted to do with my life and no idea how college was going to help me
figure it out. And here I was spending all of the money my parents had saved their
entire life. So I decided to drop out and trust that it would all work out OK. It was
pretty scary at the time, but looking back it was one of the best decisions I ever made.
The minute I dropped out I could stop taking the required classes that didn't interest
me, and begin dropping in on the ones that looked interesting.
It wasn't all romantic. I didn't have a dorm room, so I slept on the floor in friends'
rooms, I returned coke bottles for the 5¢ deposits to buy food with, and I would walk
the 7 miles across town every Sunday night to get one good meal a week at the Hare
Krishna temple. I loved it. And much of what I stumbled into by following my
curiosity and intuition turned out to be priceless later on. Let me give you one
example:
Reed College at that time offered perhaps the best calligraphy instruction in the
country. Throughout the campus every poster, every label on every drawer, was
beautifully hand calligraphed. Because I had dropped out and didn't have to take the
normal classes, I decided to take a calligraphy class to learn how to do this. I learned
about serif and san serif typefaces, about varying the amount of space between
different letter combinations, about what makes great typography great. It was
beautiful, historical, artistically subtle in a way that science can't capture, and I found
it fascinating.
None of this had even a hope of any practical application in my life. But ten years
later, when we were designing the first Macintosh computer, it all came back to me.
And we designed it all into the Mac. It was the first computer with beautiful
typography. If I had never dropped in on that single course in college, the Mac would
have never had multiple typefaces or proportionally spaced fonts. And since
Windows just copied the Mac, it's likely that no personal computer would have them.
If I had never dropped out, I would have never dropped in on this calligraphy class,
and personal computers might not have the wonderful typography that they do. Of
course it was impossible to connect the dots looking forward when I was in college.
But it was very, very clear looking backwards ten years later.
Again, you can't connect the dots looking forward; you can only connect them
looking backwards. So you have to trust that the dots will somehow connect in your
future. You have to trust in something — your gut, destiny, life, karma, whatever.
This approach has never let me down, and it has made all the difference in my life.
I was lucky — I found what I loved to do early in life. Woz and I started Apple in my
parents garage when I was 20. We worked hard, and in 10 years Apple had grown
from just the two of us in a garage into a $2 billion company with over 4000
employees. We had just released our finest creation — the Macintosh — a year
earlier, and I had just turned 30. And then I got fired. How can you get fired from a
company you started? Well, as Apple grew we hired someone who I thought was very
talented to run the company with me, and for the first year or so things went well. But
then our visions of the future began to diverge and eventually we had a falling out.
When we did, our Board of Directors sided with him. So at 30 I was out. And very
publicly out. What had been the focus of my entire adult life was gone, and it was
devastating.
I really didn't know what to do for a few months. I felt that I had let the previous
generation of entrepreneurs down - that I had dropped the baton as it was being
passed to me. I met with David Packard and Bob Noyce and tried to apologize for
screwing up so badly. I was a very public failure, and I even thought about running
away from the valley. But something slowly began to dawn on me — I still loved
what I did. The turn of events at Apple had not changed that one bit. I had been
rejected, but I was still in love. And so I decided to start over.
I didn't see it then, but it turned out that getting fired from Apple was the best thing
that could have ever happened to me. The heaviness of being successful was replaced
by the lightness of being a beginner again, less sure about everything. It freed me to
enter one of the most creative periods of my life.
During the next five years, I started a company named NeXT, another company
named Pixar, and fell in love with an amazing woman who would become my wife.
Pixar went on to create the worlds first computer animated feature film, Toy Story,
and is now the most successful animation studio in the world. In a remarkable turn of
events, Apple bought NeXT, I returned to Apple, and the technology we developed at
NeXT is at the heart of Apple's current renaissance. And Laurene and I have a
wonderful family together.
I'm pretty sure none of this would have happened if I hadn't been fired from Apple. It
was awful tasting medicine, but I guess the patient needed it. Sometimes life hits you
in the head with a brick. Don't lose faith. I'm convinced that the only thing that kept
me going was that I loved what I did. You've got to find what you love. And that is as
true for your work as it is for your lovers. Your work is going to fill a large part of
your life, and the only way to be truly satisfied is to do what you believe is great
work. And the only way to do great work is to love what you do. If you haven't found
it yet, keep looking. Don't settle. As with all matters of the heart, you'll know when
you find it. And, like any great relationship, it just gets better and better as the years
roll on. So keep looking until you find it. Don't settle.
When I was 17, I read a quote that went something like: "If you live each day as if it
was your last, someday you'll most certainly be right." It made an impression on me,
and since then, for the past 33 years, I have looked in the mirror every morning and
asked myself: "If today were the last day of my life, would I want to do what I am
about to do today?" And whenever the answer has been "No" for too many days in a
row, I know I need to change something.
Remembering that I'll be dead soon is the most important tool I've ever encountered
to help me make the big choices in life. Because almost everything — all external
expectations, all pride, all fear of embarrassment or failure - these things just fall
away in the face of death, leaving only what is truly important. Remembering that
you are going to die is the best way I know to avoid the trap of thinking you have
something to lose. You are already naked. There is no reason not to follow your heart.
About a year ago I was diagnosed with cancer. I had a scan at 7:30 in the morning,
and it clearly showed a tumor on my pancreas. I didn't even know what a pancreas
was. The doctors told me this was almost certainly a type of cancer that is incurable,
and that I should expect to live no longer than three to six months. My doctor advised
me to go home and get my affairs in order, which is doctor's code for prepare to die.
It means to try to tell your kids everything you thought you'd have the next 10 years
to tell them in just a few months. It means to make sure everything is buttoned up so
that it will be as easy as possible for your family. It means to say your goodbyes.
I lived with that diagnosis all day. Later that evening I had a biopsy, where they stuck
an endoscope down my throat, through my stomach and into my intestines, put a
needle into my pancreas and got a few cells from the tumor. I was sedated, but my
wife, who was there, told me that when they viewed the cells under a microscope the
doctors started crying because it turned out to be a very rare form of pancreatic cancer
that is curable with surgery. I had the surgery and I'm fine now.
This was the closest I've been to facing death, and I hope it's the closest I get for a
few more decades. Having lived through it, I can now say this to you with a bit more
certainty than when death was a useful but purely intellectual concept:
No one wants to die. Even people who want to go to heaven don't want to die to get
there. And yet death is the destination we all share. No one has ever escaped it. And
that is as it should be, because Death is very likely the single best invention of Life. It
is Life's change agent. It clears out the old to make way for the new. Right now the
new is you, but someday not too long from now, you will gradually become the old
and be cleared away. Sorry to be so dramatic, but it is quite true.
Your time is limited, so don't waste it living someone else's life. Don't be trapped by
dogma — which is living with the results of other people's thinking. Don't let the
noise of others' opinions drown out your own inner voice. And most important, have
the courage to follow your heart and intuition. They somehow already know what you
truly want to become. Everything else is secondary.
When I was young, there was an amazing publication called The Whole Earth
Catalog, which was one of the bibles of my generation. It was created by a fellow
named Stewart Brand not far from here in Menlo Park, and he brought it to life with
his poetic touch. This was in the late 1960's, before personal computers and desktop
publishing, so it was all made with typewriters, scissors, and polaroid cameras. It was
sort of like Google in paperback form, 35 years before Google came along: it was
idealistic, and overflowing with neat tools and great notions. Stewart and his team put
out several issues of The Whole Earth Catalog, and then when it had run its course,
they put out a final issue. It was the mid-1970s, and I was your age. On the back
cover of their final issue was a photograph of an early morning country road, the kind
you might find yourself hitchhiking on if you were so adventurous. Beneath it were
the words: "Stay Hungry. Stay Foolish." It was their farewell message as they signed
off. Stay Hungry. Stay Foolish. And I have always wished that for myself. And now,
as you graduate to begin anew, I wish that for you.
GRAMMAR FOCUS
Activity 4. Use the Conditional Mood sentences combining the following facts:
1) S.Jobs took calligraphy classes – The Mac was the first computer with beautiful
typography.
2) S.Jobs’ biological mother was a college grad – She insisted that the adopted
parents should send him to college.
3) S.Jobs’ adopted parents were not rich – He had to quit the university.
4) He didn't have a dorm room – He slept on the floor in friends' rooms.
5) He was dismissed from Apple – He entered the most creative period of his life.
6) He found what he really loved – He achieved extraordinary success.
VOCABULARY FOCUS/WHILE-READING
POST-READING
Activity 7. Sum up the lessons S. Jobs teaches the younger generation concerning:
a) connecting dots; b) life difficulties; c) occupation; d) death; e) main values
Activity 8. Express your dis/agreement with Job’s ideas. Analyze/share with your
group if and how you have implemented/are going to implement them in your life.
MODULE 2. SOFT SKILLS
TARGET VOCABULARY
PRE-READING
Activity 1. Guess what the terms “soft skills” and “hard skills” may mean.
Part 1. Definition:
Soft skills is a broad sociological term which refers to the cluster of personality traits,
social graces, facility with language, personal habits, friendliness, and optimism that
mark people to varying degrees. Soft skills are personal attributes that enhance an
individual's interactions, job performance and career prospects. To be good at soft
skills usually takes Emotional Intelligence or EQ (also known as your right brain –
the emotional center).
Part 2. Differentiation
In the world of work, “hard skills” are technical or administrative procedures related
to an organization’s core business. Examples include machine operation, computer
protocols, safety standards, financial procedures and sales administration. These skills
are typically easy to observe, quantify and measure. They’re also easy to train,
because most of the time the skill sets are brand new to the learner and no unlearning
is involved. Hard skills, which are the technical requirements of a job, complement
soft skills.
Unlike hard skills, which are about a person's skill set and ability to perform a certain
type of task or activity, soft skills are interpersonal and broadly applicable. Soft skills
(also called “people skills”) are typically hard to observe, quantify and measure.
People skills are needed for everyday life as much as they’re needed for work. They
have to do with how people relate to each other: communicating, listening, engaging
in dialogue, giving feedback, cooperating as a team member, solving problems,
contributing in meetings and resolving conflict.
Part 3. Rationale
To get and keep a job you typically need a repertoire of technical skills. Dentists need
to know how to fill cavities. Secretaries need to type 100+ words per minute.
Accountants need to be certified.
Beyond the technical skills, though, which dentist do you go to? The one who is
pleasant and takes time to answer your questions; or the one who treats you like a
number in a long line of numbered mouths?
Which secretary do you retain when times are lean? The one whose attitude is
positive and upbeat, and who is always willing to help; or the one who is inflexible
and has a hard time admitting mistakes? Likewise, think about accountants. The one
who has a great work ethic and encourages his colleagues is the one who will, most
likely, excel in his position and organization. In these situations, and all the others
like them, it's the soft skills that matter.
While your technical skills may get your foot in the door, your people skills are what
open most of the doors to come. Your work ethic, your attitude, your communication
skills, your emotional intelligence and a whole host of other personal attributes are
the soft skills that are crucial for career success. With these soft skills you can excel
as a leader. Problem solving, delegating, motivating, and team building are all much
easier if you have good soft skills. Knowing how to get along with people – and
displaying a positive attitude – are crucial for success.
Computerworld's 2007 hiring and skills survey reported that IT executives are
increasingly looking for staff who demonstrate a broad range of soft skills in addition
to their technical abilities. Survey respondents said writing and public speaking are
two of the most important soft skills they look for when hiring new employees.
Additionally, they favor candidates who understand the business process, can work
well with a team, know how to get their points across, are inquisitive, use initiative,
and are willing to take risks.
The overwhelming majority (93 %) of the HR managers surveyed said technical skills
are easier to teach than soft skills. The most in-demand soft skills cited by the
managers are organizational skills (87%), verbal communication (81%), teamwork
and collaboration (78%), problem solving (60%), tact and diplomacy (59%), business
writing (48%), and analytical skills (45%). According to recent surveys when hiring
administrative staff - 67% of human resource (HR) managers would hire an applicant
with strong soft skills whose technical abilities were lacking. However, only 9%
would hire someone who had strong technical expertise but weak interpersonal skills.
The problem is, the importance of these soft skills is often undervalued, and there is
far less training provided for them than hard skills. For some reason, organizations
seem to expect people know how to behave on the job. They tend to assume that
everyone knows and understands the importance of being on time, taking initiative,
being friendly, and producing high quality work. Assuming that soft skills are
universal leads to much frustration. That's why it's so important to focus as much on
soft skills training and development as you do on traditional hard skills.
Leaders at all levels rely heavily on people skills, too: setting an example,
teambuilding, facilitating meetings, encouraging innovation, solving problems,
making decisions, planning, delegating, observing, instructing, coaching, encouraging
and motivating. It's often said that hard skills will get you an interview but you need
soft skills to get (and keep) the job. So organizations, particularly those frequently
dealing with partners and customers face-to-face, are generally more prosperous if
they train their staff to use these skills. For this reason, soft skills are increasingly
sought out by employers in addition to standard qualifications.
Part 4. Classification
Personal qualities: Interpersonal skills:
optimism empathy
common sense teamwork
responsibility leadership
a sense of humor good manners
integrity negotiation
initiative sociability
inquisitive mind the ability to teach
willingness to take risks communication skills (writing ability, public
emotional intelligence speaking, the ability to get a point across)
VOCABULARY FOCUS
Across
3) not profitable or prosperous
5) an evaluative response
6) to make easier; assist the progress of sth
9) the ability to understand other people’s emotions, feelings
10) that can be quantified
Down
1) people answering the survey questions
2) very strong, complete, total
4) be exceptionally good at sth
7) that can be applied
8) eager to know
Activity 3. Mark the odd word:
1) enhance, increase, improve, extend
2) frustration, annoyance, satisfaction, disappointment
3) upbeat, cheerful, optimistic, merry
4) crucial, crude, important, decisive
5) facility, ability, agility, capacity
6) soft, hard, rigid, warm
GRAMMAR FOCUS
Activity 5. Change complex sentences into simple using the Complex Object:
1) It is wrong to believe that soft skills are easier to master than hard ones.
2) We expect that he will become our team leader.
3) They consider that everyone knows and understands the importance of being on
time, taking initiative and producing high quality work.
4) People generally believe that soft skills are universal.
5) I believe that they are good at getting along with the clients.
WHILE-READING
Activity 8. Read the text part by part and answer the questions:
Part 1. Which definition of soft skills do you think is the best? Why?
Part 2. Show the difference between hard and soft skills graphically.
Part 3. What are the (5-10) reasons why soft skills are crucially important?
Part 4. Can any soft skills be deleted from the list or added to it?
POST-READING
Activity 9. Make a list of the soft skills which you do (not) possess. Discuss which of them
you need to develop and how?
Activity 10. Evaluate the role of English classes as to their potential in developing various soft
skills.
PRE-READING
Emotional intelligence skills include but are not limited to empathy, intuition,
creativity, flexibility, resilience, stress management, leadership, integrity,
authenticity, intrapersonal skills and interpersonal skills (Peter Salovey, John Mayer,
Daniel Goleman). "Emotional intelligence involves putting yourself in other people's
shoes and understanding what their needs or motives might be" (Vickers). It is
measured in EQ, which stands for Emotional Intelligence Quotient.
One particularly popular setting that employs attempts at measuring EQ is the corporate
world. Many businesses utilize EQ tests to help their employees determine and measure
their emotional responses to various situations. To be successful and survive in today's
society, individuals need to have the necessary communication and organizational skills
to make sound decisions and interact with each other.
5. General Mood
* Optimism
* Happiness
VOCABULARY FOCUS
Activity 4. Ask questions 1) What?.2) Whom? 3) Who? 4) Whose? 5) What kind of?
6) What for? to the sentence below:
Many businesses utilize EQ tests to help their employees measure
their emotional responses to various situations.
WHILE-READING
Activity 10. Watch the video about EI “Emotional Intelligence and Success in the
Future” http://www.youtube.com/watch?v=D71FBakjcew&feature=related) and:
1. define the following:
a) emotional intelligence
b) elusive
c) to harness EI
d) self-efficacy
e) academic pressures
2. say:
a) why it is crucially important
b) what methods of testing EI have been used
c) if and how it helps to manage academic pressures
d) in what spheres of life it appears to be useful
Activity 11. Watch the video “Secrets for dealing with difficult people”
(https://www.youtube.com/watch?v=Xg5YQlj7HMo) and:
1) name the categories of difficult people mentioned in it;
2) say what advice the presenter gives for dealing with such people;
3) think of other kinds of difficult people and ways of handling them.
TEXT 3. STAGES OF TEAM GROWTH
Bruce Tuckman
http://www.ndt-ed.org/TeachingResources/ClassroomTips/Teamwork.htm
forbes.com
PRE-READING
Activity 1. Have you ever worked in a team? Was the experience successful?
Why/not?
It is important for a teacher and students (the team members) to know that teams don't
just form and immediately start working together to accomplish great things. There
are actually stages of team growth and teams must be given time to work through the
stages and become effective. Team growth can be separated into four stages.
Stage 2: Storming. Storming is probably the most difficult stage for the group.
Members often become impatient about the lack of progress, but are still
inexperienced with working as a team. Members may argue about the actions they
should take because they face ideas that are unfamiliar to them and put them outside
their comfort zones. Much of their energy is focused on each other instead of
achieving the goal.
Stage 3. Norming. During this stage team members accept the team and begin to
reconcile differences. Emotional conflict is reduced as relationships become more
cooperative. The team is able to concentrate more on their work and start to make
significant progress.
Stage 4. Performing. By this stage the team members have discovered and accepted
each other's strengths and weaknesses, and learned what their roles are. Members are
open and trusting and many good ideas are produced because they are not afraid to
offer ideas and suggestions. They are comfortable using decision making tools to
evaluate the ideas, prioritize tasks and solve problems. Much is accomplished and
team satisfaction and loyalty is high.
VOCABULARY FOCUS
GRAMMAR FOCUS
Activity 6. Paraphrase using the modal verbs should, have to, ought to, may:
1) It is important for the team members to get on well with each other.
2) It is normal for the team to make little progress during this stage.
3) It is natural for the team members to focus on each other instead of on achieving
the goal.
4) It is normal for the team members to feel outside their comfort zones at first.
5) It is important for the team members to offer ideas and suggestions.
6) It is natural for the team members to accept each other's strengths and weaknesses.
7) It is important for the team members to accomplish their goals.
WHILE-READING
POST-READING
Activity 11. Analyze your project team performance in terms of its stages. Comment
on your teamwork successfulness. Account for your teamwork
accomplishments/failures.
MODULE 3. BEST PRACTICES
TARGET VOCABULARY
woosterglobalhistory.org
PRE-READING
Activity 1. Look at the title above and predict what the article may be about.
Unfortunately, learning through book doesn't make the learning strategies list. Taking
notes during class? Topic-focused study? A consistent learning environment? All are
exactly opposite of the best strategies for learning.
Robert Bjork, the director of the UCLA Learning and Forgetting Lab, a distinguished
professor of psychology, is a renowned expert on keeping things in your brain from
leaking out. It turns out that everything I thought I knew about learning is wrong.
First, he told me, think about how you attack a pile of study material. “People tend to
try to learn in blocks,” Bjork said. “Mastering one thing before moving on to the
next.” Instead of doing that Bjork recommends interleaving. The strategy suggest that
instead of spending an hour working on your tennis serve, you mix in a range of skills
like backhands, volleys, overhead smashes, and footwork.
Instead of making an appreciable leap forward with your serving ability after a
session of focused practice, interleaving forces you to make nearly imperceptible
steps forward with many skills. But over time, the sum of these small steps is much
greater than the sum of the leaps you would have taken if you’d spent the same
amount of time mastering each skill in its turn. Alternate learning European capitals,
and programming in Java.
Bjork also recommends varying your study location. The spacing effect, which was
first described by Hermann Ebbinghaus in 1885 — will also help. “If you study and
then you wait, tests show that the longer you wait, the more you will have forgotten,”
Bjork said. But here’s the cool part: If you study, wait, and then study again, the
longer the wait, the more you’ll have learned after this second study session. Bjork
explains it this way: “What we retrieve becomes more retrievable in the future.
Provided the retrieval succeeds, the more difficult and involved the retrieval, the more
beneficial it is. You should space your study sessions so that the information you
learned in the first session remains just barely retrievable. Then, the more you have to
work to pull it from your mind, the more this second study session will reinforce your
learning. If you study again too soon, it’s too easy.
Along these lines, Bjork also recommends taking notes just after class, rather than
during — forcing yourself to recall a lecture’s information is more effective than
simply copying it from a blackboard. You have to work for it. The more you work,
the more you learn, and the more you learn, the more awesome you can become.
“Forget about forgetting,” said Bjork. “People tend to think that learning is building
up something in your memory and that forgetting is losing the things you built. But in
some respects the opposite is true.” See, once you learn something, you never actually
forget it. And while we count forgetting as the sworn enemy of learning, in some
ways that’s wrong, too. The two live in a kind of symbiosis in which forgetting
actually aids recall. “Because humans have unlimited storage capacity, having total
recall would be a mess,” said Bjork. What you thought were sworn enemies are more
like distant collaborators.
VOCABULARY FOCUS
I II
1. beneficial A. considerable
2. recall B. harmful
3. renowned C. famous
4. study in blocks D. noticeable
5. awesome E. interleave
6. appreciable F. impressive
7. imperceptible G. retrieve
8. alternate H. take turns
Down
1) noticeable
3) insert something alternately and regularly between the parts of sth else
5) enemy, an extreme enemy who is determined to remain such
6) to bring back again; revive or restore
7) remarkable, outstanding
GRAMMAR FOCUS
Activity 4. Insert the prepositions in, out, on, for, through (some are used more than
once):
1) learn _____ book 2) strategies _____ learning 3) it turns _____ that 4) an expert
_____ sth 5) to leak _____ 6) to learn _____ blocks 7) _____ its turn 8) ____ some
respects
Activity 5. Make up sentences using the construction “the more…the more”:
1) wait – forget; 2) work – learn; 3) learn – awesome 4) difficult and involved –
beneficial; 5) work to pull – reinforce learning; 6) forget – learn 7) recall – learn
WHILE-READING
POST-READING
Activity 8. Make up not less than 5 sentences using the following structure:
… reinforces learning because …
indianexpress.com
PRE-READING
Academic dishonesty has become a big issue. Teachers always say, "Keep your eyes
on your own paper. Anyone caught cheating will fail this exam!". They watch
students like a hawk during examinations. Some people complain that cheating is on
the rise, that more and more students are cheating. They think it is easier and easier
for students to get away with it. Some say teachers are even letting cheaters off easy.
Why are some students cheating more? Some students who cheat say, "We have to
cheat in order to get ahead in life. Besides, everyone is doing it. It's no big deal!"
"Big problems at home", "I was sick", "I lost my notes", "I forgot the test", "My book
was stolen"...all of these are excuses in order not to study for a test, and you can
always find a good one. The next day without excuses, you must take the test. You
need a good grade in order to pass the course, and you are hoping for a miracle, but
the point is that they don't exist, so the easiest solution is to cheat! Does it sound
familiar? Well, perhaps once in a life time each one of us has lived this kind of
situation and has cheated without looking at the consequences of this act.
Everybody should be taught not to cheat from the school days because the problem is
that most of the time it is not a matter of once in a life time. If you are successful the
first time, the most probable thing is that you will repeat the act; and if you are doing
this very often, it could bring serious consequences in both the short and the long
term.
In the short term, maybe you won't be caught, and you will get good grades without
studying, which sounds fantastic, but you are wasting your time and your money
trying to "learn" by cheating. It is not such a good method. In the end, who will be
deceived? The teacher or you? Well, I am pretty sure that you will be the only loser.
If you get caught, you will be in trouble because you can be expelled from school or
the university, or at least you will get a zero (0) on your test and a bad reputation, not
only with the teachers, but with the other students as well.
In the long term, there are also big consequences for the cheaters. You may graduate
from school or university by cheating, but when you will be asked to use your
knowledge in other situations, as for example at work, if you didn't learn much in the
university because you are a cheater, how would you solve problems, give ideas,
behave in a meeting or perform in general on your job?
My father used to tell me that cheating at school was like forging a check. Well, at
that moment, I thought he was exaggerating, but now I understand his words because
when you cheat, what you are doing is taking knowledge that is not yours and using it
as if it were. It's the same as forging a check. Besides, I think whoever is accustomed
to cheating won't see any problem in doing bad things in the future, such as stealing
ideas from others and plagiarizing works.
If everybody just knew the importance of knowledge in their lives, I think that people
wouldn't cheat either in universities or in schools. The problem is that when you are a
kid, you don't see the long term, and most of the time the only important this is the
grades. In other words, what happens is that there is a lack of conscientiousness about
the subject when you are at school and sometimes at the university.
VOCABULARY FOCUS
Activity 2. Look through the expressions below and try to guess their meaning based
on the context:
1) become a big issue;
2) catch someone cheating;
3) get away with sth;
4) let someone off easy;
5) is no big deal;
6) conscientious;
7) forge a check;
8) take the consequences;
9) get expelled from school;
10) be suspended from studies.
GRAMMAR FOCUS
Activity 6. Mark the type of clause introduced by “if” (RC – real condition, UC –
unreal condition, OC – object clause):
___ 1) If you do this very often, you will regret it in the future.
___ 2) If you are caught cheating, you may be punished.
___ 3) I don’t know if he cheated or not.
___ 4) He asked me if I cheated in the exam.
___ 5) If I were you I would not cheat.
___ 6) They will confess if they cheat.
___ 7) I'm not sure if they will let him off easy.
___ 8) He would not have been expelled from school if he had not been caught
cheating.
WHILE-READING
Activity 8. Read the text and find information supporting the following statements:
1) Academic dishonesty has become a big issue.
2) There are short and long term negative consequences of cheating.
3) Cheating has a positive side.
4) Cheating has negative sides.
POST-READING
Activity 12. Video session “Cheating and peer reporting of cheating in college” (5
minutes) at http://www.youtube.com/watch?v=tBEw4zY8og4
1) Study the phrases and guess how they can be used in the context of cheating
take a shortcut; be apathetic to ethical standards; gain an unfair advantage; turn a
blind eye on sb cheating; underlying reasons for sth; bear the cost of sth; get away
with sth; make a difference; one’s moral compass; count more than sth else; wind up
doing sth; undermine sb’s relations, trust, reputation
index-pic.jpg
PRE-READING
Paragraph 2. How can students learn to face any kind of situation in English?
In tennis, what leads to good game is practice, and this involves not only learning the
rules of the game and doing repetitive drills, but also spontaneous practice with real
partners. It is the same with English. What leads to mastery of the language is not
only learning the “rules of the game” – grammar and doing repetitive drills, but also
spontaneous practice with real partners, your classmates.
VOCABULARY FOCUS
GRAMMAR FOCUS
Activity 4. Insert the missing connectives “whereas”, “because”, “while”, “in
addition to”, “since”:
1) _____ students speak with the classmates, the teacher circulates from group to
group.
2) Doing repetitive grammar drills in class is not effective _____ it is something that
students could do at home.
3) _____ we have only three hours of class per week, we prefer focusing only on
those activities which require the presence of other students or the teacher.
4) _____ in-class practice, students need to use English outside of class.
5) But learning a language involves learning a skill, _____ learning history or
geography simply involves learning a set of facts or a body of knowledge.
WHILE-READING
Activity 6. Study each paragraph of the text and do the following tasks:
Paragraph 1. Formulate the difference between knowledge and skills. Define each of
them. (while defining skills, remember the Pavlov theory of reflexes treating
unconditional reflexes as instincts and conditional ones as acquired reflexes, and
relate it to the language learning process). Say which areas of learning/subjects each
of them represents. Say which of them is/not learning English.
Paragraph 2. Draw a parallel between learning English and playing tennis. Do they
have anything in common? If yes, what? Identify the stages in learning English in
general and in your learning practice.
Paragraph 3. Answer the title question. Find the key phrase in answering it. Dwell on
the dis/advantages of in-class pair/group work. Make a conclusion as to their
usefulness.
Paragraph 4. Dwell on the role of grammar rules and drills in the language learning
process.
Paragraph 5. Say what you/your teacher can do to make your learning English more
effective.
Activity 7. Skim each part of the text and formulate its main message.
POST-READING
Activity 8. Analyze your language learning experience based on the text above.
Make inferences about your personal experience of learning English.
PART II. SOCIAL ISSUES OF IT
MODULE 1. PERSONAL FOCUS
TARGET VOCABULARY
Item Definition Usage
Addict (n) a person who is extremely be/get/become ~ed to sth;
interested in sth and spends a lot addicted (adj), addictive (n),
of time on it addiction (n):
computer/television ~ion
syn. devotee, enthusiast, fan,
geek
Alert (v) warn sb that there may be ~ sb to sth; alert (n): to
danger, trouble, etc that they be/put on ~; red/security
should be ready to act ~(n); alertness;
syn. alarm, notify
Alternative (adj) different from what is usual or ~ approach/device/energy/
accepted route; provide an ~ for/to
sb/sth; have little/no ~ (but
to); leave sb with no ~ (but
to); alternatively (adv);
syn. back-up, substitute
Appliance (n) a device or instrument designed domestic/electric/household/
to perform a specific function, surgical ~; syn. device,
especially an electrical device gadget, gizmo
Artificial (adj) created by people, not existing ~ intelligence/respiration/
or occurring naturally light; artificiality (n);
artificially (adv);
syn. synthetic, fake, man-
made, simulated;
ant. natural, genuine
Assist (v) help sb do sth ~ sb at/in/with sth; assistant
(n), assistance (n);
assistive(adj): ~ technology
syn. aid, give sb a hand
ant. hinder, prevent
Biodegrade (v) be decomposed by bacteria or ~ naturally; biodegradable
other living organisms (adj): ~able package;
biodegradability (n),
biodegradation (n)
Click (v) press a button on a computer at the ~ of a mouse button;
mouse to make the computer do to be a ~ away;
something single/double-/right ~;
syn. clack, clap
Disable (v) limit the movements, senses, or ~ an enemy; disabled (adj):
activities of sb ~d people; disability (n);
syn. harm, cripple
ant. aid, assist, enable
Dispose of (v) get rid of sb/sth that one does disposed (adj), disposable
not want or cannot keep (adj), disposal (n): at sb’s ~;
upon ~; syn. discard, get rid
of, scrap; ant. keep, retain
Diverse (adj) of different kind, varied ~ range; diversify (v);
diversity (n); diversely
(adv); syn. different,
divergent; ant. alike,
identical, similar
Edit (v) to change online text on a ~ mode; ~ sth out; photo
computer or word processor ~ing program; editable
(adj); editor (n), editorial
(n), edition (n);
syn. rewrite, refine
Empower (v) give somebody the power or ~ sb to do sth;
authority to act empowerment (n);
empowered (adj);
syn. authorize, enable
ant. refuse, reject, revoke
Expose (v) leave sb/sth/oneself no longer ~ sb to sth; get ~d to sth;
covered or protected exposure: ~ to sth; exposed
(adj); syn. endanger, risk,
jeopardize
ant. protect, guard, shield
Fatigue (n) the condition of being very tired mortal/mental/physical/
driver ~; fatigued (adj): be
~;
syn. exhaustion, burnout
ant. freshness, liveliness,
vigor
Fraud (n) an action or an instance of commit/expose a ~;
deceiving sb in order to make mail/wire ~;
money or obtain goods illegally fraudster (n), fraudulence
(n); fraudulent (adj);
fraudulently (adv);
syn. scam, cheat, deception
ant. fairness, justice
Gadget (n) a small mechanical device or clever/electrical/kitchen ~;
tool ~ for sth; ~ to do sth;
gadgetry (n);
syn. appliance, gizmo
Hazard (n) a thing that can be dangerous or occupational/safety ~;
cause damage exposure to a ~; take ~s; at
~; ~ for/to sb/sth; hazardous
(adj): ~ fire/health/ shock;
syn. danger, risk, threat
ant. protection, safety
Impair (v) damage sth or make sth weaker ~ performance/efficiency/
memory; impaired (adj):
hearing/mentally/ visually
~; impairment (n);
syn. diminish, deteriorate
Impose (v) force to be accepted, done, or ~ limits/sanctions; ~
complied with sth/oneself on others;
imposition (n); imposed
(adj); syn. charge, enforce
ant. lift
Incinerate (v) destroy sth by burning ~ rubbish/waste; incinerator
(n), incineration (n);
syn. cremate, ignite
Landfill (n) an area of land where waste ~ sites/operation;
material is buried under layers of chemical/open/ sanitary ~;
earth syn. dumping ground,
garbage lot
Landline (n) a conventional ~ connection/phone
telecommunications connection
by cable laid across land
Obsolete (adj) no longer used, out of date render sth/become ~;
obsoleteness (n); obsoletely
(adv); syn. old-fashioned,
outdated, dated
ant. contemporary, modern,
up-to-date
Propagate (v) spread sth widely propagator (n): ~virus;
propagative (adj);
syn. spread, extend
Recycle (v) treat things that have already ~ waste/paper; ~ing
been used so that they can be facilities/plant;
used again recycler (n); recycled (adj),
recyclable (adj);
syn. reuse, reprocess
Retrieve (v) find or extract stored retrieval (n): beyond/past ~;
information retrievable (adj);
syn. get back, regain
Simulate (v) make certain conditions that simulation (n): ~
could exist in reality in order to flight/accident; through ~;
study them or learn from them simulator (n); simulated
(adj); simulative (adj);
syn. imitate
Synthesis (n) the combining of separate things image/speech ~; synthesizer
to form a complex whole (n); synthesize (v); synthetic
(adj); synthetically (adv);
syn. composite,
ant. division, separation
Telecommute (v) work from home, ~ from (somewhere) to
communicating with the (somewhere);
workplace by telephone, fax, and telecommuting (n): ~ centre;
email telecommuter (n);
PRE-READING
Activity 1. Work in pairs. Tell your partner about what you use computers for.
Since 1948 when the first real computer has been invented our life has changed so
much that we can call it real digital revolution. People who have grown up with PCs
and microchips are often called the digital generation. Nowadays, it cannot imagine
life without computers and the fact is that they have become so important that nothing
can replace them. They seem to be everywhere today. Numerous gadgets such as PSP
(PlayStation Portable), MP3, have been invented to make our life easier. But often
there is a question if they really do so? Is computer a friend or foe?
“I think it's fair to say that personal computers have become the most empowering
tool we've ever created. They're tools of communication, they're tools of creativity
that can be shaped by their user”, says Bill Gates. Computers play a vital role in every
sphere of life.
Communication
Computers are critical for communication and are the centerpiece of information
technology. The early 1990s saw the emergence of household Internet use, which
eventually spurred common use of email, websites, blogs, social networking, video
chat and VoIP (Voice Over Internet Protocol) which have rendered the traditional
communication modes including postal mail and landline phones obsolete.
Education
Computers have become popular tools for both teachers and learners, since they can
present an important interactive component and allow students a diverse and exciting
way of integrating information into their studies. Interactive whiteboards, Wikis,
mind-mapping software, etc. assist holding different instruction modes such as drill
and practice, tutorials, problem solving, simulations and games. Various functions of
the computer such as storage and retrieval are used to keep instruction in order and
track student's progress and records. Computer applications such as electronic mail
(e-mail), computer conferencing, blogging, and electronic bulletin boards allow for
communication, and make distance education possible. HyperCard, hypermedia, and
other still-developing multimedia tools help create essential learning files as podcasts,
vodcasts, etc. by combining voice, video, and other computer technologies into one
delivery system.
Business
Many computers help us travel by air and road. Air-travel computers include those
that control air traffic safely, warn pilots of potential midair collisions and help pilots
navigate. Road-travel computers include those that help drivers navigate and help
engines run more efficiently and environmentally friendly, e.g. a GPS (Global
Positioning System).
Medicine
Computers have found their way in medicine as well. Many of the modern methods
of diagnostics are largely based on computer technology such as computed
tomography, X-ray, etc. Computerized robotics allows doctors to perform surgery on
patients without even being in the same room. Machines such as hospital-bed beeping
systems, emergency alarm systems are used for monitoring a patient’s state of health.
Computer database technology such as Electronic Patient Records allows medical
professionals to store and search necessary information. Computers are also used to
run medical simulations in search of cures to diseases such as cancer, AIDS, and
Alzheimer's disease.
Entertainment
With the creation of the Internet and faster processors, entertainment became a
popular use for personal computers everywhere. Computers now have almost
unlimited access to any song by any artist. Computers also allow musicians to create
artificial instruments to record with, called MIDI (Musical Instrument Digital
Interface) instruments. Moreover, with the advancement of video card and Internet
speeds, movies and streaming television are now at the click of a mouse button.
Pictures, paintings, poetry and more are just a click away too. Computer photo editing
programs and animation programs are also the sources behind most movies and
professional photographs. Computer games are a quickly growing market just like all
other forms of video games. In fact, computers are absolutely necessary for
programming any sort of a new video game.
VOCABULARY FOCUS
Activity 2. Work in pairs. Match the terms in the left column with the definition in the
right:
Activity 3. Find these words and phrases in the text, and try to guess their meaning
from the context: render sth obsolete, landline, simulations, payroll management,
desktop publishing, office automation, midair collisions, hospital-bed-beeping
systems, assistive technology, impairment, streaming television.
Activity 5. Complete the following sentences with the words from the text:
1) Nowadays songs, e-books, movies are just a c_____ away.
2) Communication is the c_____ (base, foundation) of information technology.
3) Our universities are i_____ the European educational system into their practice.
4) According to Bill Gates, computers are the most e_____ tools humanity has ever
created.
5) Interactive whiteboards a_____ holding different instruction modes such as
presentations.
GRAMMAR FOCUS
Activity 6. Tell how our life has changed since computers were invented, using the
construction: Since computers were invented _____ have/has _____.
Activity 8. What have you already done with the help of computers in the field of
medicine/travelling/business/education/communication/entertainment? Share with
your partner.
WHILE-READING
Activity 11. Read the text and create a mind map on the use of computers in different
spheres of life.
POST-READING
Activity 12. Translate one paragraph of the text. Summarize the text.
Activity 13. Group contest: in groups of 3 brainstorm the use of computers in OTHER
spheres of life, e.g. in agriculture, sports, etc. Present your ideas to the other groups.
Activity 14. Imagine and describe your life without computers, using the pattern:
F.e.: If I/we didn’t have a computer, I/we would/wouldn’t _____.
PRE-READING
Activity 1. What kind of threats of computer use do you know? Mind map your
answers and present them to the class.
Despite superb features there is also a dark side of computer technology because
every invention brings us not only benefits but also threats. Anybody who has ever
come into contact with technology has begun building a dependence upon it. Our
society has developed technological dependence. When computers are down, our
way of life breaks down: planes stop flying, telephones don’t work, banks have to
close.
Computers produce electronic waste, plastic cases and microchips that are not
biodegradable and have to be recycled or just thrown away. An estimated 50 million
tons of e-waste are produced each year. The USA discards 30 million computers each
year and 100 million phones are disposed of in Europe each year. The Environmental
Protection Agency estimates that only 15-20% of e-waste is recycled, the rest of these
electronics go directly into landfills and incinerators.
It is estimated that today at least 75% of all jobs involve some level of computer use;
this means three-quarters of the workforce are being exposed to numerous health
problems: nervous repetitive movement of joints, severely reduced eyesight, blurred
vision, overall eye tiredness and Dry Eye, which results in itchy sore and even the
illusion that something is stuck in your eye. Another medical issue caused by the use
of computers is back and posture problems, that result in severe and acute pain in the
back, neck and shoulders. Computers also cause loss of the ability to fully focus our
attention which is referred to as “attention deficit”.
VOCABULARY FOCUS
1. landfill A. to get rid of sth that one does not want or cannot
keep
2. incinerator B. to become worse in quality
3. diminish/deteriorate C. an area of land where waste material is buried
under layers of earth
4. dispose of/discard D. to leave sb/sth/oneself no longer covered or
protected
5. expose to E. an apparatus for destroying waste by burning
Activity 4. Complete the sentences with the words from the text.
1) Don’t d_____ your personal information on social networks! It is dangerous!
2) Teenagers can’t help playing computer games. They are a_____.
3) More and more people are trying to r_____ paper these days. They are so “green”.
4) Inappropriate use of laptops results in i _____ sore in the eyes, s_____ and a_____
pain in the back, neck, and shoulders.
5) N _____ crimes, i.e. not related to currency or money are under way.
Activity 5. Make sentences about the negative effects of using computers using the
following verbs: cause, diminish. deteriorate, lead to, to be exposed to
GRAMMAR FOCUS
Activity 6. Identify the Subjective with the Infinitive construction in the sentences:
1) Internet addiction disorder (IAD) is supposed to be on the increase.
2) Youngsters are reported not to play outdoor games at all.
3) Computers are known to cause various health problems.
4) Intellectual property theft is expected to decrease over time.
5) Technological dependence is considered to be the most dangerous problem of
nowadays.
Activity 7. Rephrase the sentences following the given model (with phrases to be
reported/known/supposed/expected/considered):
An estimated 50 million tons of e-waste are produced each year in the US -----
An estimated 50 million tons of e-waste are reported to be produced each year in the
US.
1) Today at least 75% of all jobs involve some level of computer use.
2) The USA discards 30 million computers each year.
3) 100 million phones are disposed of in Europe each year.
4) The Environmental Protection Agency estimates that only 15-20% of e-waste is
recycled, the rest of these electronics go directly into landfills and incinerators.
5) Our society has developed technological dependence.
6) Psychologists define the excessive use of the Internet as Internet addiction
disorder.
WHILE-READING
Activity 9. Read the text and mark the following statements true (T), false (F) or not
given (NG):
1) Causes for committing cybercrime are connected only with money. ___
2) Internet addiction does not diminish social skills. ___
3) Nowadays over 80% of electronic waste is recycled. ___
4) Young people are exposed to loss of privacy more than adults. ___
5) Inappropriate use of computers may cause nervous diseases. ___
Activity 10. Revise your mind-map of the negative impacts of computers drawn for
Activity 1, breaking them into categories and subcategories.
POST-READING
Activity 12. Which of the computer-related problems above have you ever come
across? Share your experience with the group.
Activity 13. Hold a debate on the topic “I prefer a real/virtual friend” or “Computers
improve/deteriorate the level of education”.
PRE-READING
A
List the symptoms you might have as a computer addict. Visit the psychologist and
describe your symptoms. Ask for advice.
B
Think of the ways of fighting with computer addiction. Listen carefully to the
symptoms of the patient, and try to give the best advice.
2. Go Lightly. Physical forces continuously interact with our bodies. We may think
that only high-impact forces, such as car crashes, are likely to injure our bodies.
However, low-impact forces may also result in injuries, discomfort, and fatigue if
they are repeated or experienced over long periods of time.
3. Take Breaks. Taking breaks can help your body recover from any activity and
may help you avoid various disorders. The length and frequency of breaks that are
right for you depend on the type of work you are doing. Stopping the activity and
relaxing is one way to take a break, but there are other ways, also. For example, just
changing tasks - perhaps from sitting while typing to standing while talking on the
phone can help some muscles relax while others remain productive.
4. Be Healthy. A healthy lifestyle can help you perform and enjoy your everyday
activities, including the time spent at your computer. Also, learning more about your
health is an important step in staying comfortable and productive while using your
computer.
1. Take some time away from your daily computer routine to go shopping, get a
cup of coffee, or call an old friend. It's great to get out and see the world.
2. Place reasonable limits on computer usage. Nearly all activities are healthy in
moderation. Decide what a reasonable time is based upon your daily schedule.
3. Impose computer usage limits. Computer addiction starts by spending longer than
originally intended on the computer. Soon enough, a few extra minutes on the
computer transforms to a few extra hours.
4. Consider why you are using the computer if your usage becomes excessive.
Boredom, anxiety, and depression are common reasons to overuse the computer.
Work through these emotions if this is true in your case.
5. Seek assistance as soon as you realize that you are unable to properly control
your computer usage. Early intervention can prevent a serious addiction from
developing.
6. Finally, take a moment to realize that a few short years ago, only a small
fraction of people even had computers and we all lived very well without them.
Technology is a wonderful thing to be sure, and it often helps us make our daily lives
easier, but it can be very addictive and we often forget that it is life that is important,
not the things we own.
1. Contact your local and state governments. Find out what your city, county and
state have to offer in terms of electronics recycling programs. Some cities and
counties have hazardous waste trash pick-up days where they will either pick up, or
you can bring to them, any hazardous waste you have collected.
2. Contact the manufacturer of the equipment you no longer need and ask if it has
a take-back or buy-back program. Major electronics retailers are now, in most cases,
accepting most types of e-waste and technology trash, including old computers, cell
phones and music players.
3. Donate your used electronic equipment to businesses that refurbish them for
charities, non-profits, schools and thrift stores.
VOCABULARY FOCUS
Activity 2. Scan the text and find a word in the text which means:
1) extreme tiredness (Part I)
2) to harm or impair (Part I)
3) to force to be done (Part II)
4) dangerous (Part III)
5) to renovate or redecorate (Part III)
GRAMMAR FOCUS
Activity 5. Choose the appropriate verb:
1) Scientists are planning to invent/inventing a “healthy” computer.
2) Children enjoy to play/playing computer games 24 hours a day.
3) Environmentalists suggest to recycle/recycling e-waste.
4) Parents all over the world hope to get/getting rid of computers one day.
5) Avoid to sit/sitting on the computer for unnecessary reasons.
Activity 6. Convert the following sentences into indirect speech using the following
model: The teacher/mother/my boss/my friend advised, begged, offered, ordered,
suggested…
1) Do these exercises in writing.
2) Contact your local government to get information about e-waste recycling.
3) Let’s take a two-minute break every twenty minutes.
4) Don’t click on this icon! You will delete everything!
5) Please, don’t spend too much time at your laptop!
Activity 7. Think about your latest problem with a computer. Ask your partner for
advice. Listen to your partner’s problem. Help him/her with advice using the
Imperative Mood.
WHILE-READING
Activity 10. Say what the following is an appropriate measure against (measure VS
effect):
1) Taking a break
2) Imposing computer usage limits
3) Positioning yourself in a right way
4) Seeking for assistance
5) Contacting the manufacturer
6) Contacting the government
7) Donating your equipment to different organizations
POST-READING
Activity 14. Group contest: in groups of 3 brainstorm the possible solutions for such
computer-related problems as loss of privacy, technological dependence, cybercrime,
“attention deficit”, etc. Present your ideas to your groupmates.
Activity 17. Which of these recommendations do you follow/are you going to follow?
MODULE 2. GLOBAL FOCUS
TARGET VOCABULARY
Term Definition
Agent (of change) driving force; sb or sth that act as an ~; cleaning/
(n) causes sth to happen oxidizing ~; agency (n):
by/through the ~ of sb/sth
Backward (adj) retarded in physical, material, or technologically ~; a ~
intellectual development; country; backwards (adv);
conservative or reactionary ant. forward, advanced
Balance (n, v) a state of equilibrium; harmony ~ of power/mind;
in the parts of a whole maintain/lose/upset the ~;
balanced (adj): a ~
decision/diet;
ant. disbalance
Bandwidth (n) the range of frequencies within a 10MHz ~; have wide
given waveband used for a (enough) ~; handle a ~ of
particular transmission 450 MHz; reduce/amplify
~; potential/narrow/
continuous/networking ~
Brain drain (n) the emigration of scientists, cause/halt/be hit by a ~;
technologists, academics, etc., steady ~;
for better pay, equipment, or ant. brawn drain
conditions
Brawn (n) physical strength as opposed to ~ drain; brawny (adj): a ~
mental skill and intelligence man
Bring about (v) cause to happen (a change) ~ reforms/changes;
syn. result in
Term Definition
Carry out (v) perform or cause to be ~ a transaction/plan
implemented; to bring to
completion; accomplish
Commodity (n) an article, product or material the ~ market/price; trade in
that is bought and sold ~ies; basic/household/food
~ies
Complete (v, adj) make whole or perfect; fulfill; to ~ sth (exercises, tests)
finish sth online; completely (adv);
completion (n),
completeness (n)
Converge (v) (of two or more things) to move convergent (adj) :
towards and meet at the same ~ opinions/ views;
place; become similar or the convergence (n);
same ant. divergence/divergent
Diffuse (v) spread through a large area or a ~ through; diffusion (n): ~
large group of people of information/power/
wealth; diffused (adj): ~
sunlight/gas/liquid
Digital (adj) representing data as a series of ~ divide/age/epoch/
numerical values technologies; digit (n);
digitalization (v)
Disparity (n) inequality or difference, as in a big/marked/great/wide ~
age, rank, wages, etc. in/between sth; ~ in age; ~
between countries
Dispense (v) distribute; give out or issue in ~ money/free health care; ~
portions with/sth (manage without
sth): ~ with the formalities;
dispenser (n); dispensable
(adj): not necessary
Term Definition
Display (v) show or make visible (data ~ documents/courage/
strength/ goods; display
(n): window ~; be on ~
Diverse (adj) very different from each other diversify (v): ~ into;
diversity (n): ~ of opinions,
bio~; diversification (n);
syn. variety
Drive (v) push, propel, or be pushed or ~ to work; ~ into/along/at;
propelled; to compel or urge to be driven by sth; ~ it home
work or act, esp excessively to sb; a ~-in café; a strong
drive
Empower (v) expand sb's rights and ~ sb to do sth;
possibilities by delegation of empowerment (n);
authorities; empowerment empowering (adj)
Enroll (v) become or cause to become a ~ online; ~ sb in/on/as sth;
member; enlist; register through enrolment (n); enrollee (n)
the Internet
Facilitate (v) make easier; assist the progress facilitation (n), facilitator
of (n): act as a ~
Fiber optic cable a means of transmitting analog lay a ~; splice/connect a ~;
(n) or digital info using light signals travel through/by a ~
over a thin transparent filament
made of glass
Flat world basis on which the world gets be based on a ~
platform (n) flat or globalized
Face (v) meet or be confronted by (a ~ sb/work/the facts/the
person, difficulties) truth/losses
Term Definition
Gap (n) a divergence or difference; close/bridge a ~ : remedy a
disparity deficiency
Go global (v) expand into, enter the companies/ideas/products ~
international market
Implement (v) carry out; put into action; ~ a program/reforms/a plan;
perform (a plan, program) implementation (n);
Multinational a large business company ~ company
(adj) operating in several countries
Maturation (n) the process of fully growing or mature (adj); maturity (n)
developing
Occur (v) happen; take place; come about occurrence (n): a happening
event
Outdated (adj) old-fashioned or obsolete ~ practices/equipment;
ant. up-to-date
Perform (v) carry out or do (an action, ~ sb’s request; performance
operations); to fulfill or comply (n): ~ benchmarks;
with performer (n): high ~
Shrink (v) become smaller in size ~ to size medium/small/
tiny; shrinkage (n)
Standard of living a level of subsistence or material high/low ~; raise/lower ~;
(n) welfare of a community, class, go up/down (about ~)
or person
Vary (v) undergo or cause to undergo ~ in sth; ~ to some degree;
change, in appearance, character, variety (n); variant (n);
form, attribute, etc. variable (adj); syn.
assortment;
Term Definition
Verify (v) prove to be true ~ statements/facts/
allegations/figures;
verification (n);
syn. confirm, substantiate
Work flow computer programs enabling develop/launch/introduce ~
software (n) people all over the world to
collaborate on that same digital
content from anywhere
blogs.learnowonline.com
PRE-READING
Activity 1. Look at the title above and predict what the article may be about.
We are now living in what some people call the digital age, meaning that computers have
become an essential part of our lives. Young people who have grown up with PCs and
mobile phones are often called the digital generation. Computers help students to perform
mathematical operations and improve their maths skills. They are used to access the
Internet, to do basic research and to communicate with other students around the world.
Teachers use projectors and interactive whiteboards to give presentations and teach sciences,
history or language courses. PCs are also used for administrative purposes - schools use word
processors to write letters, and databases to keep records of students and teachers. A school
website allows teachers to publish exercises for students to complete online.
Students can also enroll for courses via the website and parents can download official
reports. Mobiles let you make voice calls, send texts, email people and download logos,
ringtones or games. With a built-in camera you can send pictures and make video calls in
the face-to-face mode. New smartphones combine a telephone with web access, video, a
games console, an MP3 player, a personal digital assistant (PDA) and a GPS navigation
system, all in one.
In banks, computers store information about the money held by each customer and
enable staff to access large databases and to carry out financial transactions at high
speed. They also control the cashpoints, or ATMs (automatic teller machines), which
dispense money to customers by the use of a PIN-protected card. People use a Chip and
PIN card to pay for goods and services. Instead of using a signature to verify payments,
customers are asked to enter a four-digit personal identification number (PIN), the
same number used at cashpoints; this system makes transactions more secure. With
online I-banking, clients can easily pay bills and transfer money from the comfort of
their homes.
Airline pilots use computers to help them control the plane. For example, monitors
display data about fuel consumption and weather conditions. In airport control towers,
computers are used to manage radar systems and regulate air traffic. On the ground,
airlines are connected to travel agencies by computer. Travel agents use computers to find
out about the availability of flights, prices, times, stopovers and many other details.
VOCABULARY FOCUS
Activity 3. Make collocations, combining words from column 1 with those on column
2:
1. give a. calls
2. keep b. a text
3. access c. databases
4. enter d. presentations
5. transfer e. research
6. make f. money
7. do g. records
8. send h. a PIN
GRAMMAR FOCUS
Activity 4. Choose all nouns from the text used with a) zero article b) definite article
c) indefinite article. Explain their use.
Activity 5. Insert the missing articles, if necessary:
1) With ____ built-in camera you can send _____ pictures and make _____ video calls in
_____ face-to-face mode.
2) They also control _____ cashpoints, or ATMs (automatic teller machines), which
dispense ___ money to _____ customers by _____ use of _____ PIN-protected card..
3) Instead of using _____ signature to verify _____ payments, _____ customers are asked to
enter ____ four-digit personal identification number (PIN), _____ same number used at
____ cashpoints.
4) ____ new smartphones combine _____ telephone with ____ web access, ____ video,
____ games console, ____ MP3 player, _____ personal digital assistant (PDA) and _____
GPS navigation system, all in one.
5) With ____ online I-banking, ____ clients can easily pay ___ bills and transfer ____
money from ____ comfort of their homes.
WHILE-READING
POST-READING
Activity 10. Describe the range of things you can do digitally with the help of your
mobile phone, PDA, I-phone, smartphone, games console, PDA, MP3 player, GPS
navigation system, etc.
Activity 1. What do you know about globalization? Share with your group.
There have been three great eras of globalization. The first lasted from 1492 - when
Columbus set sail, opening trade between the Old World and the New World – until
around 1800. I would call this era Globalization 1.0. It shrank the world from a size
large to a size medium. Globalization 1.0 was about countries and muscles. That is, in
Globalization 1.0, the key agent of change, the dynamic force driving the process of
global integration, was how much brawn - how much muscle, how much horsepower,
wind power, or, later, steam power- your country had and how creatively you could
deploy it. In this era, countries and governments (often inspired by religion or
imperialism or a combination of both) led the way in breaking down walls and
knitting the world together, driving global integration. In Globalization 1.0, the
primary questions were: Where does my country fit into global competition and
opportunities? How can I go global and collaborate with others through my country?
The second great era, Globalization 2.0, lasted roughly from 1800 to 2000,
interrupted by the Great Depression and World Wars I and II. This era shrank the
world from a size medium to a size small. In Globalization 2.0, the key agent of
change, the dynamic force driving global integration, was multinational companies.
These multinationals went global for markets and labor, spearheaded first by the
expansion of the Dutch and English joint-stock companies and the Industrial
Revolution. In the first half of this era, global integration was powered by falling
transportation costs, thanks to the steam engine and the railroad, and in the second
half by falling telecommunication costs – thanks to the diffusion of the telegraph,
telephones, the PC, satellites, fiber-optic cable and the early version of the World
Wide Web. It was during this era that we really saw the birth and maturation of a
global economy, in the sense that there was enough movement of goods and
information from continent to continent for there to be a global market, with global
arbitrage in products and labor.
Right around the year 2000 we entered a whole new era: Globalization 3.0.
Globalization 3.0 is shrinking the world from a size small to a size tiny and flattening
the playing field at the same time. And while the dynamic force of Globalization 1.0
was countries globalizing and the dynamic force in Globalization 2.0 was companies
globalizing, the dynamic force in Globalization 3.0 is the newfound power for
individuals to collaborate and compete globally. And the phenomenon that is
enabling, empowering individuals and small groups to go global so easily and so
smoothly is what I call the flat-world platform. Just a hint: The flat-world platform is
the product of a convergence of the personal computer (which allowed every
individual suddenly to become the author of his or her own content in digital form)
with fiber-optic cable (which suddenly allowed all those individuals to access more
and more digital content around the world for next to nothing) with the rise of work
flow software.
But Globalization 3.0 differs from the previous eras not only in how it is shrinking
and flattening the world and in how it is empowering individuals. It also is different in
that Globalization 1.0 and 2.0 were driven primarily by European and American
individuals and businesses. Even though China actually had the biggest economy in
the world in the eighteenth century, it was Western countries, companies, and
explorers who were doing most of the globalizing and shaping of the system. But
going forward, this will be less and less true. Because it is flattening and shrinking the
world, Globalization 3.0 is going to be more and more driven not only by individuals
but also by a much more diverse - non-western, non-white-group of individuals.
Individuals from every corner of the flat world are being empowered. Globalization
3.0 makes it possible for so many more people to plug in and play, and you are going
to see every color of the human rainbow take part.
VOCABULARY FOCUS
word synonym/antonym
1. shrink
2. brawn
3. diverse
4. deploy
5. maturation
6. empower
GRAMMAR FOCUS
WHILE-READING
Activity 6. Read the text and watch the video. Mark the following features as
characteristic of a certain globalization stage (G1.0, G2.0, G 3.0):
1) ____ shrank the world from size small to size tiny.
2) ____ shrank the world from size large to size medium.
3) ____ shrank the world from size medium to size small.
4) ____ was driven by multinational companies.
5) ____ was driven by individuals.
6) ____ was driven by countries and governments.
7) ____ was powered by falling transportation and telecommunication costs.
8) ____ equalized people of different races.
9) ____ appeared thanks to fibre-optic cable, satellites, and so on.
POST-READING
Activity 9. Explain why they are called like computer programs (1.0, 2.0, 3.0).
Activity 10. Summarize the text using the table in Activity 5 and completing the
sentence: The text highlights … in terms of their…
Activity 11. What do you think of the author’s approach to globalization? Do you
agree with it? Why/not?
Activity 12. Do you think there will be Globalization 4.0 stage? Why/not? If yes, how
do you picture it? Characterize it in terms of time, scale, etc. filling in the table below.
PRE-READING
Activity 1. What are the threats of IT development? Make a list and present it to the
class. Then read the text and add to your list.
The term "digital divide" is relatively new. It came into the regular usage in the mid-
1990s. The term was first used by the UN ICT Task Force, created after the 2003
Summit in Geneva (Camacho, 2006). Digital divide means the difference in access to
ICTs between developed and developing countries as well as difference in access
inside each country between different groups according to social status, education,
age, race, language and gender (Wikipedia, 2008). This term implies disparity in
access to technology, in resources and skills needed to use the latest achievements in
IT.
3) Digital divide can also become a cause of conflicts and military interventions. On
the one hand, the accumulation of information in some countries can lead to creation
of information corporations. On the other hand, other countries won’t have any
information. And it can bring about conflicts and military interventions.
4) Because of the high cost of connection facilities the cost of information products
and services will significantly vary in different regions. So, the same products and
services will be cheap in the developed countries and expensive in the developing
countries. With the time, the flow of cheap commodities will be concentrated in one
part of the world, and consumers who are isolated from this commodity will be
concentrated in another part of the world. It can also lead to economic disbalance
(Global Strategy Forum, 2007).
Kazakhstan is also facing the problem of digital divide, especially between the urban
and rural population characterized by uneven distribution of telecommunications
infrastructure. Most of the rural areas of Kazakhstan are technologically backward.
People who live in the province face many difficulties which hinder their
development. “The lack of infrastructure, energy grids, international bandwidth, and
the high costs of access and equipment are the main constraints to providing
international communication technology to the rural masses, and even to some urban
centers. In addition to this basic lack of physical infrastructure, the limited human and
institutional capacity, outdated or weak regulatory frameworks are common to most
parts of the peripherilized territories.
Furthermore, rural economic sectors, small and medium scale industries have not
been properly connected to the national and regional chains of production and
services, and thereby into the global economic system” (Neville, 2003).
In order to improve the situation, Kazakhstani government has been taking some
measures, like the Program for Bridging Digital Divide in the Republic of
Kazakhstan. This program was adopted by Resolution of the Government of the
Republic of Kazakhstan in October, 2007. The program’s goals are bridging digital
divide in the Republic of Kazakhstan, achieving 20% computer literacy of citizens
and Internet users, enhancing the value of information resources for citizens' everyday
life.
This program has yielded positive results. Within two years of the Program
implementation about 2 million citizens were trained, tested and certified, in
collaboration with the government agencies, 8 information portals aimed at
promoting ICT adoption were created, a Distance Learning Center was established,
80 certified e-courses on IT and Management were laid out on the DLC portal in
Kazakh and Russian languages (Electronic Government, 2009).
So, it may be concluded that Kazakhstan is actively bridging the Digital Divide. But
judging by the figures, there is a lot more to be done in this direction.
VOCABULARY FOCUS
Word Collocation
1) digital A solve, raise, pose, encounter
2) access B lifecycle, line, activation, advertising, awareness, brand,
certification, database, design, image, innovation
3) lack of C facilities, computers, the Internet
4) development D ICT, the Internet; permit, deny, certify, restrict
(of)
5) product E education, technology, authority, balance, control, data,
energy, experience, memory, skilled labour
6) problem F cost, model, plan, strategy, platform, rate, software, system
7) connect G divide, age, generation, technology, camera, signature, PDA
GRAMMAR FOCUS
Activity 5. Identify the italicized –ed verb forms as a part of the predicate (P) or an
attribute (A):
1) The term was first used by the UN ICT Task Force, created after the 2003 Summit
in Geneva.
2) Digital divide means the difference in access to ICTs between developed and
developing countries.
3) All above mentioned can lead to a digital divide.
4) Countries with developed information technologies will acquire new values and
lose old ones.
5) Consumers who are isolated from this commodity will be concentrated in another
part of the world.
6) Kazakhstan is also facing the problem of digital divide, especially between the
urban and rural population characterized by uneven distribution of
telecommunications infrastructure.
7) The limited human and institutional capacity, outdated or weak regulatory
frameworks are common to most parts of the peripherilized territories.
8) This program has yielded positive results.
9) There were created 8 information portals aimed at promoting ICT adoption.
WHILE-READING
Activity 8. Fill in the table with the information from the text on the digital divide
causes, consequences and solutions. Add your own ideas.
POST-READING
Activity 10. Think of some possible consequences of not bridging the digital divide in
our country.
Activity 11. Group competition. Suggest some ideas to bridge the digital divide in
Kazakhstan. Vote for the group with the best suggestions.
Activity 12. Watch the video “What does the digital divide mean to you?”
(http://www.youtube.com/watch?
v=fCIB_vXUptY&playnext=1&list=PL6200B4A32A12F8A8&feature=results_main)
and answer the following questions:
1) What do people need to get online?
2) How many Americans do not have access to the Internet?
3) What are the major factors which affect the Internet connection figures in the US?
4) How would a 1% increase in broadband capacity affect the labor market?
5) What for do Americans need Internet access for?
MODULE 3. LEGAL FOCUS
TARGET VOCABULARY
www.itp.net
PRE-READING
Malicious program is a general term for any computer program that is designed to
harm its victim(s). Malware (malicious software) is software created to damage or
alter the computer data or its operations. These are the main types of malware:
People often confuse viruses and worms. Some confusion about the distinction
between a virus and a worm is caused by two distinctly different criteria:
1. a virus infects an executable file, while a worm is a stand-alone program.
2. a virus requires human action to propagate (e.g., running an infected program,
booting from a disk that has infected boot sectors) even if the human action is
inadvertent, while a worm propagates automatically.
Trojan horses are malicious programs disguised as innocent-looking files or
embedded within legitimate software. Once they are activated, they may affect
the computer in a variety of ways: some are just annoying, others are more
ominous, creating a backdoor to the computer which can be used to steal data.
They don't copy themselves or reproduce by infecting other files.
Spyware, software designed to collect information from computers for
commercial or criminal purposes, is another example of malicious software. It
usually comes hidden in fake freeware or shareware applications downloadable
from the Internet.
Due to its anonymity, the Internet provides the right environment for
cyberstalking, online harassment (sending threatening email messages and
slandering people) or abuse, mainly in chat rooms. False accusations and transmission
of threats fall under the class of cyberstalking activities.
There is a large number of ways that can be used to protect your computer from
all these threats:
Use strong passwords (at least eight characters long).
Don't open email attachments from unknown people; always take note of the file
extension.
Run and update antivirus programs, e.g. virus scanners.
Install a firewall, a program designed to prevent spyware from gaining access to
the internal network.
Make backup copies of your files regularly.
Stay away from untrusted networks.
Use a digital certificate, an electronic way of proving your identity, when you are
doing business on the Internet. Avoid giving credit card numbers.
Don't believe everything you read on the Net. Have a suspicious attitude toward
its contents.
VOCABULARY FOCUS
Activity 4. Form collocations from columns 1 and 2, and find their definitions in
column 3:
1 2 3
1. secure a. a malicious program 1. to avoid security measures by
going around them, for example
in a clever or illegal way
2. launch b. a network 2. to stop a website from
working
3. propagate c. a virus 3. to produce and spread copies
of a virus
4. bypass d. a website 4. to make a network safe from
viruses, hackers, etc.
5. crash e. security measures 5. to start a program which is
intended to cause damage
GRAMMAR FOCUS
Il In Un
WHILE READING
Activity 8. Read the text and mark the statements true (T), false (F) or not given (NG):
1) The text focuses on significant increase in the number of data-stealing attacks. ___
2) There is no difference between viruses and worms. ___
3) Phishing refers to cyberstalking activities. ___
4) Harassment is the behavior intended to trouble or annoy someone. ___
5) Worm neither deletes nor changes files on the victim's computer. ___
6) Viruses, worms and Trojan horses constitute one group. ___
Activity 9. Which computer crimes are the following characteristics associated with:
Activity 12. What computer crime above does each advice refer to?
a) Don’t buy cracked software or download music illegally from the Internet.
b) Be suspicious of wonderful offers. Don't buy if you aren't sure.
c) Don’t give personal information to people you contact in chat rooms.
d) Don’t open the attachments from people you don't know even they look
attractive.
e) Scan your email and be careful about which websites you visit.
f) Check with your bank before sending information.
POST-READING
Activity 13. Fill in the gaps in the graph below and speak on each item.
Computer _____
Activity 16. Watch the video “Computer Viruses and Threats Explained -
TechnoGeeks” (http://www.youtube.com/watch?v=t0M55k8Trq4) and explain the
diffrences between viruses, worms and Trojan Horses.
TEXT 2. INFORMATION SECURITY
Compiled by A. Sholakhova
(https://www.lclark.edu/information_technology/security/awareness/tips/)
www.netrate.com
PRE-READING
The confidentiality, availability and the integrity of the data is the most important
aspect of the computer security. No security system is foolproof, but taking basic and
practical steps to protect data is critical for good information security. There is a large
number of techniques that can be used to protect your computer from all the threats
such as passwords for access control, encryption and decryption systems, firewalls,
special protocols, antivirus software, and so on.
Password is a secret word or phrase that gives a user access to a particular program or
system. It provides the first line of defense against unauthorized access to your
computer. To make access as secure as possible, users should create strong passwords
that use a mix of upper and lowercase letters, numbers, and symbols, and avoid easily
guessed combinations such as dates of birth or family names.
Encoding data or encryption, one of the oldest ways of securing written information,
is the conversion of data into a form, called a ciphertext, which cannot be easily
understood by unauthorized people. Today's encryption systems are similar to
military code systems but not as sophisticated as such systems. Decryption, on the
contrary, is the process of converting encrypted data back into its original form, so it
can be understood.
Firewalls filter the information that passes through them, only allowing authorized
content in. Together with an antivirus package, firewalls significantly increase
information security by reducing the chance that a hacker will gain access to private
data. Without a firewall, secure data is more vulnerable to attack.
Cookie is a file, which is stored on the user's hard drive and allows the user to
distinguish a web page from others. Cookies are mostly used by e-commerce websites
where they store the user's preferences (such as options that have been previously
selected) so that the user does not have to select them the next time he visits. If one of
the intermediary computers is infiltrated by hackers, data can be copied through
cookies. To avoid risks, it is necessary to disable or delete them.
The security protocol called Secure Sockets Layer (SSL) is today’s de facto standard
for securing communications and transactions across the Internet especially in today’s
e-commerce and e-business activities on the Web. It uses digital certificates which are
electronic files used to identify people and resources over networks such as the
Internet. Data transmitted over an SSL connection cannot be tampered with or forged
without the two parties becoming immediately aware of the tampering.
Antivirus software is designed to deal with modern malware including viruses,
Trojans, worms and etc. Using strong antivirus software is one of the best ways of
improving information security. Antivirus programs scan the system to check for any
known malicious software, and most will warn the user if he or she is on a webpage
that contains a potential virus. Even the best antivirus programs usually need to be
updated regularly to keep up with the new malware.
The above measures prevent unauthorized users (also known as "intruders") from
accessing any part of your computer system.
VOCABULARY FOCUS
Activity 3. Match the words in list A with their synonyms or antonyms in list B:
List A: 1. party; 2. encryption; 3. vulnerable; 4. defense; 5. internal; 6. hacker; 7.
secure; 8. tamper
List B: a. insecure; b. forge; c. decryption; d. foolproof; e. intruder; f. external; g.
entity; h. protection
Activity 4. Match the following methods of data protection with their definitions:
1. password a. a small file, which logs information about the user and
his previous/current visits for the use of the site next time
the user makes contact
2. encryption b. a computer system or program that automatically
prevents an unauthorized person from gaining access to
the Internet
3. decryption c. software used to safeguard a computer from malware
4. firewall d. the process of saving and transmitting data into a secret
code
5. cookie e. the electronic version of an ID card that establishes
your credentials and authenticates your connection when
performing e-commerce transactions over the Internet
6. digital certificate f. a secret word or expression used by authorized person
to prove his right to access
7. antivirus software g. process of converting encrypted data back into its
original form
GRAMMAR FOCUS
Activity 8. Fill in the gaps with against, into, to (2), with, from (2).
1) There are a lot of methods to protect your computer _____ cybercrimes.
2) Digital certificates are similar _____ an ID card.
3) Hackers try to gain an illegal or an unauthorized access _____ a computer system.
4) To convert encrypted data back _____ its original form means to decrypt it.
5) Someone tampered _____ IBM systems by planting a bug to wipe out whole data.
6) This toolkit is used as a defense _____ Trojan horses, worms, viruses and weak
passwords.
7) There is a large number of measures to prevent unauthorized users _____
accessing any part of the computer system.
WHILE READING
Activity 9. Read the text and mark the statements true (T), false (F) or not given (NG):
1) The text focuses on the ways of keeping up the data confidentiality, availability
and integrity. ___
2) Cookies are electronic files used to identify people and resources over networks
such as the Internet. ___
3) Encryption is a security feature offered by Mozilla Firefox. ___
4) Firewall prevents unauthorized access to a network. ___
5) Digital certificate is the electronic version of an ID card. ___
6) Firewall is the only way to filter the information. ___
Activity 10. Complete the computer protection tips:
1) Ensure that any computer you use to connect to a social networking site has proper
security measures in place, including _____ and _____ software.
2) Keep your operating system _____.
3) Protect your social networking account with a strong _____.
4) If you're sending confidential or business-critical information, _____ the email and
any files attached to it.
5) If you use online banking, make sure they use _____ ______.
POST-READING
blog.kaspersky.com
PRE-READING
Activity 1. What kind of computer threats for Internet users do you know? Mind map
your answers and present them to the class.
At the conference "Counter Terror Expo" in London Eugene Kaspersky, founder and
chief executive of Russian computer security firm Kaspersky Lab, described the five
most dangerous computer threats faced by Internet users.
Complete darkness
The first threat is cyber warfare – exactly what Stuxnet was about, which in 2010
attacked Iran's nuclear infrastructure. I am seriously worried about the future of our
world. This could one day happen on a much bigger scale. For example, entire
nations could be plunged into darkness if cyber-criminals decided to target power
plants. And there is nothing anyone could do about it. It is possible that a computer
worm doesn't find its exact victim – and since many power plants are designed in a
similar way and often use the same systems, all of them could be attacked, around the
world. If it happens, we would be taken 200 years back, to the pre-electricity era.
Mass conscience
The second cyber threat is the use of social networks to manipulate the masses.
During the Second World War airplanes were used to drop propaganda leaflets over
enemy territory – and the same is already happening with social networks. For
example, recently a similar incident occurred in China, where local blogs spread
information about the tanks and shooting in Beijing, which was in fact false. But if
such information is posted by someone of high authority and somewhere where
millions can read it, it may create panic.
Web kids
The third threat is the internet generation’s reluctance to engage in politics. Today's
children are growing up in a digital world, but at some point they will become adults
– and will have to vote. And if there's no online voting system, these kids won't
physically go anywhere to vote, they'll refuse. The whole democratic system could
collapse then – the gap between parents and children will get much wider, it will
become political, with solely the parents being involved in politics.
Hacking attacks
Cyber crime has been a real concern of any computer user for years. Recently the
threat has spread to smartphones and other mobile devices. Hacking mobile phones
has become a real business in Russia, Asia, and other places where pre-paid phone
calls are common. We estimate that criminals who target mobile phones earn from
$1,000 to $5,000 per day per person. They infect mobile phones with an SMS-Trojan
virus that sends short texts to a telephone number until the victim's account is
emptied. An average person won't have too much money on a phone account, but
when hundreds of thousands of phones get infected, it is a lot of money.
No privacy
The last major threat is infringement on privacy due to the development of social
networks and other similar services. Take for instance, the Google Street View, the
robots that move in the air and make photos, or numerous online companies that
require and divulge unnecessary personal information.
VOCABULARY FOCUS
GRAMMAR FOCUS
WHILE READING
4. _______ 5. ________
POST-READING
Activity 10. Which of the cyber threats above have you ever faced? Share your
experience with the group.
Activity 11. Complete the following list of measures against cyber threats with your
own examples:
1) taking the prevention measures;
2) raising the users’ awareness;
3) strengthening law enforcement;
4) facilitating the exchange of information and best practices.
Activity 12. Look at the statements and say if you agree or disagree with them. Give
reasons for you answer.
1) Loss of privacy on the Internet is unavoidable.
2) Complete elimination of cybercrime is possible.
3) An online voting system will increase the turnout rate.
4) Cybercrime will soon be too big to be ignored.
5) The world is getting more and more close to the Matrix scenario.
MODULE 4. TECHNOLOGICAL FOCUS
TARGET VOCABULARY
stmjournals.com
PRE-READING
By all accounts, nanotechnology – the science of making devices from single atoms
and molecules – is going to have a huge impact on both business and our daily lives.
Nano devices are measured in nanometers (one billionth of a metre) and are expected
to be used in the following areas.
• Nanocomputers: Chip makers will make tiny microprocessors with
nanotransistors, ranging from 60 to 5 nanometres in size.
• Nanomedicine: By 2020, scientists believe that nano-sized robots, or nanobots,
will be injected into the body's bloodstream to treat diseases at the cellular level.
• Nanomaterials: New materials will be made from carbon atoms in the form of
nanotubes, which are more flexible, resistant and durable than steel or aluminum.
They will be incorporated into all kinds of products, for example stain-resistant
coatings for clothes and scratch-resistant paints for cars.
Imagine you are about to take a holiday in Europe. You walk out to the garage and talk
to your car. Recognizing your voice, the car's doors unlock. On the way to the airport,
you stop at an ATM. A camera mounted on the bank machine looks you in the eye,
recognizes the pattern of your iris and allows you to withdraw cash from your account.
When you enter the airport, a hidden camera compares the digitized image of your
face to that of suspected criminals. At the immigration checkpoint, you swipe a card
and place your hand on a small metal surface. The geometry of your hand matches the
code on the card, and the gate opens. You're on your way.
Does it sound futuristic? Well, the future is here. Biometrics uses computer
technology to identify people based on physical characteristics such as fingerprints,
facial features, voice, iris and retina patterns.
In the ideal smart home, appliances and electronic devices work in sync to keep the
house secure. For example, when a regular alarm system senses that someone is
breaking into the house, it usually alerts the alarm company and then the police. A
smart home system would go further, turning on the lights in the home and then
sending a text message to the owner's phone. Motorola Homesight even sends images
captured by wireless cameras to phones and PCs. Smart homes can remember your
living patterns, so if you like to listen to some classical music when you come home
from work, your house can do that for you automatically. They will also know when
the house is empty and make sure all appliances are turned off. All home devices will
be interconnected over a home area network where phones, cable services, home
cinemas, touch screens, smart mirrors and even the refrigerator will cooperate to make
our lives more comfortable.
VOCABULARY FOCUS
Activity 3. Match the words to make collocations. Then make your own examples
with them:
1. replicate a. in size
2. recognize b. a card
3. range c. from trial and error
4. build d. the pattern
5. be incorporated e. into environment
6. learn f. an android
7. swipe g. the ability
8. be embedded h. into products
Activity 6. Complete the sentences, using Future Perfect following the given example:
By this time in 10 years nanomedicine… will have cured cancer
1) By the time you come from work, your smart home _____.
2) By the time you retire robots_____.
3) By the middle of the XXI century all the clothes _____.
4) Within the 20 years ubiquitous devices _____.
5) I hope that by the time they finish school our grandchildren _____.
WHILE-READING
Activity 9. Fill in the table with computer trends and their applications:
Trend Applications
Nanotechnology
POST-READING
Activity 11. Identify the topic of the text and formulate its main idea. Summarize the
text.
Activity 12. Complete the table in Activity 6 with other trends that you know. Present
your ideas to class.
Activity 13. Hold a debate on the following resolution: “Due to advances in science
and technology there is no better time to be alive than now”.
TEXT 2. QUANTUM COMPUTERS
(http://www.futuretechnology500.com/index.php/future-computers/)
networksandservers.blogspot.com
PRE-READING
Activity 1. Read the following definitions of quantum: ”a unit used for measuring very
small amounts of energy”, or “the smallest amount of a physical quantity that can
exist independently, especially a discrete quantity of electromagnetic radiation” and
say what you know about its application in science and technology.
But, this can go on only so long before a new technology steps in. The future
quantum computers that are not based upon digital 1’s and 0’s are coming. Instead
these future computers are based upon qubits (quantum bits). The power of magnetic
forces at a subatomic scale will unleash the exponential power of future computers.
In today’s world, disabled people are being trained to work with computers using
only their minds. When DARPA meets Sony and the brain-computer barriers come
tumbling down, everyone will be able to command computers, robots, bionics and
other quantum based electronics using only our minds. Future computers will interact
with us on a neural level.
With the help of the qubit and the qubyte that can process 0’s and 1’s simultaneously
in a process known as superposition, processing power will increase exponentially.
Today’s gigaflops will be replaced by tomorrow’s teraflops, petaflops, exaflops all
the way to lumaflops and beyond to words that haven’t even been created yet.
Future computers will allow us to communicate with others from a distance just by
thinking. Researchers at IBM, UC Santa Barbara, Yale, Sony and many other
companies are working on this now. Did I also mention DARPA is working on this?
Now, this may be scary for some people to know that the military is working on the
next generation of future computers which could cause a doomsday scenario among
the Super Powers. Or that countries that are not currently Super Powers could become
ones by developing quantum computers for the military that become the bullies of the
world.
But, there is a more likely scenario. And this scenario is that with the advent of future
computers the world will become a more democratic place. We are already seeing the
revolts in the Middle East and Far East because of the Internet and Social Media.
As communication lines are opened up and data is spread fast, the barriers between
upper class and lower and middle classes start falling. Dictators who restrict
communications cannot stop future technology from rising and people across the
world from using new technology.
VOCABULARY FOCUS
Activity 3. Match the words to make collocations. Make your own examples with
them:
1. become a. on a neural level
2. shrink b. a doomsday scenario
3. interact c. mainstream
4. settle d. coups and revolts
5. cause e. the size of chips
Activity 7. Put the verb into correct Future Tense, active or passive:
1. Quantum computers _____ (utilize) power of magnetic forces at a subatomic scale.
2. Future computers _____ (base) upon qubits.
3. They _____ (give) enough computational power to pull off true artificial
intelligence.
4. 0’s and 1’s _____ (process) simultaneously in a process known as superposition.
5. In the future the Super Powers _____ (endanger) by the next generation of
computers.
WHILE-READING
Activity 8. Read the text and mark the statements true (T), false (F) or not given (NG):
1. Computers of the future will differ from modern ones mainly in size. ___
2. New computers will be developed on the basis of Artificial Intelligence. ___
3. Quantum computers will be comparatively inexpensive. ___
4. The author is pessimistic about the future scenario for mankind development. ___
5. Superposition is the ability of computers to process 0’s and1’s at the same instant.
___
POST-READING
Activity 9. Watch the video “Michio Kaku: The Future of Quantum Computing”
Activity 11. In groups discuss how quantum computers will improve every sphere of
our life. Share your ideas with the class.
Activity 12. Hold a debate on the following resolution: “Quantum computers will
cause a doomsday scenario”.
learningmind.com
PRE-READING
Activity 1. Read the title of the text and dis/agree with it.
Computers have become an integral part of our life, and advances in Artificial
Intelligence (AI) are impressive. It is difficult to predict future progress, but if a
computer ever became about as good at programming computers as people are, then it
could program a copy of itself. This would lead to an exponential rise in intelligence
(now often referred to as the Singularity). And evolution suggests that a sufficiently
powerful AI would probably destroy humanity.
This process is exponential, just like a nuclear chain reaction. At first only small
improvements might be made, as the machine is only just capable of making
improvements at all. But as it became smarter it would become better and better at
becoming smarter. So it could move from being barely intelligent to hyper intelligent
in a very short period of time.
Man's intelligence is intimately tied to his physical body. The brain is very finite,
cannot be physically extended or copied, takes many years to develop and when it
dies the intelligence dies with it. On the other hand, an artificial intelligence is just
software. It can be trivially duplicated, copied to a more powerful computer, or
possibly a botnet of computers scattered over the web.
It could also adapt and absorb other intelligent software, making any concept of
"self" quite hazy. This means that its world view would be very different from man's,
and it is difficult to predict how it would behave.
There are many doom's day scenarios. Bio technologies, nano technologies, global
warming, nuclear annihilation. While these might be annoying, they are all within
our normal understanding and some of humanity is likely to survive. We also would
have at least some time to understand and react to most of them. But intelligence is
fundamental to our existence and its onset could be very fast. How do you argue with
a much more intelligent opponent?
VOCABULARY FOCUS
Activity 3. Match the words to make collocations. Make you examples with them:
1. integral a. rise
2. advances b. powerful
3. exponential c. in artificial intelligence
4. scatter d. over the web
5. sufficiently e. part
Down
1) a network of computers using distributed computing software
2) beginning, inception
3) obscure, vague
4) act of moving forward, improvement
6) constituting a whole
GRAMMAR FOCUS
WHILE-READING
Activity 7. Break the text into parts and entitle each part.
Activity 10. Identify the topic of the text and its main idea. Summarize the text.
Activity 11. Divide into the groups of 3. Each student reads a separate card with a
proposed safety measure to prevent the doomsday scenario. Share your info with the
group. Propose your solution of the problem and present it to class.
Card A
Dr Anthony Berglas proposes a moratorium on producing faster computers. Just
make it illegal to build the chips, and so starve any Artificial Intelligence of
computing power.
We have a precedent in the control of nuclear fuel. While far from perfect, we do
have strong controls on the availability of bomb making materials, and they could
be made stronger if the political will existed. It is relatively easy to make an atomic
bomb once one has enough plutonium or highly enriched uranium. But making the
fuel is much, much harder. That is why we are alive today.
Card B
Isaac Asimov’s Three Laws of Robotics are one of the earliest examples of proposed safety
measures for AI. The laws are intended to prevent artificially intelligent robots from
harming humans.
A robot may not injure a human being or, through inaction, allow a human being to
come to harm.
A robot must obey orders given to it by human beings except where such orders
would conflict with the First Law.
A robot must protect its own existence as long as such protection does not conflict
with the First or Second Law.
Later, Asimov added the Zeroth Law: "A robot may not harm humanity, or, by inaction,
allow humanity to come to harm"; the rest of the laws are modified sequentially to
acknowledge this.
Card C
Yudkowsky proposed an alternate solution, namely that it might be possible to
program a "Friendly" AI that will not hurt us. If the very first AI was friendly, then
it might be capable of preventing other unfriendly AIs from developing. The first
AI would have a head start on reprogramming itself, so no other AI would be able
to catch it, at least initially.
Activity 12. Hold a debate on the resolution: One day computers will be as intelligent
as humans.
Activity 13. Make your predictions for the following spheres of our life. Then read the
text and compare with your list:
How far will technology advance in 20, 30, even 50 years from now? How will it
affect our lives? Here are some technologies and scenarios predicted by science
fiction writers, futurists, technology experts, me and you.
Activity 14. Speak of the predictions you like best/least. Give reasons of your choice.
Activity 15. What would you like to be invented in your lifetime and why?
ATTACHMENTS
FORMS OF ADDRESS
When addressing people in English we usually call our friends by their first
name, for example, John or Mary. When speaking to someone whom we know
less well, we use Mr./ Mrs./ Miss followed by the surname.
Sir – used to a man who is clearly older and/or more senior than oneself.
It is also used:
by shop assistants, waiters, etc. to their male customers; by schoolchildren to
men-teachers;
as a polite form of address to a stranger, even if not older or more senior.
However, this is not common in Britain, where the usual way of addressing a
stranger is Excuse me, please.
d) Madam – used by shop assistants, waiters, etc. to their female customers. It
is not used when addressing women-teachers (here Mrs./ Miss with surname is
used), nor when addressing an older or more senior woman. It is only rarely
used to address a stranger, "Excuse me, please" being the usual form.
e) Doctor – used alone only to medical practitioners. When addressing a person
with the degree the surname is always included, for example, Dr. Brown.
f) Professor – used either with or without the surname, depending on how
formal or informal one wishes to be. (Simply Professor is more formal.)
General/Colonel/Captain, etc. – also used wither with or without the surname.
Ladies and Gentlemen – to an audience
With waiters, porters, people simply try to catch their eye, for example, or say
Excuse me, (please).
Officer – to a policeman, but most people approaching a policeman for
information or help use Excuse me, (please), without any form of address.
Within the family: Mammy, Daddy, Granny (sometimes Gran or Nanny),
Grandad , Auntie and Uncle usually with the first name. Aunt is often used
instead of Auntie by older children and adults, particularly in formal situations.
ATTRACTING ATTENTION
The most common way of attracting attention is Excuse me, (please). Other
expressions used to attract attention in certain situations are:
May/Can I have your attention, please? – used to attract the attention of a group of
people who are talking among themselves to make an announcement, etc.
Attention, please. – used to introduce official announcements, especially over a
loudspeaker.
I say. – sometimes used in conversation to draw particular attention to the sentence
which follows. Addressed more often to groups of people than individuals.
Look here! - used to attract someone’s attention to something of which you disapprove.
Often indignant.
Just a minute. – used to someone who is going away before you think he should (you
still have something to tell him) or to stop someone in the middle of what he is saying
in order to voice an objection.
Hey! – used wither to express indignation or to warn someone quickly of some danger.
If used simply to attract attention it is rude, or at least familiar.
Look/watch out! – to warn someone of danger.
Mind …! – meaning "be careful (of)"
Comments about the weather, especially with a question tag, can also be a convenient
way of starting a conversation.
When you already know someone, the following formal greetings should be used:
Good morning – until lunch time (12-2 p.m.), Good afternoon – until 5-6 p.m., Good
evening – until 10-11 p.m.
Remember about the difference in tone. For formal greeting, we use the low fall. For
less formal and warmer greeting we use the low rise. The most friendly tone for
greeting is the fall – rise.
Note: Good night is not a greeting but a wish. Good day is hardly ever used nowadays,
either as a greeting or on parting.
Morning/Afternoon/Evening – semi-formal. Used, for example, to neighbours,
colleagues and other people whom one sees regularly but does not know well.
Hello – semi-formal, informal
Hi – informal, used mainly in America. The name of the person greeted is often added.
However, no form of address is generally used when greeting groups of people. Such
forms as Good morning, all and Hello, everybody occur but are rare and not to be
recommended.
Greetings are often followed by an inquiry about the other person’s health. The
answer may be:
(I’m) very/fairly/quite/well, thank you – formal, semi-formal
Note that quite and fairly are synonymous here, but quite is now more common.
Fine, thanks! Not too/so bad (thank you/ thanks), All right, thank you/thanks semi-
formal, formal
OK, thanks – informal, familiar. A bit tired, otherwise all right – semi-formal, formal
Avoid saying simply Thank you or Thanks in this situation. These replies are usually
followed by an inquiry about the other person’s health. The most common forms are:
And how are you? And you? - logical stress on you
These inquiries are answered in the same way as the first one.
If the answer to an inquiry about someone’s health is unfavorable, I’m afraid (meaning
unfortunately) is often used, for example:
Not very/ too well, I’m afraid. I am afraid I am not feeling very/too well today.
Possible reactions to such replies are:
Oh, dear. I am sorry to hear that.
If you know someone fairly well (or at least if he is more than an acquaintance), you
may ask a more general question, such as:
How are you getting on? How are things (with you)? – semi-formal How’s life? –
informal
If you want to express pleasure at seeing someone, for example, when you welcoming
a guest, you may say: Hello, nice to see you. A common reply to this is: Nice to see
you, too. (With stress on both you and too.)
LEAVE-TAKING
When you want to take your leave of someone use some introductory phrase such as:
(Well,) I must be going (now). I’m afraid I must be going (now). It’s time I was
going/off.
I’d better be going. I must be off now.
When you actually leave, you may say:
Good-bye – formal, semi-formal (Good-) bye for now – semi-formal, informal
Bye (then). Bye now. Bye-bye. Cheerio – semi-formal, informal
See you – very colloquial. Used mainly by young people to their friends. This phrase
does not refer to a later meeting, in contrast to those, which follow.
See you later/tonight/tomorrow/on Saturday/next week, etc. See you at the
theatre/party, etc.
(I’ll) be seeing you. – this means simply some time in future.
The phrases All the best and Good luck are used only in certain circumstances. All the
best is appropriate when seeing a friend off for a long time or when leaving someone
who is going for interview (for a job, etc), or in some similar situation. Good luck may
also be used in the latter case or when someone is going to take an examination.
Good night – when leaving someone late in the evening or before going to bed.
Note: that Good morning/afternoon/evening are no longer used when taking one’s
leave.
Farewell – is now confined to poetry and is not longer used in conversation, even
when parting someone for ever. Good-bye is used.
The reply to Good-bye and the alternatives listed above is either the same or one of the
other expressions of the same degree of formality.
When someone has achieved something, or been fortunate in some way, we say:
Congratulations (on…) The answer is Thank you or Thanks (informal).
Well done – may also be used about an achievement.
Seasonal greetings include: Happy/ Merry Christmas! Happy New Year! Happy
Easter!
In reply the person greeted may either repeat the greeting or say Thank you, (and)
(the) same to you.
Note that congratulate and congratulations are not appropriate here. Note also that
there is no English greeting which can be used for any festival. The only way of
greeting someone on the occasion of a festival not celebrated in Britain (or at least not
wildly celebrated) is to use the word wishes, for example:
(Very) best wishes for…
My/our (very) best wishes for…
The usual birthday greetings are:
Many happy returns (of the day)!
Happy birthday! - more common, especially in informal situations
Congratulations may be used when someone comes of age (now at 18 in Britain) in
formal style. Otherwise it is practically never used as a birthday greeting nowadays.
The answer to all these is Thank you.
Have a good journey – to someone about to travel somewhere, but not usually when he
is going on holiday (Here is Have a good holiday is more usual.)
Good luck!The best of luck!
The person addressed replies Thank you or Thanks and may add I shall need it.
REQUESTS
Positive requests
When we want someone to do something, we may use the imperative with
please.
Please in initial position tends to be more emphatic. Note that there is no pause
(and no comma) after it. Nor is there a pause before please when is used in the
end of the sentence, in spite of the comma.
In many situations, however, the imperative with please is not considered polite
enough. Then we use one of the following phrases (said with a rising tone),
which are listed in order of increasing politeness (formality)
Will you… (please)?Would you… (please)? Could you … (please)? Do you
think you could…?
Would you mind ...ing? Will you be so kind as to…? – very formal.
Would you be so kind as to…? – very formal
The choice between the various alternatives given above depends on:
how large the request is or how well we know the person we ask. Thus the
same request may be formulated with different degrees of politeness.
When one has little hope of one’s request being granted, or at least wishes to
give this permission, one can use I don’t suppose.
B. Negative requests
If we want someone not to do something, we can say: Please don’t… Try not to
…
Would you mind not …ing? – more polite
May I…? – formal. Can I..? – semi-formal, informal. Could I…? – more polite
Could I possibly…? - emphasizes that one is asking a favour
Do you think I could…? I wonder if I could.. – tentative
Do you mind if I…? Is it all right if I..?Is it all right (for me) to…?
To grant permission the following forms are used:
(yes,) certainly. – formal
(yes,) of course. – semi-formal, informal
Go ahead. – informal
If you like. – often implies an element of reluctance
Not at all. – in reply to Do you mind…?
No, that’s all right – in reply to Do you mind…?
APOLOGIES
The basic form of apology is I’m sorry. However, there are several variations which
make the apology more or less emphatic.
I’m very sorry. I’m so sorry. I’m terribly/awfully/dreadfully sorry.- more emphatic
Sorry. – less emphatic, often casual. Only for relatively unimportant things.
When the person to whom we want to apologize does not yet know what has
happened, we often use I’m (very/so, etc) sorry but…I am afraid can be used instead of
I am sorry in this type of situation.
I’m afraid means unfortunately here and functions as an apology. Excuse me (for…) is
alternative here.
However, excuse me, alone (or with please) is usually either a way of indicating
politely that you want to pass, at the same time apologizing for any inconvenience you
may cause, or a way of attracting the attention of a person whose name you do not
know
I hope you don’t mind… – when one has done something without first asking
permission
In apologies the verb “apologize” may be used.
I apologize for… I must/ do apologize for formal
I beg your pardon. – formal. It is rarely used, mostly as a request for repetition.
Pardon. Sorry. – the most common form among educated people nowadays.
Pronounced with a high rise. If a specific request or explanation follows, I’m sorry
may be used.
SUGGESTIONS
If we disagree, our reply depends to a greater extent on the situation. Here are some
commonly used phrases:
I do not like…– only among friends (too abrupt for other situations)
I am not very keen on… I am not very fond of … – more tactful
I don’t feel like it (at the moment/just now). I am too tired.
I’m feeling rather tired (today/at the moment) – less abrupt
We haven’t got time. Have we got time? There is no point. I’d rather… I’d rather
not…
Let’s not bother. Don’t let’s bother.
APPOINTMENTS
Appointments are usually made over the telephone. After introducing yourself you can
say:
I would like (to make) an appointment with…
What time would be convenient for you/him?
I wonder whether you could see me now/on/at/before/about? – more tentative
In less formal situations you may say:
I’d like to see (talk to) you (some time) about…
What time would be convenient for you?
Will you be able to see me now/on/at/before/about?
Can you see me now/on/at/before/about?
If the person can meet you at suggested time he (or his secretary) will say:
Yes, that will be quite/very convenient. Yes, that will do very well. – formal, semi-
formal
Yes, I’m/he’s free then. – both formal and informal
Yes, that’ll be just fine. – informal
Searching for an alternative, you can suggest another time or ask the person to choose
the time:
What time would be convenient for you? Would… be more convenient? Would… suit
you better?
Could we make it… instead/then? – semi-formal, informal
How/what about… – informal
Is… any good? – informal
INVITATIONS
Acceptance:
(yes,) very much. (yes), I’d like to very much. (yes,) I’d love to. That would be very
nice. Thank you.
Refusal:
I’m afraid I can’t. I’m sorry I can’t.
OFFERS
A. Offers of help
I’ll… (if you like)…Shall I…? Let me… Would you like me to…? Do you need any
help? Is there anything I can do (to help)? Can I help you (at all)? is used mainly by
shop assistants and people whose job is to give information, etc
Acceptance:
Yes, please. – in reply to offers in the form of a question
Thank you (very much). That’s very kind of you. (Thank you). If (you’re sure) it’s not
too much trouble. If (you’re sure) you’ve for time. Well, perhaps you could… Do you
think you could…?
Refusal:
No, thank you. Oh, please don’t bother. No, it’s/that’s (quite) all right, (thank you).
Thank you, but there is really no need (to). I can easily… I (think I) can manage all
right, thank you.
The clearest and most usual replies to the interrogative forms are:
Yes, please. No, thank you – both with rising intonation and no pause between the
words.
THANKS
Thank you. Thank you very/so much. Thank you ever so much – more emphatic;
informal
Thank you very much indeed – emphatic and formal
Thanks. Thanks a lot/awfully. Many thanks. – rather formal
I don’t know how to thank you. I can never thank you enough. I’m very grateful (to
you)
That’s/It’s very/awfully kind of you. – formal, semi-formal
How kind of you. (I’m) much obliged (to you) – used mainly by shop assistants
COMPLIMENTS
The following phrases can be used to compliment people on their personal qualities or
abilities:
You are… – with strong stress on are and the following adjective or noun.
You are so… You are such a… How… you are! I wish I had your…
On possessions:
You’ve got a nice/lovely/beautiful/wonderful…
What a nice/lovely/beautiful/wonderful… you’ve got!
I wish I’d got a… like yours.
On achievements: The form used here usually depends on the type of achievement.
However, the general verbs be and do can be used in various situations:
You were wonderful/superb/magnificent!
You were great! – More colloquial
You did very well!
If you consider the compliment to be deserved you can simply say Thank you, but this
may sound self-satisfied or immodest. Here are some modest responses:
On possessions, clothes:
Do you like it (them)? I’m glad you like it. Yes, I’m quite/ rather pleased with it
(myself).
It’s not bad, is it? – usually an understatement, used out of modesty (real or assumed)
On appearance, clothes:
Do I? Does it? Do you like it?
On achievements: Here either ‘echo’ question or one of the responses given above can
be used, depending on the situation and the form of the compliment.
WARNING, CAUTION
The following expressions can be used to warn somebody:
Look out! Mind…! Hold tight! – to passengers (in a bus, etc)
Don’t rush, take it easy! – a policeman to a crowd.
Mind you…Make sure you… (+ inf. without ‘to’) Mind you don’t… Take care you
don’t…
Take care not to… Mind how you… Be careful (with…) Steady on (with…)! – informal
Colloquial:
You are for it! You’ve done it now! You’ll catch it!
REPROACH AND REPRIMAND
The following expressions can be used for reproach and reprimand:
Why (on earth) didn’t you…? You might have… I do think you might have… – rather
mild
You should (not) have…/ought (not) to have… You ought to be ashamed (of yourself).
What do you mean by …ing? – mixed with anger
You have no right to… How dare you (…)! – very strong, mixed with anger
Come off it! = Stop whatever you are doing – a mild, informal reprimand
Reproach and reprimand are frequently used to prevent people (especially children)
from behaving badly. Here are some expressions which can be used for this:
What are you up to? Stop (doing) that! Stop fooling around/about! Behave yourself!
Be/act your age! Come on, be a good boy/girl (and…) – gentle, mild.
COMPLAINT
The most usual complain about services or quality of goods. Formal:
I am sorry to complain, but…I don’t like to complain, but…
You should remember that the English are reluctant to complain, and when they do it,
they often do it in a somewhat apologetic manner:
Sorry, but… could you…? – semi-formal, formal
Do you think you could…? – semi-formal, formal, depending on the tone of voice.
I wish you wouldn’t… – grumbling
Do you have to…? – sarcastic
OPINION
An opinion may be expressed simply as an assertion, without any introductory words.
Sometimes, however, such statements may sound too dogmatic, and to avoid this effect
one of the following phrases should be used:
I think (that)… – the most common. I thought is often used to express an opinion about
something experienced in the past, for example, a film seen, a book read.
I think may also be used in sentences about verifiable facts, meaning It seems to me.
I believe (that)… I feel (that)…
I consider (that)… formal, semi-formal. Also more intellectual than I feel, which is
more emotional.
In my opinion – emphatic, slightly formal To my mind – emphatic. If you ask me,… –
colloquial
Note: to avoid being dogmatic and/or abrupt you may express your opinion (especially
when asked) beginning your phrase with Well.
To express stronger disagreement we can introduce the sentences with oh, which is
stressed.
The above forms are used mainly to disagree with statements of fact. To disagree with
an opinion, one of the following phrases is generally to be preferred:
I don’t agree (with you) (there). I disagree (with you) (there).
I’m afraid I can’t agree (with you) (there). – milder, more tactful.
I’m afraid you are mistaken (here).I think you are mistaken (here).
Direct, sometimes abrupt:
Not at all. Nothing of the kind. On the contrary. - formal
Very abrupt, possibly rude: Nonsense. Rubbish. (That’s) ridiculous.
Now here are some ways of softening disagreement:
Well,…Personally,…As a matter of fact,…
To disagree tactfully we may also use such expressions as:
Oh, I don’t know. – usually in response to critical remarks.
I wouldn’t say that. I wouldn’t call it/him… (exactly). Do you (really) think so?
II. Rationale. Debate serves the goal of developing students’ skills of information search
and processing; communication in the target language; public speech; argumentation;
defence of one’s own viewpoint and teamwork. Debate also fosters tolerance, respect for
other people’s opinions, active social stand, critical thinking. Educational debate allows
to eliminate such drawbacks of academic discussions as deviations, over-emotionality,
spontaneity, dominance of some students.
Participants:
Procedure:
1. Preparation – 15 min.
2. Case presentation:
(presentation of major arguments)
a) Team 1 (Speaker 1) – 5 min
b) Team 2 (Speaker 1) – 5 min
3. Refutation:
(counter-arguments)
a) Team 1 (Speaker 2) – 5 min.
b) Team 2 (Speaker 2) – 5 min.
4. Rebuttal:
(re-statement of major counter/arguments, summary)
a) Team 1 (Speaker 3) – 5 min.
b) Team 2 (Speaker 3) – 5 min.
5. Judges' verdict – 5 min
analysis of the teams' counter-argumentation,
declaration of the winner
Criteria: language, weight of evidence, logical consistency, relevance
V. Evidence card format
DEBATE RESOLUTION
Affirmative Constructive:
1) Intro (quote/state the resolution)
2) Define terms
3) State narrowed topic, if applicable
4) Preview in outline terms
5) State Contention 1 (preview subpoints)
6) State source and read evidence card
7) State Contention 2 (preview subpoints)
8) State source and read evidence card
9) Review main contentions
10) Give plan in terms of main planks/points
11) Point out its advantages/benefits
12) Summarize and ask for the ballot/vote
Negative Constructive:
1) Intro (quote/state the resolution)
2) Respond to definitions of terms (Grant or refute)
3) Respond to narrowed topic (if don’t agree, run the topicality argument)
4) Give generic preview
5) Refute Contention 1 and subpoints (see 4 points of refutation)
6) Attack evidence for Contention 1
7) Refute Contention 2 and subpoints (see 4 points of refutation)
8) Attack evidence for Contention 2
9) Sum up main points
10) Attack plan point by point
11) Attack advantages or give disadvantages
12) Sum up whole debate quickly and ask judge to vote for you
Refutation:
1) State word-for-word the opponent’s contention or point
2) State your response (I dis/agree…)
3) Introduce evidence and read source and tag,
4) Read evidence
5) Link your evidence to their argument
6) Tell judge that you destroyed or torpedoed their argument
7) Tell judge that the point goes to you
Introduction Because this is such an important and relevant topic to the future of Kz, I
State resolution stand resolved: that Kz should…
Preview In support of this Resolution I offer 2 contentions
Contention 1_____ and
Contention 2_____
Ending up a speech I now stand open for cross-examination. That covers everything
I wanted to say.
Let me finish my speech by saying that.. .
REFERENCES
1. Bogapova N. Debates as effective means of reinforcing learning. Proceedings of
the VI International Scientific-Practical Conference, NATEK Almaty-Kokshetau,
2006
2. Л.Н. Вахрушева, С.В. Савинова. Технология подготовки и проведения
дебатов. Справочник классного руководителя, № 9, 2008.
http://menobr.ru/material/default.aspx?control=15&id=9994&catalogid=27
(дата обращения 19 декабря 2011)
3. Гаркуша С.С. Дебаты. http://eng.1september.ru/view_article.php?ID=201000507
(дата обращения 19 декабря 2011) Формат игры парламентских дебатов.
Всероссийская академия внешней торговли. URL:
http://life.vavt.ru/site/LSPFEF0DC (дата обращения 24 декабря 2011)
4. Черкесова Н.М.Активные формы обучения на уроках истории.
http://nadeshdahistory.siteedit.su/page2 (дата обращения 19 декабря 2011)