Professional Documents
Culture Documents
§ffiffiffi
W
nfrw
1
M,.
lffi
í,q
\1/
Virginia Evans
Jenny Dooley
Stanley Wright
@s
Express Publishíng
J
Reading
Unit Topic Vocabulary Function
context
lnformation statement code, data, data processing. encode. hard,,,,,a,e, Getting
Technology information security, on Iine, quality assuran ce, Someone'S
software, technical suppod attention
lntroduction to Email desktop computer, laptop, mainframe, seí\/3,. Giving
Computing Systems smarlphone, supercomputer, tabIet. v/orKsia: c- instructions
lnside the Computer Product guide case, disk drive, expansion card. fan, harc :, .3 -3a: Indicating
sink, motherboard, power supp|y. p|,oc€ss:, =:',' a course of
action
4 Computing Devices Catalog input device, keyboard, LCD '-:^ .,:c,:,= Making
mouse. periphera|, printer. sca--3, s:-: , -:: a suggestion
touchscreen, USB
Networking Magazine CAT-S cable, configuratic,, ]- ] = -:.--:: = 1]]'aSS Describing
article LAN, network. powe, c\ c 3, ,:,::, ,'. _-'. options
The user lnterface ManuaI desktop, drag. fo|der, G,a:-:: -:=-
,-.:,?:: : Asking for
icon, maximize. meí^-, - , - _: ] S :: --=, =
assistance
window
Word Processing Advertisement compatibility, doc-l-:-: ':,-. '_,- =, 1dentifying
,.=-: :,.=
layout, macro. Spe :-::. a problem
program
8 Email Handbook attachment.dora - ')- - :--'= a - -::: -- Checking for
lSP, password FCtr: S','-= _:=,-:-: errorS
Unit5-Networking.. 12
Unit 8 - Email 1B
Unit9-Web Browsing 2a
Unit 14 - Videoconferencing 30
Unit 15 - E-commerce . 32
Glossary 34
i
j:
:.
,: technical support
Testing hardware
Provid ing technical support
now encode data. H the task of he|ping peop e -s. ,- ]:,s::- : .=:"nology
_ Supervisors know the I program language
employees' new assignments J the act of protecting inforna: :-
Fill in the blanks with the correct words or
phrases f rom the word bank.
With a partner, act out the roles below
;
.,', i.l ,i S
based on Task 7. Then, switch roles.
enc;,oc]ii.l
USE LANGUAGE SUCH AS:
Excuse me ,,,
1 Enter the into the computer.
l'm in the ... section.
2 The magnetic stripe on credit cards serves
to _the card holder's l have more experience with ...
account information.
finds and fixes
problems in new products.
' You are an employee, Talk to
Student B about:
. the current section you work
Listen to and read the statement
from the DataPro lnc, CEO again. Which . your desired section
section is responsible for helping people to . reason
un derstand technology?
, : . l
You are a supervisor. Ta|k to Student A
about his or her current and desired section.
Listen to a conversation between a
DataPro lnc. employee and her supervisor.
choose the correct answers.
1 What is the dialogue main|y about?
A asking for a raise use the conversation from Task 8 to íill out
the transfer request.
B requesting a transfer
C assuring product quality
D improving hardware
L
G*t n*mdp§
fi} aetore you read the passage, talk about these questions.
1 What kind of computers do you use?
2 What do you use computers íor at work?
, . lii3ffi
i §tu$ent *: You are a new employee. Talk to
, student A about the company's computers and
,
J B
C
D
reserve workstations
log onto desktop computers
borrow laptops
Wffiffi ,/\-j1
l""*jlnili jlis1 ';,F,
;
i
§ffireffi-
;-1n":;d,,,,,
-i jó/)i:;}
P: Yes, That's your computer there. Laptops are in iI
the 2
E: Ok, but l also need a 3
D. Right, you work on some powerful programs. Those
are next door.
E: Do l sign up to use them? l mean, how do l gei
access to one?
P: Just 4__to the server. Al| computers
UI
connect to it. Then, click 5 '_workstation'.
E: Thanks!
E
Get ready!
Q Setore you read the passage, tatk about
these questiorg
1 Which coínponents rrrake up a typical desktop
computerlr
2 What do 1rou cdl a persorr wtro repairs
computers?
Reading
***M§
-=],*
lnstwnmmtlons
@ neaO üre proürct guüde about computer
o,,1ffi:|i§,[,.1.,J
l*: assembly. Then, cfioo§e
answe]§.
üe correct
#§^§llffi;.ffi§ffiT ,t
disk drive,
E What is the gukle rr,6üy about?
J,W", unO t
!
A puttirp togcü,eí a cornputer
B problerrs with onputer parts
tep #2:
[i*{ip*:n*1l.:,.
to
C uses of expasim ads
oíocessor
primarv socket,
*1* 2
D repairirp a bíoken cornputer
Vocabulary
@ rUatctr the woíds ú prTases (1-6) with the
definitions (A+t
1 _ heat§nk 4 _ processor
2 _RAM 5 _ hard drive
3 _ expansion card 6 _ motherboard
A a slotted boüdth ciqits arrd ports
B a short-terq qi*nutuystxJrce
C a part usedb@dtepor
D a part used b fu fue annnts of data
E a part usedbircaolutte/s functionality
F aparttHoottl'- e Bbíüecomputer
ü
Write a word or phrase that is similar in
..:,,:í
meaning to the underlined part. With a paftner, act out the roles below
1 A device with spinning blades keeps the based on Task 7. Then, switch roles,
computer from overheating. í _ _
USE LANGUAGE SUCH AS:
2 The electrical source directs power throughout
l need help taking out ...
thecomputer. __w_r __pp__
3 Joey purchased a protective container for his First, ...
, :|,
You are a customer. Talk to Student A
,,.,:
l:ii: i ]a:
Customer: which one is the 3
-:
drive to the 5 _ .
Mouse H,[:.ffi!ft'"i}ii;i"..]",
a scroll wheel,
ol|"a"r",
allows
The touchscreen
xeyboard 11',
SofiTouch input Without a t
íor many uses,
Touchscreen ;iö;;"ble j
pri nter
scroll wheel
Before you read the passage,
talk about these questions.
1 How do computers receive
information from users? microphone
Match the words (1-5) with the definitions
2 What devices can you
(A-E).
attach to computers?
1 1: --).- 4 -icrophone
a
z -^J->=^^ 5 -onitor
3 _ sca"-:,
Read the catalog. Then, mark the following A a der, lc= :-;: ,::]-r ^.a]3s and sends them to a
answers as true (T) or false (F). UUl !-_:
)
Listen again and complete the
conversation. il|
l ll |i]]]'1l
. .'=.::í§ti,l
:] : ],]:.].i..|:, 1.. :
,t,;
Et -l
Before you read the passage, ta|k about these
questions.
1 What are some components of a computer network? \-
2 How does a computer network help a business?
Vo|.29, No.3
1 ;,,]
2 Why does the woman choose a wireless network? ffi Use the conversation from
Task 8 to fill in the network
A She does not have CAT-S cables. description sheet.
B Her computers are not close to each other.
C She does not like her present network. ':.
i
D
'::1
l].
- Professional:
i],
il
L*eati*n *f r:eil"l*i"k,; _ ,,
Hi. Can I help you find something? ir
ii
;,i
you have?
i|:
2
Customer:
lii
l don't have one yet, but it's for the computers
Ct,rnlr Jrleqig,;';eded
: l
in my home.
I
T Professional: Do you want a LAN or a WLAN? Some routers
i
don't 3 both types. l!,
Customer: What's the difference? i
i
a:
,:
T Professional: A WLAN connects compuiers wirelessly. ij:i
4 _with
::"'-:
!a,,i+l.j!," :=:.'
A LAN
__:a ng.4lr+.f.,Í,:x,tl
CAT-S cables.
n+
_.=... =.:-a,.,,,:=
=._..4.
E
Get ready!
$ Betore you read the passage, talk about
these questions.
1 What is a User |nierface?
2 How does a User lnterface make computing easy?
Reading
@ neaa the introduction to öe operating system
manual. Then, choose üre correct answers.
WinJ"*r,Visual areas
on a coll"lputer,screen B open menus D minimize windows
progíams are operating,
ulhere different off
wrtnout taking them
Mininriae: HiCu *injJ*u Vocabulary
to the íuliwidttr
#:ii-'J;, Extend wtndows @ rill in the blanks with the correct words.
it to select
nas.a menu, Click
M;l;lH:lT}ldow
the iist,
á command írom icons desktop OS
pointer windows GUl
1 Use the to choose
files and commands.
2 Small pictures or symbols in software are
em 3 Shortcut
s. A a type of software C a type of window
You are a suppot1 technician. Ta|k
B a type of icon
to Student B about:
. how to save icons
Listen to and read the introduction to
the operating system manual again. Why
. how to open menus
A icons C pointer
B desktop D options menu :.'
l
l
cj an.] l(l
a l í.]
o".:'"',.,.,,.^
Q on^""'o",on
;:::::.",",;":,::
.v\.
J lerlol c:
Cuna],,]u,.
luU
format ^
\ _
document l",jD |Sa
nq ^
template
all\e
WORD PROCESSlNG
lNTRODUCING
You need the perfect word processing program. And
the new TypeWrite 4.0 is our best version yet. Write
bold, striking documents. Use our many stylish fonts.
Change your layout with a single c|ick. Browse the
new customizable templates. Customtze toolbars for
easier formatting.
lt's more than a new |ook. TypeWrite 4.0 eliminates
word processing program
most compatibility issues. Now dozens more file
íormats work with TypeWrite. And TypeWrite 4.0
a|lows up to 500 macros, so save time as you type!
TypeWrite 4.0 also features the mosi accurate spell
check to date.
.] Listen to
a conversation between an lT professional Student B: You are a computer
and a computer user. Choose the correct answers. i user, Answer Student A's
] questions.
1 What is the dialogue mostly about?
A how to open a file
B common word processing errors Writir"lg
C types of word processing programs
§ Use the conversation from
D ways to change file formats Task 8 to fil! in the email. Make
up a name for the user.
2 What solution does the lT Professional suggest?
A buy the TypeWrite program
B download the file and try again
tl C get the file in a different format
D ask the client to send a program
B
i] Listen again and complete the conversation. s;jíli iir
|]p
in most 6 _.
User: Great, thanks!
!
domain name
@tbbrr\q/ninc,üür
lnstructions
r''or,v";T::T::il-
,B,BROWN
r- -
lEl'lJlrl- rn", íor New
l .^l.iac pléase create YOUr
COmPallY
Gensíal*:§::1-:: w elco rne'" l
u_
*uji,"Y,l r: ?:iff ir 5]:X1. o,,
tmmeotat:''
t3terna$e: **"'-§ -
emailaccount ::^;;,^,,rp lt sends and receives
?a*:vrot$: r a pun " y' :1t;::"Ji.:*':Í'o'o,1','" o * o u'"'
emails, lt also t
Get ready!
Q aetore you read the passage, talk about
these questions.
1 How is email helpfulto people and businesses? Vocabulary
2 What are some problems with email?
@ tvtatctr the words or phrases (1-5) with the
definitions (A-E).
Reading 1 _ attachment 4 _ emailclient
@ neaO the excerpt from the employee 2 _ domain name 5 _ SMTP
handbook at T.B. Brown lnc. Then, mark 3 _ password
the following statements as true (T)
or íalse (F). A a system allowing a computer to send email
1_ The company uses a POP3 server to receive
B a program that stores, sends and receives email
email. C wordV|etters used to identify companies and
addresses
2_ The company provides webmail for all
employees. D secret letterVnumbers that let a person access
someihing
3 _ All employees have multiple company email
accounts. E a file that is sent with an email
==--.il
Choose the word or phrase that is closest in meaning to ffip*xkimg
the underlined part.
ffi Wittr a partner, act out the
,1 That company that provides access to the lnternet has very roles below based on Task 7.
good service, Then, switch ro!es.
A lSP B email address c username
USE LANGUAGE SUCH AS:
l use an email service available on web browsers, so'my
My emailaddress lsn't
emails are not saved on my computer.
receiving mail,
A PoP3 B webmail c lSP
Do you have the correct username
3 Enter your code that identifies you on a computer and press
and password?
"enter".
A username B webmail c PoP3
Does that matter?
,:}1,:ií:*
!
irail
,]
E: Okay, do you have a4 _account or an email client?
There are some common mistakes with those.
An5_ ?Doesthatmatter?
ÉsS
E: New customers often make mistakes with the 6
seitings. The correct server is POP.QuickTel.net.
C: Oh, that's it. l have Pop.QuickTel,com, Thanks. ,'1§W
Hi§tory Bookmaík§ Too15 wlíldo
.f*k, he
hiip,] i*,*-*,.1i]ld?ü,] aQnl
URL ,l
1l
search engine
iI
hypertinX f
meta tags
-,!
ivebsite
allows peop|e to look for pafiicular informatton are. Why are they imporlant?
lo find a website. Employee 1: They're descriptive words on the
A search engine B http C website 2 _ . They make the
site rank higher in 3
: fur website is very popular on the system of Employee 2: You mean our 4 _appears at
nformation that is avai|able on the lnternet. the top of the search results?
A meta tag B hyperlink C www Employee 1: Exactly. Customers 5
: -he company's text and symbo|s that form a our hyperlink first
address is http://tbbrownincorp.com. Employee 2: That's good news for our sa|es department.
",,eb
A URL B search engine C web host
Regards,
J
ffi Before you read the passage, talk about these questions.
Nowadays, anyone can edit graphics,
1 What are some reasons people edit images?
But new users encounter many
2 How do people edit their pictures?
difficulties. Here are some common
problems and solutions:
;-
* i'-]-
,_ _
l *_. -_.. The image is dark or has a
strange tint,
CaUSe: Poor exposure or bad lighting.
Adjust the contrast using a
graphie editing program.
.- * l : -- There is white space around
the image.
Crop ihe picture. This
removes unnecessary pafts.
* '] ] " The photograph is blurry.
=
CaUSe: resolution.
Lor,,l
lncrease the number of pixels
in the image. This makes it sharper, Or
resize the picture and make it smaller,
Also. save the photo as a JPEG file. This
format creates high-quality photographs.
§.*edímg
&1 n""a the article from Graphic Arts Magazine.
Then choose the correct answers.
What is the article mostly about?
A why people edit graphics
B how to edit graphics
C the causes of poor exposure
Match the words (1-6) with the definitions
D how to crop a picture (A-F).
1 lt's hard to see the detaiIs of this picture. Please ls there a way to fix poor exposure?
lT so that it is bigger. lncrease the contrast to lighten the picture,
2 l want to edit my pictures. l need a
3 l don't like the background of this picture. Let's You are a support center agent.
it out. Student B needs help editing a picture. Talk
about:
4 This picture is too dark. Make the
.
a little lighter. what the editing software is
o what the problem ;s
Listen to and read the adicle from . how to fix the probIem
Graphic Arts Magazine again. What might
be the reason for a blurry photograph?
. ,:., i' YoU are a customer. Fo|low
Student A's instructions to edit a picture.
:Is
Listen to a conversation between a
suppon center agent and a customer. Mark
the íollowing statements as true (T) or
false (F).
use the conversation from Task 8 to
1 Cropping a picture fixes poor exposure, complete the note,
2 An editing program lets you change aspects
oí a picture.
3_ The controls to fix the picture are in the edit
menu,
1? !
Agent: Do you have a 2 _
program? io erjjl
Customer: Yes, but l never use it. l 1ust don't know
how,
Agent: No problem, 3the file with the
program and find the contrast contro|s.
Customer: ls that in the 4 _ _? ilijvi;e !ltven
|,,t,.,.,',.J 1_1it1-'
1
l
_
1 i!:-:
Agent: lt is. lncrease the 5 to |ighten
the picture.
Customer: Great!Thanks.
l
lnc,
'B-mffiffiWffi
,*,o**o,** raCi+ruot-oov DEpAfr
TtúEltT
From: lT Department
To: All Users
Databmse
n"", Sp.*u*shqets vs spreadsheets incorrectly,
many employees use
Cuirently,
data storage, PiJu"" review the following _:
ic§" $
a\É
guidelines, '$
n:-
- -fföéffi 1j { 1-.
ú -, 1
,::^-; í "fi l J::ili§for
!/
i |:,
ffi i
names o]," u:ü*
:f, i*l§ .i
Enter the client rltinl€ tables íor clienl
multiple
mr
client 4
l
perform complex l"#";;arch *
n-.
a" .].
-.
a ..1
information, ,É,* .:,
pr*gru* t:1 ! ,.;
Use cxr mpr***=h*eÉ -"OJu' c9st, and revenue, i spreadsheet ]
]i
Perform ""r"urut,ii, *'i",ent,functions
and ','*
";; a worksheet
g
\\
3:"Jfi"'ffi';";; cells of __---
é r§llt,l§€§
create these charts é=!,
* §§
§
1-cela
"Ját"ú"é":l
!
l
l
t
l
l
a
a
l
r
1 Sue types in a(n) symbo| that performs a specific calculation rotes below based on Task 7.
on the line, Then, switch roles.
A cell B operator c worksheet
USE LANGUAGE SUCH AS:
2 Please arrange the client addresses in a single collection of
l need help.
information in a database.
Are the data in the cells correct?
A table B database field C query
Type this formula into the top cell,
3 Dave adds up the values with a mathematica| spreadsheet
calcuIation.
A worksheet B formula c database You are an employee
4 Jim organizes records in a computer program that organizes at T.B. Brown lnc. You need help
information and performs calculations. using a spreadsheet. Talk to
A function B query C spreadsheet Student B about:
5 Martha finds clients who live nearby with a search that locates
r what the problem is
all information of a spectfic type. o possible mistakes
A query B database field C operator . solutions
6 Some information in one unit of a spreadsheet that holds a
piece of information is incorrect. You are Student A's
A Bfunction ccell
.1l
l imployee2l Well,areallthe3_inthe4_correct?
... -nployee 1: Yes, l'm sure they are,
ii ." :,.::
-nPloYee 2: OkaY, Then just tYPe this 5 into the toP cell, iJ
'= '-
,,
]: -nployee 1: Really? That's aII?
,-.,. ::::::::,,,:-, ._.:!1;".:_j::::,1.|;.:. .:.= ::_:1i..,1|l:|+i
,_,,.-,., -,,_,
'] 3nployee 2: Yes. The formula ca|culates the estimated 6 _
- of the spreadsheet.
and shows them at the bottom
L
fl
v
Before you read the passage, talk about
these questions.
'l
!
What makes a good business website?
n
2 What kind of websites do you like to use?
:
=,,:
§pr§mry C
D
using code to program a website
-s
Frafesmíona#
how to market a new website
U
]
]
Match the words (1-6) with the definitions
i]
,] (A-F),
!d
]
1 _webdesign 4 _visibility
1
2 coding 5 usability *{
3 _navigation 6 _content É
A choosing a website's visuals
B how easily you can find a website on a search Sn
englne fl
c a website's programming
D how easily a user can interact with a website
fiil
E the act of searching and finding information on
a website
mí
everything contained in a website
§il
]
a::,} ,*, ,.-,, ; .. , . _, , ,. , ,
Fill in the blanks with the correct words or phrases from .i3 "*.
i.,3 § e* !1 ; i. : :._-:
Listen to and read the brochure again. Which class il],l.,, ,,.:,::, . You are a Web
would someone attend to Iearn about developing a development instructor. Answer
website's performance? Student B's questions about:
. style sheet and content
,,:,líi,]t,i . changing the style sheet
i
D
Oeveropment Courses
The words are changed in the content. ll,
I,
l
Listen again and complete the conversation. on
Example Test Questions
i
li
Web Designl
lnstructor: So, that's how we change the website's style, i
;]
for?
Does anyone have any questions? l*tters CSS stand
1
a
j.i
Vr/hai do the !]:
.,,p1,,1,1,,"
llÜ|
Employee: Okay. l understand now, The words stay the same, but
their appearance changes.
l
ry ffig"
otíset lithography F
*:] ]&:- ffii*- "
:§Xi§
I
I anrriiarity
*''1:l;;;,lnnlnnor, u,_,t e:,scnii ,
jr
D students do not meet the
prlI requirements.
eiectrostatic.'iiru c* git'+i-,
lrII"i,lr"' "r",l1
and r&*r::."r*
ic
**nd a ü*veí i*ti*;
T* epptr:r,
|rá&b"'e*eirieplab§s&§1y,T'**==..e::l+nrl|íl:l" Read the sentence pairs,
Choose which phrase best fits
each blank.
,,.- Sl.,,",.,,.,,\
1
, ."I;};í,ün,nn*il*".,"
electronic pages / electronic
paper
i, i(ffi:,: .=_
A Many books are available on
hm*r'\§&
*s.- page
l,]
layout l
l
.,t
_]
B Desktop publishing specialists
assemble
2 page layout / clip art . ]]]_,',_
, ;' i ,.,l,
use the conversation from
Task 8 to complete the
Listen to a conversation between an interviewer and interview notes. Greate some
a candidate. Mark the foIlowing statements as true (T) personal details.
or false (F).
l Roberts
i&
á From: Chuck
ffi :T;J::il:'l"se
Request
t
,t Mr,
'o, Smith, ,l 2 _.: ^_?=__ ,,,
-.- ],, cusiness Partners'
ffi:
G c_,
j"
!
*
"'i 1:',
o,."."n'
that vle_ ,-:.'u " :" ,==:
o o o'n:
" l"_" :' ln"o:'":"i i
{3 l propose
, better,
#t
avat"m is even
time anO [€uuv"' un.i ",],' :. dediCateOJ
_, -^Á, rnes cos--S ._ sy'lv"
n^Á it cttDoorts
n j'u',,'
l, o
n
\1
Videoconferencing
, document
in" ""' ,
.v"", comes
The SYsLc'"
, ",^-:=. .1il
__ ' -
1 :.--:.?.
'9.deo n,iog"
U|'
--- '-
="o"'.i,_1§
alSC
§;
_^+^l,t \^/e
=- :. Still,
§'{,, a codec, but ',^,e ' =='^'_
^ . ,""'r"* access.
_ ,^ nandrVid ,i
s,"a '= -^
.-y*
need to make
-3s, -=, =
-
: _,:_,.,.,:.ghis,
big sat
it ofíers
, ó ^l-\Aíq ,-
ChUCx nulu
dedicated syster
Read the emailfrom an lT )!d"
professional at Acme
Enterprise. Then, mark the
following statements as lr
lLCOíIlú:.',.
^^_^^ : : ,.- - : -:: - -. ];,Co^Terenclng.
^{^
^ ^^^ ^
true (T) or false (F). 2 O,tly I ca^ e;: ,-: ::: - - - ]=_ _,-':,:i-,lce system does
üiilP]
lnternet access.
Write a word or phrase that is similar in meaning to the :i -].:.
underlined part.
lii Wittr a partner, act out the
1 A high amount of information that a network sends and roles below based on Task 7.
receives helps images load quickly on the lnternet. Then, switch roles.
b_n__i__h
2 USE LANGUAGE SUGH AS:
To set up a videoconíerence system, first connect the
equioment that codes and reads signals. c _ d _ _ What are my options?
3 John attached a camera that broadcasts sound and video on The system with ... lets you hold ,,,
thelnternet. w__c_m Does lt come with a video bridge?
4 Our offices can hold a videoconference among people in
different locations.
n m__t__o_n_ v__e___n__r_ ,.
;,, l You are a sa|es
o representative. Answer Student A's
ll, Listen to and read the emailfrom an lT proíessional questions about:
at Acme Enterprise again. Why does Chuck Roberts . videoconferencingoptions
suggest having a dedicated system? . differences in number of
moniiors used
l :]"l
,]] 1 ] ]'
': . ]'
,]],
. use of a vld1 bridge
D
ii
lt lets you do document sharing.
;.
Order #11§2
1
,
:.:
:=
; '=_=
i\UmOer oT bridges:
] ,-
i:] ll
p: l need 5 monitors then, Does it come with a video
. Une / iWo i== |
; l:_:':
bridge? l..,
Total Cost: S2.249,99 l:]
:
_
*ffi *€ -ffix
FRQs
e-commerce
- :.;*§3§§3ffi
Wn*€*reg
C ,: Listen to a conversation between two
ffi Use the email and the conversation from
employees of BargainEquipment.com and Task 8 to complete the recommendation.
TFC Gaming. Choose the correct answers.
1 What are the employees mostly talking about?
A raising sales C calculating profits
B meeting affiliates D payment percentages
:=4F,i
r"1/'
!] ,-:, ' '-'
:
-€
L-ffi\
1
compatibility [N-U NCOUNT-U7] is the abili:;. c' a : :: :':,:_a- --:_ .", :c tvork with a different
one.
router ,s ca1 :' ,.,= ,=,. _-, :::-: :,::3ss. lt specifies the route
configuration [N-UNCOUNT-U5]The
settings, the correct lP addresses, passwords. Wi-Fi€ cha"e v-::1,: :, -
content [N-UNCOUNT-U12] is the materia|on a \!eoca!3, -: _] -] ... =-] :,13- 3s.
contrast [N-UNCOUNT-U10] is the amount of difíere^:3 :::,,,=:- :-= ]:" =,:as a-C light areas of an image
crop [V-T-U1O]To an image is to cut off unwanted parls oí a, -a:=
cssIABBREV_U12] (CascadingStyleSheets)isalanguagetiats=:= -=:,_,= HTML
=]':-:s,color,spacing)of
elements on a webpage.
data [N-UNCOUNT-U1] , are information that can be entered and !s3]
I
data processing [N-UNCOUNT-U1 ] is the act of enie"c,
computers. í
database IN-COUNT-U1 1] A is a large group of data organrzec - a :--:-.=, s_. s:3T, lt a|lows you to {
desktop [N-COU NT-U6] A computer is everything that a user sees c^ a :]-: -:., 3],3en.
l
:esktop computer [N-COUNT-U2] A or a desktop is a computer that is small enough to use at
a desk, but too big to carry around,
:esktop publishing [N-UNCOUNT-U1 3] is the art of using page layout software to design
finished, printable documents.
]HCP [ABBREV-U5]The (Dynamic Host Configuration Protocol) is a TCP/IP protoco| system for computer
networks to receive lP addresses and other configuration information
:lsk drive [N-COUNT-U3] A is any device that reads and/or writes data to a disk, Some examples include
the hard disk drive or removable storage devices. These ones use a magnetic head whereas optica| drives use a
Iaser,
:omain name |N-COUNT-U8] A is a set of words and letters that identify a company or address on the
lnternet.
=
ectrostatic printing [N-UNCOUNT-U131 :' ,],l,,:",:- is a method that uses static electrictty to print.
=mail address [N-COUNT-UB] An . is an online location to which electronic messages can be delivered.
=mail client [N-COUNT-U8] An is an offline program that receives, sends and stores a user's email on a
specific computer
:ncode [V-T-Ul]To data is to convert them to a desired form for data transmission, storage, etc. so that no
one can read it.
:xpansion card [N-COUNT-U3] are extra circuit boards that are used to increase the functionality
of a computer,
3xposure IN-UNCOUNT-U10] ln photography, the ,.,. is the amount of light that reaches the camera's sensor.
'an [N-COUNT-U3]A moves cool air onto computer components inside the case.
FAQs IABBREV-U15] (Frequently Asked Questions) are a set of questions and answers that are provided on a
website to provide users with information that users commonly want to know,
folder [N-COUNT-U6]A holds and organizes íiles and documents on a computer.
font [N-UNCOUNT-U7] is the style of the typed characters on a document.
íormat IN-COUNT-U7] A is a file's type. Different files might not work in different programs or software.
;I functionality [N-UNCOUNT-U12] Functionality is the ability of different elements of a website to work together,
il
graphic communications [N-UNCOUNT-U13] Graphic communications is the study of sending emotive and
I
Graphical User lnterface (GUl) [N-COUNT-U6]A &raphi*al l"§ser §r":t*#aee {GUl) is an operating system that uses
icons to represent programs and files and allow users to access them.
;l1
graphics IN-PLURAL-U10] &raphics are images on a computer, in a book or magazine, etc,
iH hard drive [N-COUNT-U3] A hard drive or hard disk drive is a data storage device that stores data on magnetic
platters.
input device IN-COUNT-U4] An input deviee is any piece of equipment that is used to enter information to
a computer (e.g. a keyboard, mouse, light pen, microphone, touchscreen, etc.),
lP address IABBREV-U5] An §F (lnternei Protocol) aeidress is a group of numbers that identify a computer on a
network.
lSP [ABBREV-U8] An lSP (lnternet Service Provider) is a company that gives its customers access to the lnternet,
email addresses and data storage,
JPEG IABBREV-U10] JPEG (Joint Photographic Experls Group) is a file format that compresses image files.
keyboard [N-COUNT-U4] A keyboard is a set of buttons that is used to enter informat|on into a computer.
LAN IABBREV-US] A !-Á§* (Local Area Network) is a computer network that connects a group of computers and other
devices within a limited area via Ethernet of Wi-Fi@.
laptop IN-COUNT-U2] A laptop is a computer that is small enough for you to carry around and use anywhere.
layout [N-UNCOUNT-U7] Layout is the way that items are arranged on a document.
LCD [ABBREV-U4] An LCD (Liquid Crystal Display) is a type of display that is created by liquid crystals and that is
used in thin monitors.
macro IN-COUNT-U7] A *ta*ro is a series of automated commands grouped together as a single command by the
user so as to save time while executing frequently used tasks.
mainframe IN-COUNT-U2] A r*la§nframe is a very powerful computer that can process large amounts of data.
maximize [V-T-U6] To maximize a window is to make it fill an entire computer screen or desktop.
]enu IN-COUNT-U6] On a desktop, a ,,.]l..i is a range of choices or commands a user can click on depending
on what he or she wants to do.
-eta tag [N-COUNT-U9] A is text that is used in the HTML codes of a webpage to provide information
about the site to search engines.
-inimize [V-T-U6] To ,,
, a window is to make it disappear from the screen without closing it.
-otherboard [N-COUNT-U3] A ,
":i:,,,,,11,,1,i is a firm slotted board onto which computer circuitry is attached.
-.use [N-COUNT-U4]A is a small device that is used to move the cursor and select items on a computer
SCreen.
:twork IN-COUNT-US] A ,,l is a group of computers that are connected in order to share data or
communicate.
*set lithography
[N-UNCOUNT-U1 3] is a printing method in which an intermediate surface (a
lubber cylinder) is used first for the impression which then transfers it to the paper,
-line IADJ-U1] lf something is , it is available or it occurs on the lnternet.
:erator IN-COUNT-U1 1] An is a symbol in a formula that performs a pafticular calculation, such as a plus
sign (+).
'ABBREV-U6] -':,
S An(Operating System) is basic software on any computer that controls its íunctions and
crocesses and also allows other programs to run.
=
ge layout [N-UNCOUNT-U1 3] is the process of arranging text and graphics on a page.
:ge view IN-COUNT-U1 5] A is a request from a computer to load a page of a website. They can be
counted to analyze the number of people viewing a website,
:ssword [N-COUNT-U8]A is a set of secret letters and/or numbers that allow someone to access a file,
service, document, account, etc. on a computer.
:ripheral [N-COUNT-U4] A , is a device that can be connected to a computer.
rel IN-COUNT-U10] A is one of the small dots that make up an image on a computer or television screen.
:inter [N-COUNT-U6]A is a small arrow that lets a user choose what to do on a computer.
:3P3 [ABBREV-U8]A (Post Office Protocol 3) is a system that receives and downloads email from a server and
then deletes it from the server without storing it.
iAM [ABBREV-U3] " (Random Access Memory) is memory that can be quickly accessed.
,esize
[V-T-U10] To an image is to alter its size, width or height,
resolution [N-UNCOUNT-U10] The resoltttion of an image refers to the quality of details displayed on it. lt is descri
in pp| or Dpl which define the number of pixels or dots displayed per inch of an image (high/low resolution).
router IN-COUNT-US] A routor is a device that sends data packets to computer networks over the lnternet.
scanner [N-COUNT_U4] A scanner is a device that is used for transferring printed documents and pictures into a
computer system.
scroll wheel [N-COUNT-U4] A scroll wheel is a tool located in the middle of a mouse and that is used to scroll up
and down on any page or webpage without using the scroll bar.
search engine IN-COUNT-U9] A search engine is a computer program that allows people to search for particular
information, products, etc. on the lnternet, with the use of keywords or characters.
smartphone IN-COUNT-U2] A srnartphone is a phone that you take with you to make ca|ls and access the lnternet
anywhere.
software [N-UNCOUNT-U1] $oftware is a program or instruction that make a computer perform a specific task.
sort [V-T-U11] To sort information is to arrange it in a database in a specific way.
spell check [N-UNCOUNT-U7] §pell check is a function that reviews a document for spelling errors.
spreadsheet IN-COUNT-U11l A spreadshe*t is a computer program that organizes information and performs
calculations.
sMTp IABBREV-UB]An SMTF (Simple MailTransfer Protocol) is a system that allows computer users to send emails
to other users.
supercomputer [N-COUNT-U2] A supercomputer is a large computer that is built to process large amounts of
information at a higher speed than other computers can handle.
technical support [N-UNCOUNT-U1] Technical support is the task of helping people use and understand
template IN-COUNT-U7] A tenrplate is a pre-built or customized |ayout of a document that serves as a model for a
user based on his or her needs.
URL IABBREV_U9] A URL (Uniform Resource Locator) is the text and symbols that form a web address.
usability [N-UNCOUNT-U12] Usability is how easy it is for a person to use a website.
uSB [ABBREV-U4] USB (Universal Serial Bus) is a commonly used type of connection or port to connect a peripheral
to a computer.
username IN-COUNT-UB] A username is a name or code that identifies a person on a computer and allows that
person to access a íile, service, account, etc.
§ffi
, rdeo bridge [N-COUNT-U14] A |-i: is a device that allows you to hold multipoint videoconferences, lt
connects calls from several different locations.
,ldeoconferencing [N-UNCOUNT-U14],.ll.::l,,, ;l is the holding of a meeting or conversation between two
or more people in different locations using computer technology.
, isibility [N-UNCOUNT-U1 2],, is how easily people find a website based on its ranking on search engines,
,,leb browser [N-COUNT-U9] A ., ,,l]] , is a software application that uses a search engine to locate, access,
and view information on the web servers.
,,iebcam IN-COUNT-U14] A ,: is a small video camera that is either built-in in laptops or attached to the
monitor of desktops and which is used for video calling by broadcasting sound and video on the lnternet,
r;eb design [N-UNCOUNT-U12] ":: is the act or practice of determining how a website looks,
,veb development [N-UNCOUNT-U12] , l,il,.i::l ,- l is the act or practice of determining how a website works,
r,eb host [N-COUNT-U9] A .r:,,, ": ,.: is a company thai provides space on a server for a website on the lnternet.
,vindow [N-COUNT-U6]A is a rectangle on the desktop of a computer monitor that displays a file or program.
lts contents are independent of the desktop screen.
,YLAN IABBREV-US] A ";lji,ll,,li . (Wireless Local Area Network) is a computer network that connects several devices
without cables but via radio waves or infrared signals and within a limited area.
,,lorkstation IN-COUNT-U2] A ,, ,l,,: -,, ll:l]:.l] is a very fast computer that runs powerful work programs.
,vww [ABBREV-U9] The ,,,,,,, (World Wide Web) is the system of webpages, informaiion, pictures, eic. ihat is
available on the lnternet.
t
.:i '
::
t,m rrYWa
Áh,
\2)
Virginia Evans
Jenny Dooley
Stanley Wright
aÉJs
Express Publíshing
Reading Function
Unit Topic Vocabulary
context
1 Computer Guide bit, bit size, bus speed, DlMM, MB, MHz, paging Describing
Memory fi|e, RAM, SlMM, virtual memory minimum
requirements
Programming Letter C, C#. C+-, compiler. computer |anguage. Expressing
Languages CPU, Java, JavaScript, linker, machtne code, a concern
multi-thread, Python, Swift
lSPs and Notif ication antivirus software, broadband, DSL, hotspot, lSP, Describing
lnternet Access T-1, T-3, upgrade, Wi-Fi@, WPS benefits
Storage Devices Suggestion array, cloud computing, failure, HDD, hybrid array, Asking about
íorm RAID, SATA, SSD, USB flash drive deadlines
5 Peripherals Advertisement automatic document feeder, calibration, CCD, Making a
digital camera, digital zoom, DPl, flash memory, recommendatior
inkjet printer, |aser printer, megapixel, optica| zoom,
transparency adapter
6 MP3 Players Notif ication AAC, bitrate, capacity, decode. dock, driver, treeze, Troubleshooting
GB, MP3, p|ay|ist, upload a problem
7 CeIl Phones Advertisement 5G network, app, Bluetooth€', ca|l waiting, caller Asking for
lD, celI phone, Iithium-ion battery, ringtone, text additional
message, touchscreen, volce activation, voicemail information
8 communications lnstant barcode, data plan, email, EPC, instant message, Assigning
messageS scan, spam, text, UPC a task
Entertainment and Memo avatar, b|og, forum, gaming, hand|e, Iink, MMORPG, Making
Social Networking news feed, post, profile, socia| networking, virtual a generaIization
world
10 Geographic Chapter cartographic, correlated, data capture, GlS, Describing
lnformation introductton latrtude, laye1 location, longitude, metadata, raster, differences
System remote sensing, spatia| pattern, vector
11 Banking Website account activity, account a|er1, bank fraud, bill pay, Reporting
electronic funds transfer, electronic statement, a problem
identity theft, lockout, onIine banking, PlN, site key,
ssL connection
12 Education and Advertisement Boolean operator, cata|og, ebook, ejourna|, Describing
Research EZproxy, index, Iicense restrict]on, media, remote a problem
acces_s, site license, subscription, VPN
,13 Robotics Email actuator, autonomous, drive power, dynamic Giving
model, enabling device, end-effecto1 equality advice
constraint, joint, manipulator, pendant, robotics,
serial robot
14 Electronic Announcement active matrix disp|ay, bitmapped graphic, b|ack and Expressing
Publishing whrte, download, ergonomic, offline, PDF reader. lack of knowldge
publication, reflow, sub-pixel rendering, system
requirements
lJ Artificial Magazine agent, algorithm, artiíicial inteIligence, case-based Expressing
lnteIligence article reasoning, cognitive scientist, computer vislon, lack oí
consciousness, heuristics, machine learning, understanding
model-based reasoning, pattern recognition.,obot
É-
':1:|1 ,:
- Computer Memory. ,.. " " 4
:: -ProgrammingLanguages ......,6
-,,,: , - lSPs and lnternet Access ,, ,,.., 8
-Peripherals,, ......12
,i ,-MP3Players ,.....,14
]..ll.i
''-Cell Phones. ....,,.'16
EducationandResearch,, ..,26
,.1,,,:il:_Robotics,... .....2B
l+,rf#jí i]L)aedl 2 t€
Ée.f!rnel!j3l] :Éni§
ad:l4nii!.,}*úLóled: lüa F€
virtual memory
phrases from the word bank. With a partner, act out the roles below
]::,i
based on Task 7. Then, switch roles.
,;#f#
bus speed USE LANGUAGE SUCH AS:
The program keeps freezing,
1 The computer has a of 64 bits,
To run ,., you really want to have at least ,.,
2 The computer's CPU has a
How can l fix that?
of 800 MHz.
3 This computer comes with 900
of RAM,
Your are a support center employee.
lnstalI additional tnto
Answer Student B's questions about:
the motherboard.
. a problem
Listen to and read the troubleshooting . soIutions
guide again. What happens when a . jncreasi,n9 virtua] memory
computer's virtual memory is made bigger?
,_
1_ The customer's CPU is too slow to run the use the conversation from Task 8
program.
i..,1...
'iil:
to complete the receipt.
The emp|oyee advises the customer to buy
more RAM,
3_ lncreasing the virtual memory wi|| increase 'l,, '
conversation.
Employee: Wel|, 1
G
Mr, Daniels,
As the head of the computer programming depadment,
l feel that we need to update the department's
resources. This includes our programmers. Most
of them are comfortable with the C, C++, Java
and JavaScript computer languages, We even
have one programmer who can use C#. There are
also two programmers who specialize in Python.
This language is an easy and popular programming
language, especialIy amon9 starlups.
However, we don't have anyone proficient in Swift.
l think we need some programmers who are familiar
.xml with it, That way, we can develop applications for
Mac@ computers and AppIe@ mobile devices.
,hrrcr.bmI Some of our machines are getting older, too. A few
computers need their compilers and linkers updated.
Otherwise, they'll never be ab|e to converl to machine
code efficiently. ln addition, one of our older CPUs
cannot multi-thread very well.
l3
ffi As you know, the programming department is very
important to this company's future. Please help us stay
,: .,,i, l,iiii updated.
Thanks,
Before you read the passage, talk about Sarah Jennings
these questions,
1 How does computer programming affect
lf'i:l#iiit}i :; ;.,,, .,
business?
2 Why is computer programming becoming more ,,iji Write a word or phrase that is similar in
important? meaning to the underlined part.
1 He's writing a new Ianguage that computers can
l.i process,
],], :. .:
.].
1_A Linkers allow programmers to control computers. Wittr a partner, act out the
_B CPU was the first programming language, roles below based on Task 7.
Then, switch roles.
2 A A new Java can make your computer run faster.
_B Machine code makes programming possible. USE LANGUAGE SUCH AS:
l don't think we can afford
3_A Added memory allows computers to multi-thread.
more programmers.
_B |'m learning comptler, a new programming language.
What do you think about our CPU
needs?
Listen to and read the letter from the head oí a How pressing would you say those
computer programming department to her manager. needs are?
Why will a few of the old computers need their linkers
and compilers updated?
You are a manager,
i Ask Student B about:
, o the deparlment's needs
Listen to a conversation between a programmer and
her manager. Mark the íollowing statements as true (T) or r the importance of needs
false (F). . oosslble so|utions
]he
1_ The manager intends to hire more programmers.
2_ The woman is going to learn Swift. §tudent §; You are a programmer.
3 The manager denied the request to'upgrade the CPUs,
, Talkto Student B about how to
cover currect needs at work.
il
9írr€ Before you read the passage, talk about
n*
these questions.
l
J
k§# Read the notification from an lnternet
í|
l.
/
service provider, Then, choose the correct
answers.
l
,/ ,*§ 1 what is this notification about?
A
: :l::
Sincerely,
E a data transmission method
Gina Matson
Customer Relations,
websurf lnternet
Fill in the blanks with the correct words or phrases from
the word bank, With a partner, act out the
:*
+" :. .*d roles below based on Task 7.
,í ó#
Then, switch roles.
antiv§yt".ls sq:ftware upgrade
iAiD§ USE LANGUAGE SUGH AS:
What service do you have?
1 This coffee shop has a(n)
lt allows for greater bandwidth.
customers can go online.
2 A(n) connection only requires a phone You can log into hofspots.
line to work.
3 Contact your to get in touch with you are a customer
tech support. representative, Talk to Student B
4 your service because you need about:
more bandwidth . a bill increase
5 Using protects your computer. . causes
b With , you don't have to key . benefits
in any password,
The new lines offer greater
bandwidth
., You are a customer.
,_:,ii:l,i*;';.
l
no additional charge. É
Suggestion Form GENE
Get re*dp§ Name:Harold Gibbons
Depaftment lT
$} eetore you read the
passage, talk about Suggestionl
these questions. The lT deparlment is in desperate need of new storage
devices. To begin, we need to upgrade the array. That
1 Which types of means we'll also need RA|D software. Just last week, an
storage devices do engineer lost months of data in a drive failure. An updated
people use? array will help us avoid such costly losses in the future.
2 What do people use For individual employee use, we need to order more USB
USB flash drives for? flash drives as we are no longer using optical media in
any form. Flash memory is more efficient and reliable
as well as smaller, sturdier and faster with much greater
storage capacity.
l think it is a good idea to install a hybrid array. This
type of storage combines the capacity of the HDD
with the efficient performance of an SSD. lt has a
high-per,íormance memory intelligent software and it is
cost-effective, We should also upgrade to RAlD 60 which
can suppon up to 128 drives as well as update the SATA
interJace to the 3.5 version.
Finally, with users increasingly operating multiple devices
in multiple places, GeneTech Systems would do weli
to adopt online cloud-computing solutions, Cloud
computing basically involves accessing services over a
network via a collection of remote servers,
.::,i]
ali,i],:n,,.
Reading
ffi neaO the suggestion form sent from Wm*mbu§ary
an employee in the lT department to
ffi rilt in the blanks with the correct words
his manager, Then, choose the correct
or phrases: hybrid array, SATA, cloud
answers.
computíng, HDD, SSD, RAID.
what is the main idea of the form?
1 A(n) is a storage device
A a request for new equipment which was the primary computer storage
B suggestions on improving efficiency system until the 2000s,
C where to place new storage devices
D how to speed up file transfers n'.o*u." nt*.r".. t* *
i ;'.LilT:ili"
devices to a computer.
Which drive stores more data than magnetic involves a data center
tape? with lots of servers that companies can use to
A HDD c SATA store their data through the lnternet.
B RAID D USB flash drive a A(n) is a solid state
drive which is a type of storage drive in
lt can be inferred the USB flash drives are...
smaftphones, tablets, desktops and laptops,
A less reliable than magnetic tape.
5 A(n) stores data from
B more efficient than optical devices. HDDs and SSDs.
C more expensive than a hard drive. software improves
D less efficient than optical devices. hard drive performance.
ffi Cnec* (/) the sentence that uses the §p**kin§
underlined part correctly. Witlr a partner, act out the roles below
ffi
1 _A save the íile on the usB flash drive. based on Task 7. Then, switch roles.
_B Hybrid arrays are made up of a series of
USE LANGUAGE SUCH AS:
HDD drives.
A few of the requesfs you sent in ....
SATA drives are used to increase
When would you like that?
processing speeds.
What about the main data backup?
A drive failure means the data disk drive
is inaccessible.
3 _A SSDs are available in multi-terabyte Student A: You are a manager. Talk io Student B
capacities. about:
_B AlI computers have an internal HDD . approved requests
for storage. . unapproved requests
o writing a proposal
& W Listen to and read the suggestion form
sent from an employee in the lT department
to his manager again, According to the Student B: You are an employee, Talk to
employee, what are the benefits of a hybrid Student A about your requests for storage
array? devices.
LÉsÉ*m&mg Wn§t**,lg
ffi Listen to a conversation between an ffi Vou are an employee in lT. Use the
lT employee and his manager. Mark the conversation from Task 8 to write a memo
following statements as true [í) or false (F). to your co-workers telling them which
types of new equipment were approved for
1_ The company will purchase a new array.
purchase and why.
2_ All of the requesis were approved.
3_ Management thinks a new main data a:
ij.
==
&
=.
expensive.
:::
i
Employee: 3_ ,butlguess
you've got to save money somehow. i
lj:.
like that?
Manager: 6 _ )
I
I
:+.=.-=-...=-==,=....sag+_#?---=4É:"''""",
I
; l
automatic document íeeder
, -,|
l
§
t t
€
digital camera §
*§
}
inkjet printer
l
t
flash memory
transparency adapter
3 What can you iníer írom the advertrsement? D the number oí dots used to measure resolution
A A|l new mode|s are on sale. E a device used to store and transfer data
B Not every ciigita1 camera on sale alIows flash F one milIion pixeIs
memory, G the adjustment of dev ces to correct|y disp|ay
C Compumar1 has scanners that come with coIors
auto feeders. H a device that records images íor the computer
D Some printers cannot create professional l a device that loads papers to be scanned
grade prints.
phrases írom
Fill in the blanks with the correct words or
the word bank. ] with a partner, act out the
roles below based on Task 7,
W
o r]di Then, switch roles.
ccD USE LANGUAGE SUCH AS:
1 Using blurs a photo's detail. May l recommend the ...?
2 A thicker lens will increase your camera's This one has ,,.
to l'd also like to starl
3 Digital cameras need a(n) .,,
capture an image.
.:...:..,:|. .:
(S) and il:ll._,,, ":, You are a photographer.
._l:
Listen to a conversation between a salesman Discuss equipment options with
a photographer (P). Choose the correct answers,
Student A.
1 what does the woman want to do?
A return her inklet printer
B exchange her SuperShot 350
C buy more professionalequipment
use the conversation from
D research inklet and laser printers Task 8 to fill in the customer's
review on a discussion board,
2 What can you infer about the woman?
Talk about what item you
A Her last inklet printer broke, bought, the speciíications of
B She is buying her first digital camera, the item, and what you will use
G She plans on selling her old equipment, it for.
my own pictures.
S: Well, we have some great deals on inkjet and 5
dock
s§*t r*m*pi
ffi Before you read the passage, Wn cabx§mx-5r
talk about these questions.
ffi rUatcrr the words (1-9) with the definitions (A-l).
'l What do you use an MP3 player
7_
for?
1 _ driver 4 _GB playlist
1_ The recall is for Model X.1. F the standard format for encoding sound files
2_ The driver will take up less G a measurement of the amount of daia processed per second
than one GB of capacity. H to change a file back to its original form
3_ The issue is related to the l sofiware that enables a device to communicate with a
decoding oí MP3 files. computer's OS
in the blanks with the correct words from §pe*k§rt6
ffi rlll
the word bank, ffi Wth a partner, act out the roles below
based on Task 7, Then, switch roles.
,3
driver USE LANGUAGE SUCH AS:
upload
:t l've got a problem with my ,,.
g 1 Did you the file yet?
Which model do you have?
/S 2 Computers when too many
;e That's a problem caused by ..,
programs are open.
3 You must insiall a(n)
,tt all new hardware,
tS
§tudent A: You are a company representative.
'Ialk
to Student B about:
el ,ffi ffi Listen to and read the recall notice again.
)e o problems with an MP3 player model
Why isn't the Mode!X.2 player being recalled?
st . how to solve the problem
le
le L§*t*m§mg
Student B: You are a consumer. Talk to Student A
ffi§ ffi Listen to a conversation between a
about a problem with your device.
pt consumer (C) and a company representative (R).
d. choose the correct answers.
at
1 What are the speakers mostly talking about?
A why AAC files are causing problems Wnitirrg
B where a consumer can buy a driver
§ Vou are a customer experiencing problems
C how to solve a consumer's problem with your MP3 player. Use the conversation
D which model a consumer owns from Task 8 to write a letter to the company
telIing them about your problems. Make up
2 How did the customer try to fix the MP3 player? a name íor the customer.
A install a new driver
B restar1 the player
C upload a new playlist Dear Sir or Madam,
D remove the AAC files
C: Well, l've 1 _
with my MP3 player.
R: Yes, We're 2 _
on some models. Which model do you have?
C: l have the X,2.
cal|er lD
1u#,*;$iffi:{iti,!:;ffil Bluetooth@
:}:ft [
l:i".í,;*:i§$q;iii::fi a w de
irx.:S,.,§ lfJff :1 :*tsnxth
;:ffi,:l|,,.[nilá":::T ::[.,-, r." l Read the cell phone
adveftisement on Mobile Tech's
website. Then, complete the table
using information from the advertisement.
ii':;*fiftllfi*HÉtr:t|,Éfrt* Feature Uses
voice activation
5G network access
-]
Match the words or phrases (1-7)with the
definitions (A-G).
1_ Bluetooth@ 5_ text message
2_ voice activation 6 callwaiting
3_ lithium-ion battery 7 voicemail
f*rq
4 5G network
touchscreen A a power source in cell phones
B a shot1, written message sent to or from a cell §,,ín
j*
ClarkAndrews00: Hello, Sandy. Are yo"
there?
SandyHammond: Hi, C|ark. What can l dc
Before you read the passage, talk for you?
about these questions. ClarkAndrewsOO: Sorry to contact you witl-
an instant message" But email doesn:
1 How many ways can businesses seem to be working right now. l neve,
communicate with each other? got a confirmation on the message l sen:
2 what are the beneíits of different kinds last week.
of eIectronic communication? *sanoyHammonei; we never received that
Did you send it with an attachment?
ClarkAndrewsO0: Yes, I attached my orde"
spam receipt,
SandyHammorrd: |t must have ended up
\lrP,OX{,(rE in my spam fo|der, I apologize for the
confusion.
Dn,rrr ClarkAndrewsO0: It's okay. What is the
- $\\L
status of my shipment?
SandyHammond: UnfortunateIy, we're
--,
ío A),
having technical difficulty scanning the
product EPCs. However, we have UPC
products ready to ship immediately.
ClarkAndrews00: Those wi|| be íine. We
have equipment that can read barcodes,
0I . !ü0 0A89 . D! ü 1tF - 000], b 9D{ 0 SanelyHamnrotrd: Do you have a
smartphone? We could update you via
emai|.
'|- ClarkAndrews§0: l have a cell phone, bu:
my data plan doesn't support email,
Voicemail or text messages wiIl work,
-É9''-
text you then. What's
Sln,:i,i;la,.,,-,rl; lll:tld; l'||
D He sent it from his ce|| phone. B a written message that occurs onIine
c a code that identiíies individua| items
3 What can you infer from the conversation?
D a code that identifies types of items
A Sandy does noi |ike texting c|ients.
E to read a barcode
B Clark plans on buying a smartphone.
F a representation of a UPC number
C Clark is not fami|iar with technology.
G unwanted emaiI
D Sandy has a ce|l phone that can send texts.
S rill in the blanks with the correct words or §peaking
phrases from the word bank. Wittr a partner, act out the roles below
@
based on Task 7. Then, switch roles.
.#ödF
i virtual world
W***§*as§*ry
ffi Choose the word or phrase that is
closest in meaning to the underlined part.
ffiet remdy§ 1 Jack created an image in a computer game that represents
a person.
ffi Betore you read the passage,
talk about these questions. A MMORPG B link C avatar
't How can social networking sites 2 Put your email on your webpage with personal or identifying
help businesses? information.
2 Why do people use social A profile B forum C link
networking or gaming sites?
3 click on that word or set of words on a website or document.
A news feed B link c vittualworld
a
I
Before you read the passage, talk about fi j§ Exü ie ,; l€d
these questions,
s a ld ys
1
e
How is GlS re|ated to lnformation Techno|ogy? ͧJr"".j T' 3ní T, " 1n
d is o la n fo rm o,.
xlffi{
i
at i
1|
patterns and r1l1tior;';É., ij3 "=?."1,?j i
monitor changes and
"
;;;nÍ'ry proOt"r*
plan i", i"iu.
'n"
ffi ff iil"TJ: :,'.'": í :1,,]1_, ? : " co rre a te d o n] e l
GiS applications
out" pÁoiJ.r""nil"^l.'1: l"'T of cartographíc
/ í"J, ;J" ::: : iJí[:; 7"i. "j
longitude / latitude :"i, íi ::l;
l. !:. :,
p o p u at o n "
o Á p r, ;:
",i
: T:1?3,: ["r"ji,!i"Y;
l i
existmote
-+_:_;=
--} il:i ;"fi":il'r' T3,Ii,, ". i;"; ;;.',.;,;' í" ; ;;;;
maps or irnagery
satellrtes \/eni^, .^j1l"d fi.om
,,""., oáÜn";::"Jrtormats USe SeqUentiJt Óornts,
I
V
l
are usefui for storing
outu *,ir_, tjrr-;;§J':"s,and
;, sttch as rivers,
or streets,
lntegrated data -.j
::
-} =,
V\\ -1;\,.
-\ .,};t
\:§/
Read the sentences and ehoose the correct
Read the chapter introduction. Then, mark words or phrases.
the following statements as true (T) or 1 Inforrnation that descriDes stor-od data is ca ec
false (F). GlS / metadata
1 G|S can be used to track changes of a 2 We convetled GlS Cata lf il] .trlllpuier,-i"eadab.
particular subject matter, íorm with remete sensing l cata captuíe.
2 Secondary and tertiary data capture invo|ves 3 Vector / Raster Cata §et.'i iloilta . pcl,vgones
information generated by others. with associated attr,ibuies
3 Raster and vector are types of GlS 4 Latitude / Longitude l1-os i-l,tt-,l easi-west and
appIications. are paralie tc, each othei,
Match the words or phrases (1-6) with the definitions -.|}**§:91{j
(A-F).
* Witlr a partner, act out the
,t _ cartographic 4_ e|evation roles below based on Task 7.
2_ spatial pattern 5_ correlated
Then, switch roles.
F data captured for the purpose of map making Talk to Student B about:
, . how GlS differs from other
;:; Listen to and read the chapter introduction again. ; technologies
How does GlS help professionals make informed , 3 tasks to execute for your
decisions? ] current project
. how Gls is involved in those
' tasks
;., ." 1'l
,, 1
', ii;
",. Listen to a conversation between a biologist and StutJ,*nt $: You are an intern.
an intern. Mark the íollowing statements as true (F) or
Talk to Student A about how GlS
false (F).
: will help you with your current
1_ GPS is used to analyze information. l project.
2_ With GlS analysis, they will monitor the rate of precipitation,
3_ Local maps can't be uploaded, . ,,l l',^^"
, '.]i i ,,l,:,1,
, ., ,. ,
l }|"il1 ] i.l
i,, Listen again and compIete the conversation. i} ffiffi Collect information
about Geographic lnformation
lntern: l see. So, what will we be looking at? Systems. Then, write
a paragraph about GlS
l,,
Biologist: First, we need 1 all the places
where the rare Florida toothache grass has been
applications and uses,
observed, Then, we can use GlS analysis to see the
location, elevation and rate oí precipitation each
plant receives. GlS maps can then 2 _
ln the area that have similar conditions so we
know where to look for more of the plants.
lntern: That's incredible!
Biologist: lt's very useful. We enter the 3 __, that
is the survey data and the mapping information, into
the GlS. Then, we enter the remote sensing information
such as the 4 and the aerial photos
using data capture.
lntern: Can we enter the local maps that the rangers use?
*
Biologist: Yes, we can, but first we have io 5 _ or
convert them to a 6 __ .
| # [ccpss
R§sl ll
ügnieü
Before you read the passage, talk about
these questions.
1 Why is online banking useful?
Saíe Bank 2 What are the risks of on|ine banking?
online services
&
At Safe Bank, you can
rc"tactivity organize your finances from Read the description of online banking
ffir,=:::
ÉírrtJtJ
F lrl€|
the comfod of home with our services on a website. Then, choose the
:,
online banking service and correct answers.
app. We offer a range of free
,l services to make your life 1 What is the passage mostly about?
eaSler.
- worried about a check
A fraud protection
clearing? Choose our B how to transfer money :
electronic statements C features oí electronic banking services
to monitor your account
activity. D different ways to monitor accounts
- Does a relative need
money now? Transfer
2 What comes with every Safe Bank account
automaticaIly?
money with electronic
funds transfer to other A PlN C site key
banks. B bill pay D account alerts
- Having trouble organizing
bills? Enroll in our bill pay 3 What can you infer about the on|rne banking
program and never miss service?
another payment.
As always, your security
A lt requires a sign up fee.
online banking
A site keys. account activity
B lockouts. account alerls
C PlNs, eIectronic íunds transfer
.-d
Match the words or phrases {1-5} wíth the
definitions (A-E).
With a partner, act out the roles below
1 e|ectronic funds transfer 4 bank fraud based on Task 7. Then, switcit roles.
2 PlN 5 online barlking
3 _ bi|l pay USE LANGUAGE SUCH AS:
l saw a v,tithdra.wal l didn't make.
A numbers that identify an account holder |//hat's ycur account number?
B illegal actions to access money that rs noi your.s i'l! put a t€mparary hold on your account.
C a service that allows you to manage finances on a
computer
D a way to send money to another account you are a bank teller. Taik to student
B
E a service that sends money automatically to parties about:
you owe money to n a suspicious withdrawal from hrs or her
account
Listen to and read the description of online a concern§
banking services on a website again. l-|ow can
a customer pay their bills online? " solutions
onl,ine LibrorU
No Iibrary holds every single book, periodical ar
academic journal in the world. The lnternet ca
,, change that. That's why you need the ThinkTar
Online Library. With ThinkTank, your library cou
access millions of online resources.
your Iibrary to .
n|;i Subscription to our service opens
huge catalog of content. Browse the easy to use indel
for ebooks and ejournals. Search for any topic user,
can think of. Search media like tmages, nev/spapers
magazines and audio files. Simple Boolean operators he :
narrow the search. Users can always find 1ust what they'r=
looking for.
'; People who visit Libraries can't always get to one, Remote access
lets our cIients use ThinkTank from hcme. users wiih a site license
access ThinkTank through an EZproxy server. The VPN encryption secure:
@
Our license restriction gives access to copyrighted works. Users won't fit--
these kinds of resources through normal search engines, Use of the servic.
"-"--*J for commercial reasons is prohibited.
::
] Listen again and complete the conversation. From:
wondering if there's a problem with the H the places where the pafts of a robot connect
6 constraint. l the scientific study of robots and their structure and movement
@ rill in the btanks with the correct phrases §peaking
from the word bank.
@ Witn a partner, act out the roles below
based on Task 7. Then, switch roles.
2 lf the robot isn'i working correctly, check the l checked the dynamic modeltwice,
value.
3 Before building a robot, always construct
Student A: You are an engineer. Talk to Student B
a(n) first.
about:
. problems with a robot
O 6} Listen to and read the email írom an o calculations
engineer at PowellTechnologies again. What
will be the main role of the autonomous, serial c equality constraints
robot?
Student B: You are an engineer. Talk to Student A
Listening about problems with your robot.
@ O Listen to a telephone conversation
between two engineers, Choose the correct
answers, Writing
What is the dialogue mostly about?
A fixing a serial robot
§ Use the conversation from Task 8 to fill in
the notes.
B the main uses of serial robots
C designing and building a serial robot Troubleshooting Checklist
D the main function of an enabling device
Problem: Actuators not responding
What is the problem with the robot?
properly? Y / N
A the pendant is not moving correctly ls the _functioning i
J
trJ
.*^í ,lr
Lr
*-3.
*. *,;
bitmapped graphics
We are pleased to announce that many
of our publications are now avai|ab|e
for purchase as ebooks! What are the
benefits of reading ebooks? They are
convenient and instantly available! \{e upload new books
daily. Read them onIine on a web browser, or download them
and read them offline. Ebooks are avai|ab|e on our handheld
ergonomic eReader. Read your ebook anytime, anywhere!
system requirements
. zoom and reflow features disp|ay text at any size needed.
. The active matrix display and sub - pixel rendering
provide crisp images in any light.
. Black and white photographs and i||ustrations appear as
l t
,l
.
ffirttus
+=- bitmapped graphics íor best quality.
active matrix display
On web browsers, ebooks are available in many formats -
no need to instal new software, Check our system
Before you read the passage, "ra requirements and find a list of supporled PDF readers in
t.F
talk about these questions. hj the information section of this website.
1 Why do people buy ebooks?
2 How will e|ectronjc publishing change
the pub|ishing business?
Ir
Representative: Actually, they are. We've added bitmapped
graphics to 6 _
Éi,
*;
I
,§
pattern i,ecog1,1iiion
1 Do ycu think robots will ever think like humans? Match the words or phrases (1-6) with the
2 Will artificial intelligence help or hurt br"rsiness? definitions (A-F).
Why? 1 *patternrecognition 4 _ robot
2 _cognitivescientist 5 _ heuristics
1-"'i.,]1i ,.' 3 consciousness 6 algoriihm
:
]ir
§936 the magazine article orr artificial A a machine capable of independent action
intelliEence. Tlren, mark the following B a set of rules to solve a problem that seeks any
statements as true (T) or false (F), solution
1_ Case anc] model based reasoning face G the process of classifying objects by
different complications, appearance
2 _ Heuristrcs don'i have riEid guidelines like D a sense oí oneself and one's surroundings
regular algorithms" E a rule or set of rules to solve a problem with
3 Computer vísion is irnproving pattern limited solutions
recognition. F a person who studies how the mind works
,:',;:i Write a word or phrase that is similar in i:_; :, Listen again and complete the
meaning to the underlined part. conversation.
1 Giving machines the ability to see is improving, Programmer 1: Jane, did you 1
C___u___ _i o _toreadthismonth's
í-
2_ The man believes that cognitive scientists They have a limited number of solutions.
will harm programming.
3_ An algorithm needs a perfect solution. . ll ,, You are a programmer. Talk to
Student B about:
r the role of cognitive scientists in programming
' a|oo1i]nms
.,a.:1 l.,i
:
| '
|...a;.] _.,
': ].]' t];]"r1
i.
i'} Collect information about artificial
.,-,1.a
i intelligence (Al). Then, write a paragraph
í
i
}"
explaining what it is.
/
6
;,,
,a, ..l"í""Tfl
l|ilq,+1.9+-#;
l
5G network [N-COUNT-U7] :, j:: l, is the fifth-generation mobile network that delivers high capacity, speed (of
,10
up to Gbps) and low latency by combining frequencies from multiple bands.
AAC [ABBREV-U6] ' ,' is a music file format that is of higher quality than Mp3.
account activity [N-UNCOUNT-U1 1 ] is a withdrawal, deposit or transfer in a bank account.
account alert [N-COUNT-U11] An is a service that notifies bank customers of suspicious activity.
active matrix disp|ay [N-COUNT-U14] An - is a type of screen that produces high quality, clear
images.
actuator [N-COUNT-U13]An , ,.,: is a piece of equipment that uses energy to make a robot move.
agent [N-COUNT-U-15] An is a computer that observes and reacts to the conditions in a ceftain environment.
algorithm IN-COUNT-U15] An ,,, is a rule or set of rules that provides steps to take or questions to ask in
order to solve a problem.
[N-UNCOUNT-U3]
antivirus software is a program that locates and eliminates computer viruses.
app [N-COUNT-U7] An (short for "app|ication") is a type of software with a specific function that users can
download, install and run on electronic devices, mainly smadphones and tablets.
array [N-COUNT-U4] An is a data storage system which uses multiple disk drives that are connected and used
as a single unit.
artificial intelligence [N-UNCOUNT-U1 5] is the branch of science that seeks to create
computers and robots that can reason, learn and solve prob|ems independently.
automatic document feeder |N-COUNT-U5] An (ADF) is a device that feeds muItiple
pages into a scanner.
autonomous [ADJ-U13] A robot that is can operate on its own without help from humans.
avatar [N-COUNT-U9]An is an'image in a computer game that represents a person.
bank fraUd IN-UNCOUNT-U11] )1 is a crime in which someone uses bank funds without permission.
barcode [N-COUNT-U8] A is a machine-readable representation of the UPC 12 digit number printed onto a
product and which is electronically scanned providing information about the product.
bill pay [N-UNCOUNT-U1 1] is a service provided by banks that allows customers to automatical|y pay bills
on|ine in one place instead of on different sites.
bit IN-COUNT-U1] A , is the smallest unit of computer data.
bit size IN-COUNT-Ul]A computer's,,:,:,,... measures the number of bits that the CPU can access at once.
bitmapped graphic [N-COUNT-U1 4] A is an image whose pixe|s are made up of a set number of
bits,
bitrate IN-UNCOUNT-U6] is a measurement of the amount of data that is processed (bit per unit of time).
black and white [ADJ-U14]An image or picture that appears only in black, white, and varying shades of gray is
blog IN-COUNT-U9] A ,, ,,, is a website where a person writes posts about his or her feelings, thoughts, activities, etc,
about a subject.
Bluetootho IN-U NCOUNT-U7] is a wireless network based on radio waves that connects Bluetooth-
compatible devices (smartphones, scanners, digital cameras, printers, etc.) within a limited range (30 feet).
Boolean operator [N-COUNT-U1 2] A is a word such as "and", "not", "or" that is used when
combining keywords in a database search so as to narrow down or broaden the resu|ts.
broadband IN-U NCOUNT-U3] is a high-bandwidth data transmission method that permits various upload
and download speeds via fiber optics, DSL, satellite, cable and other technologies. !
bus speed [N-UNCOUNT-U1] A computer's measures how many data move across a circuii (bus) at a
!
time, lt is measured in MHz. The faster the bus, the more data it can handle.
C [N-UNCOUNT-U2] ] , is a programming language that is used to program operating systems. J
cartographic IADJ-U10] lf data are , , they are captured and manipulated for the purpose of map making,
case-based reasoning [N-UNCOUNT-U1 5] . is the process of using iníormation from previous
experiences to solve new problems.
catalog [N-COUNT-U1 2] A is an inventory of books in a library.
CCD IABBREV-US] A (Charged-Coupled Device) is a light-sensitive chip or sensor that converts light (photons)
into electrons to capture digital photos. lt is used in light-sensing devices such as digital cameras, optical
scanners, video cameras, etc.
cell phone [N-COUNT-U7) A, ,-,: ,,,:,. , is a wireless phone that sends and receives data at a ceftain frequency of
energy.
cloud computing [N-UNCOUNT-U4] ,
is the use of various services, such as software development
platforms, servers, storage and software, over the lnternet, and is often referred to as the 'cloud.'
cognitive scientist [N-COUNT-U1 5] A is a person who studies the mind and thought processes.
compiler [N-COUNT-U2] A is a program that changes human-readable source code into machine code that
a cpu can understand.
computer language [N-COUNT-U2] A (also known as a programming language) is a code that is
used by computer programmers to create instructions that a computer can understand.
computer vision [N-UNCOUNT-U1 5] is the field and technology of making computers that have the
ability to see.
consciousness [N-U NCOU NT-U 1 5] is the state of being aware of oneself and one's actions.
CPU [ABBREV-U2] A (Central Processing Unit) is the part of a computer that handles most of the processing of
instructions and controls the computer's functions.
correlated IADJ-U10] lf two things are ,, there is a kind of connection between them and they somehow
relate.
data capture [N-UNCOUNT-U1 0] is the act of acquiring and digiiizing information from different sources
on a GlS in layers.
data plan [N-COUNT-U8] A is a contract from a cell phone service provider that states how many data
a user can access or use.
decode [V-T-U6]To a file is to return it to its original format.
digital camera IN-COUNT-US]A l: . is a device that records images that can be stored, displayed, edited
and printed.
digital zoom [N-UNCOUNT-U5] The . is how a digital camera increases the display size of an image
subject, once it has been captured by the sensor, reducing image quality.
DlMM IABBREV-Ul]A (Dual lnline Memory Module) is a newer type of memory module. lt sends 64 bits of data
to the CPU.
dock [N-COUNT-U6]A is a device that connects an MP3 player to a computer.
fr
download [V-T-Ula]To , ,,.,,, data or content is to transfer a file or program from the lnternet to a personal
computer or device.
DPl IABBREV-US] (Dots Per lnch) is the number oí dots used per inch and measures the resolution of an image.
drive power [N-UNCOUNT-U13] is the energy that makes a robot move.
F
il
driver [N-COUNT-U6]A is software that tells a device how it should communicate with a computer's operating §
system, 6
DsL IABBREV-U3] ..,. l (Digital Subscriber Line) is a high-bandwidth connection using normaltelephone lines.
dynamic model [N-COUNT-U1 3] A is a mathematical model of the forces that allow a robot to move.
ebook [N-COUNT-U12]An is a book that is available online.
is a scholarly publication that is published online. ml
ejournal [N-COUNT-U1 2] An
electronic funds transfer [N-COUNT-U11] An is the act of moving money from one &
account to another by using a computer.
electronic statement [N-COUNT-U1 1 ] An is a summary of account activity that is viewable on &
a computer, but not on paper. a!
email [N-COUNT-UB]An is an electronic message sent from one user to another. ill
enabling device [N-COUNT-U13] An is a device that a person activates to allow a robot io move, úfitr
end-effector [N-COUNT-U13] An is the hand or tool at the end of a robot's manipulator, lt is the paft of
the robot that moves or picks up objects, imr
EPc [ABBREV-U8]An l: ]] (E|ectronic Product Code) is a unique numerical code used to identify any individual item.
equality constraint [N-COUNT-U,1 3] An ,. , is a value that specifies the end-effector's position and
movements.
is easy to use and has been designed to prevent injury from ltrí
ergonomic IADJ-U14] Something that is
using it repeatedly. 0í
EZproxy IN-UNCOUNT-U12] is a library server program that allows remote users to access the library's
electronic materials. 6t
failure IN-COUNT-U4] A,
occur§ when a disk drive malfunctions and the data stored on it cannot be accessed Iió
flash memory [N-UNCOU NT-U5] is a medium that is used to store and transfer data írom a device
(e.g. digital camera)to a computer.
forum IN-COUNT-U9] A is a website where people can discuss a certain toptc.
treeze [V-l-U6] To is to become unresponsive and stop functioning. 1,1l|&
Gls IABBREV-U10] : ,l,, (Geographic lnformation System) is a system thai integrates all types of location data as
a foundation of mapping and analysis in order to monitor change, improve various processes, provide solutions,
predict trends, etc.
handle [N-COUNT-U9]A is a name that a person creates to access an account on a computer or website. nniit
HDD [ABBREV-U4]An (Hard Disk Drive) is a data storage device that works alongside a system's memory. lt [l
stores data on magnetic platters. fl
heuristics [N-UNCOUNT-U 1 5] is a type of algorithm designed to find a suitable solution to a problem wher
no períect solution or answer is known.
hotspot [N-COUNT-U3]A is a location (like an airport or a café) that provides wireless lnternet access to
users via a WLAN. m
hybrid array [N-COUNT-U4] A is a type of storage management incorporating HDD, SSD and flash llilll]l
memory.
identity theft [N-UNCOU NT-U 1 1] is the crime of using other people's personal information to take their
money or buy items in their name.
index [N-COUNT-U12]An is an alphabetical list of books in a library.
inkjet printer [N-COUNT-US] An :, : ,. is a device that uses ink to produce documents and images on paper.
instant message [N-COUNT-U8] An (or lM) is a written message that occurs online in a chat sessio-
between users who are using ihe same services (software platform).
lSP [ABBREV-U3] An ::i]:' (lnternet Service Provider) is a company
that provides lnternei access.
Java [N-UNCoUNT-U9] "i:';', ,' iS an object-oriented programming
language that is typically used for client_server web
applications.
JavaScriPt [N-UNCOUNT-U2] (JS) is a scripting language, mainly used on the Web. lt is used to enhance
HTML pages and is commonly found embedded in HTML
code.
joint [N-COUNT-U13] , , |" are the
Places where the parls of a robot connect. They allow the robot,s parts to rotate.
laser Printer IN-OOUNT-US] A '
' is a device that produces documents and images
on paper with a laser
beam.
latitude [N-UNCOUNT-U10] l ,:: . is an object's location north or south of the equator.
layer [N-COUNT-U10] A data :
is a level of data above or below another level of
data.
license restriction IN-COUNT-U12] A
is a limitation of access to a library,s electronic resources.
link [N-COUNT-U9] A '' is a word or set of words on
a website or document. When you click on it, it takes you
different website. to a
maniPulator [N-OOUNT-U13] The is the arm of a robot. The end-effector sits at the
end oí it.
MB IABBREV-UI]A ' ] (megabYte) is a unit of measurement
that measures how much information a computer
stores.
media IN-PLURAL-U12] :',i';ll;-' are the forms of mass
communication available at a library, including images, fílms and
periodicals.
megapixel [N-COUNT-U5] A,,,,, : is a unit of graphic resolution of a digital image
and is equal to roughly one
million pixels.
metadata [N-PLURAL-U1o1 , , is information that describes the content of stored
data.
MHz [ABBREV-UI]A (megahertz) is a unit of measurement that measures the speed
"
MMoRPG IABBREV-Ug]A"
of a CpU.
'' (Massively Multiplayer online Role-Playing Game)
'l':'"- is a type of online computer
game in which many people interact with each
other in a virtual world.
model-based reasoning [N-UNCOUNT-U1 5] i,Ji : :,j]- ,:.-:,j.:,::",, l, is the process of making
examining cause and eífect relationships, conclusions by
:il
optical zoom [N-UNCOU NT-U5] is a lens adjustment to make an image appear larger, retaining image
quality.
paging file [N-CoUNT-U1] A is the area on the hard drive where the computer stores data that don't fit
in the RAM.
pattern recognition [N-UNCOUNT-U1 5] is the process of classifying objects by examining their §J
visual appearance. 3,r
PDF reader [N-COUNT-U1 4] A is a program that can open and display text or tmages regardless of the
software or operating system of the user. 9}'!
pendant [N-COUNT-U1 3] A is a device that a person uses to control and guide a robot's movements.
PlN IABBREV_U11] A ,:. (Persona| ldentification Number) is a number assigned to bank account holders that helps
banks identify the holder and maintain security. -_:
playlist [N-COU NT-U6] A is a list of songs created by an MP3 pIayer user. :nl
post [N-COUNT-U9]A : is a message or news item on a website. :a
profile [N-COUNT-U9]A is a webpage on a social networking site with personal or identifying information.
publication IN-COUNT-U14] A , _,:..il,,, is a book or magazine that a publishing company releases to the public. _ll
raster [N-CoUNT-U10] A. is a dataset of rows and columns wrth pixels or cells, where each pixel or cell -F
represents a value.
reflow [N-U NCOUNT-U 1 4] is a process that allows images or text to fit screens that are different sizes.
remote access [N-U NCOUNT-U1 2] is the ability to use online library resources from outside the
l€{
library,
remote sensing [N-U NCOU NT-U 1 0] is the process of gaining information about the physical
characteristics of a region from a great distance, Examples include photos or images from satellite cameras, the
tracking of forest fires, etc,
ringtone |N_coUNT-U7]A is a sound or song that a cell phone plays when someone calls it.
robot [N-CoUNT-U15] A is a moving machine that can complete tasks automatically.
lí5l
robotics [N-UNCOU NT-U 1 3] is the scientific study of robots and their structure and movement.
SATA [ABBREV-U4] is an interface for connecting storage devices to the motherboard so as to transfer data.
*,r]
scan [V-T-UB] To a product is to use a laser to read bar codes and convert them to electronic signals.
serial robot [N-COUNT-U1 3] A is a robot that consists of a sing|e series of joints linked together.
1E
slMMIABBREV-Ul]A,,,,, .(SinglelnlineMemoryModule)isanoldertypeof memorymodule. ltsendsupto32bits
lilil.
of data to a cpu.
site key [N-CoUNT-U1 1] A is an lnternet security tool that conf irms the validity of a website.
site license IN-COUNT-U12] A allows users to access software regardless of their location,
social networking [N-UNCOU NT-U9] is the activity of socializing online with other people. This
takes place on social networking sites, forums, blogs, etc.
spam [N-UNCOUNT-U8] is unwanted email, like advertisements, sent to large groups of people. Some email
providers direct spam to special folders so that users do not have to see or open tt,
spatial pattern [N-CoUNT-U1o]A , ,._ii::::,i ],",,
in data is the occurrence of individuaI entities in a Iocation and the
relationships that are formed among them,
ssD [ABBREV-U4] An , , (Solid State Drive) is a data storage device that typically uses flash memory. SSDs access
data faster than HDDs,
SSL connection [N-COUNT-U11] An §§§- (Secure Sockets Layer) ccnnectton is a secure connection between two
serverS,
sub-pixel rendering [N-UNCOUNT-U14] §r-lh-pixel rendering is a process that increases the clarity of text on ceftain
displays.
subscription IN-COUNT-U12]A subseription is an agreement to use something, often requiring a fee.
Swift [N-UNCOUNT-U2] The §wiít programming language is a language that Apple@ developed for various operating
systems, including some of its smaftphone operating systems, as well as desktop platforms.
system requirements IN-PLURAL-U14] S§e*t*rr: r*quire*rents are the hardware or software needed to run a
program.
T-1 IABBREV-U3] T-1 is a type of |ine used by businesses that connects many users at one time to the lnternet.
T-3 [ABBREV-U3] T-3 is a poweríul line made of 28 T-1 lines.
text [V-T-UB] To text someone is to send them a text message.
text message [N-COUNT-U7] A text mes*ag* (via SMS) is a short, written message that a person sends to and from
a cell phone.
touch screen [N-COUNT-U7] A t§u*trr *sr**í} is a display on some cell phones that you tap to access its features and
applications.
transparency adapter [N-COUNT-U5] A tr*rusparency adapt*r is a device that is used with a scanner to capture
see-through documents like slides.
UPC [ABBREV-U8]A UF# (Universal Product Code)is a 12-digit number used to identify consumer items.
upgrade [V-T-U3] To uBgratde a computer program or a type of service is to improve it.
upload [V-T-U6] To uplo*e* a file is to transfer it from a computer or device to the lnternet or to another device, such
as an MP3 player.
USB flash drive [N-COUNT-U4] A U§§ §§**$t *rlve is a portable flash memory system that uses a USB interface to
connect to a computer and transfer information.
vector IN-COUNT-U10] A v*ctor is a dataset of points, lines and polygones, or vertices that are used to represent
something.
virtual memory [N-UNCOUNT-U1] Virtual rnennory is a method of computer data storage, The computer stores data
temporarily on its hard drive instead of in the RAM.
virtual world [N-COUNT-U9] A virtual w*n§a§ is an online wor|d where you can meet and interact with other people or
computer players,
voice activation [N-UNCOUNT-U7] Voice *etivation is a feature of some cell phones that lets you dial a number by
voice instead of by hand.
voicemail [N-UNCOUNT-U7] Voicemail is a feature that lets you listen to or leave an electronic spoken message on
a cel| phone.
VPN [ABBREV-U12] A VP§§ (Vit,tual Private Network) is a way to encrypt a connection when you use remote access,
Wi-Fi@ IABBREV-U3] &íi-Fi& (\ffireless Fidelity) is a wireless networking protocol and technology that allows devices
within a limited area to connect to a wireless router that in turn connects them to the lnternet, creating a network,
WPS [ABBREV-U3]WP§ (Wi-Fi@ Protected Setup), sometimes also described as "push n' connect", PBC, QSS, etc.
is a built-in feature in wireless routers that makes it easier and quicker for devices to connect to a router without
entering passwords.
*
t
i
l
i
ll
l1i
:
/ffi,
\3 )
Virginia Evans
Jenny Dooley
Stanley Wright
z,E&N.
Express Publishing
Scop* a** §*qaaeatce
Reading Function
Unit Topic Vocabulary
context
1 Mac@s and PCs Magazine Ápple', color matching, customize, Mac@, Microsoft@, Stating
article OS X@, PC, prepress, processing speed, typography, a preference
video subsystem, Windows@
2 Linux@ Email command line, free software license, Linux@, Linux@ Expressing
distribuiion, Microsoft Office@, open source, OpenOffice@, doubt
Samba@, TCP/IP protocol, terminal, Ubuntu@, vendor
3 Connecting Email anchor, applet, CAD, CBT, electronic bulletin board, Giving
to clients and FAQs, Flash@, media player, MPEG, multimedia, reliability an opinion
Employees
4 Contract above the fold, ad product, animated GlF, campaign, Confirming
click-through rate, click tracking, commission, CPC, information
CPM, frequency capping, geo targeting, hang
5 Automation lnvestor automation, CAM, embedded system, encoder, Ethernet Asking for
report network, fault tolerant, integrated circuit, latency, open suggestions
system, oscilloscope, priority inversion, redundancy
6 Telecommuting Letter Basecamp@, centralize, color-coding, dashboard, gallery, Describing
in real time, message board, Microsoft Teams@, SkypeTM, features
telecommuting, toggle, tour, web-based, Zoom@
7 Hackers and Newspaper anti-antivirus virus, hacker, host computer, imbed, infect, Discussing
Viruses articIe log in, overwriting virus, piggybacking, replicate, resident possible
extension, resident virus, virus consequences
8 ldentity Theft Letter card scanning, cyber, malware, pharming, phishing, Discussing
pretexting, scannel spyware, Trojan horse, worm suspicions
9 preventative Email attack, audit log, authenticated, backdoo1 bug, firewall, Expressing
Measures intruder, keylogger, patch, pop-up, protocol, security necessity
breach
10 Antivirus Advertisement backup, block, cyber criminal, detect, false negative, false Correcting
Software positive, quarantine, rootkit, security software, sweep, virus a false
removal software, webpage analysis impression
11 Cloud Newspaper CDN, deployment, elasticity, laaS, PaaS, pay-as-you-go, Giving positive
Computing column private cloud, public cloud, SaaS, scalability, utility feedback
computing
12 lmproving Magazine ADM, bar coding, CDSS, CPOE, EHR, EMM, implanted Giving
Health afticle microchip, interoperability, lab-on-a-chip, microrobotic instructions
tweezers, optic scanner, PACS
13 Creative Website egress filter, ingress filter, keyword, mask, natural Discussing
Design language, PCl compliance, redesign, root directory, trust options
logo, web portal
14 System Job configure, cover letter, duty, file archiving, install, Talking about
Administration posting performance tu n ng, purge, résumé, system adm
i i n istrator, qualifications
technical, troubleshooting, Unix@
15 Programming Job back end, component, editor, interactive, PHI , Discussing
postings programmer, script, user-friendly, Visual Basic, web degree of
developer, XML difiiculty
Urritl -Mac@sandPGs .....4
Unit2-Linux@ ........6
Unit4-AdvertisingandMarketing ,....10
Unit5-Automation.. ......12
Unit6-Tetecommuting .,..14
§,.!nlt7-HackersandViruses.,,., ......16
Unit8-1dentityTheft ......18
Unit9-PreventativeMeasures .,,,..,.20
&Jmit10-AntivirusSoftware ,,....22
L-lnit13-GreativeDesign ,.,.....28
tlnit 15 - Programming. . .. . 32
§lossary .....,. 34
*
,
tr-*"
Mac@ Pc
:§e -. '1i
\_.r É..
á# l
§e% :.. .,;i3§ ,§i,'
-r.§ §.
iá
l -- j
i
.§5F-s
processing speed
..,."_.#
,t'{.éái$,Éiil
As Apple@ grows in popularity, the Mac@ versus PC debate Meanwhi|e, PCs are noted for their fast processing speed
continues. Many businesses experience troub|e choosing and adaptability. Users can customize a PC to their needs,
between the two. However, businesses must rea|ize that each Additionally, their video subsystems are more powerful, This
computer is suited for different needs, makes PCs desirab|e for game designers and others who need
The two differ most in their operating systems. With a PC, advanced graphics.
you have a variety of OS options from Microsoft@ and other However, both computers have their limitations. While PCs
sources. Mac@s come with one of the proprietary Apple@ OSes are cheaper, they are also more susceptible to viruses. Mac@s
like OS X@, You can install Windows@ on a Mac@. but many usua|ly cost more but are less susceptible to compuier
users prefer the Mac@ OS regardless. viruses, However, Mac@s tend to have fewer third-party
Mac@s have proven themselves vita| in publishing, particu|arly software options than PCs. Businesses need to consider such
the prepress process. Mac@s have superior typography and concerns and make the right decision when buying computers
color matching. Once printed, products look exactly as good for their companies.
as they do on the computer screen,
,.,, Before you read the passage, taIk about Match the words or phrases (1-7) with the
these questions. definitions (A-G).
1 Why do people prefer one operating system 1 _ Apple@ 5_ processing speed
over another?
2 _ Windows@ 6_ video subsystem
2 How might one operating system benefit a
3 _ customize 7_ Microsoft@
company more than another?
4 _ oSX@
'] ll' ,
A company that creates the most common PC
', operating system
Read the computer magazine aÉicIe.Then,
mark the following statements as true [r) B part of a computer that creates visuals
or false (F). C a measurement of how quickly a computer works
1_ Mac@s are generally more expensive than D operating system for PCs
PCs. E changing a computer for your needs
2_ PCs are better suited to publishing. F operating system for Mac@s
3_ PCs have fewer options from third-party G company that creates Mac@s
software producers.
Fill in the blanks with the correct words or phrases:
aia
a a,,.'i
Mac@, prepress, color matching, PC, typography, §l} Wittr a partner, act out the
comes with OS X@,
roles below based on Task 7,
Then, switch roles.
1
procesS,
2 Publishing software is needed for the
3 Good _ means anything printed out USE LANGUAGE SUGH AS:
looks exactly like what's on screen, We're swítching to PCs,
4 getting a because l like the windows@ os,
l',m l'd rather get ,..
,
Listen to and read the computer magazine article
again. What makes the PC more popular with game You are an employee.
designers? Talk to Student B about:
. switching to pcs
r benefits of pcs
Employee 1: Okay, l'll give you that, But Mac ^s have 5 _ ld-
don't they?
Employee 2: Maybe a little, but that's mostly wiih video, and we
barely use it,
i'iáö: granOon Peters
'io, Shir.luy Totnx,n,
Switching to Linux
'§_ur:le;1,
with communjcatron
system, The sy,i"*
u rife
ooerating on upqrading our software
about these questions. tn"-il,tun" we spend
threats. Then. ihere's Unux9 or some other
Á,"Ön"=trnq.il":*]':1.1:
1 How is Linux€] different from other every vear. That's why
Übuntu' is very popular
with users,
operating systems? OS ieiated to Unix , ror ""*u',ipr", both Mac6s and PCs,
Linux@ works with
any naiáilaL- rnctuOing
2 Why wou|d a business use Linux"?
source and many oí
tis,programs have a
Íree
Linux@ is {ree, open Oi,t,inutions from vendors
software license, *";;;;i iii*d For examPle'
pá"xug.. that we can use'
that have entire softwaiu does,
tiat tVticrosoft Office@
OpenOffice@ Oo", "ÜÓin*9
i
i ,ve taked ,"
1i:l*il"liff[:::: t&xl,l}i,:["+i]i;i[]
rnto a lines
l
l [ ;;ru";;ll ffiiffi*J ,."qui,.uo entering command
op:rati:9:jstems use a graphrcal
i § terminat. Aciually, rn"rrv 'irrr.],^edesktop operairng system,
§ iliJli"[ ir.i
r,x" ir.."
"u",ug, §ambac'
with a Prooram called
§ ns for neiworking, Linux@ comes io interact with Windows@-basec
& rni. program ,rro*,inu*á áon'' have to worry about
prinier trouble
§ clients. This means *"
TCPilP protocol ls reconfigured,
ou"r. ihe network
§ ",;;Í;
if you have any follow
up questions,
§ Please let me know
Brandon peters
c;*x&
l
;"* F_ -' -:
,i, Read the email from the owner
-,*
of a web design company to his
employees. Then, choose the
correct answers.
What is the emaiI mostly ta|king
about?
A a dissatisfied new client
B a description of a new projec:
secure our uleb design seruices, His company specializes in CAD B CAD D applets
formanuÍacturingÍacilitres.He.llbesetldingusthe!nÍormation
he's told what can be inferred about a
he wants included in the website soon, ln the meantjme,
us what his requirements are for this p|,oJect, FlashE,piayer,?
First. he stressed a very professional appearance, so
that means A lt is not very reliable.
applications c|uttering up his
no applets. He doesn t want small
should be done B lt plays video from MPEGs.
page. lt also means no anchors. so all navigation
through the menus.
c lt is easier to use than other
clients media plal,ers.
Second, he watrts separate sections íor employees and
For his employees, he'd like an electronic bul|etin board D lt has lower quality than othe,
to streamline communication and a cBT sectlon to keep media pIayers.
his employees up-io-date with new training requirements,
For his clients, all he requires are a helpful FAQs section
and
amultimediasectionwithamediaplayershowcasinghis
company's capabilities. He'll serrd us an MPEG fl]e rryrth
the
us using
footage and images he wants included, He doesn't watlt
a Flaéno player becar_tse he doesn't think the quality is
good
enough.
The rest is up to you, but remember our emphasis on reliability,
Frank uavloson
Davidson Web Desi9n
anchor
Voeabulary
& * Listen again and complete the
@ rUatctr the words or phrases (1-9)with the conversation.
deíinitions (A-l).
1 _cAD 6 _ Flash@
G: l see. And how is that 1 =---=- ? ,.-
E: Actually, we're having a little trouble with
2 _FAQ 7 _ anchor
it.
C: Why's that?
3 _MPEG 8 _ media player
E:
4 _CBT 9 _ e|ectronic bulleiin
Well, the 2 you requested
won't work on all computers. l'd suggest using
5 _ multimedia board 3 player instead.
facilities -
to be able to see everything clearly.
Listening Writing
() O Listen to a conversation between § Vou are a new ctient of a web design company. l
a client (C) and a web design company use the email and the converóation from
employee (E). Mark the folIowing Task 8 to write out your requirements for your
statements as true (T) or false new website (120-150 words). Talk about:
F).
1_ The multimedia section is not finished.
o Who you will communicate with on the website
. .l,] ],'i",!
u. ány commissions charged to us by the website that is relevant areas avoids wasting money,
hosting your advertisement will affect the rate, _e_ t__ _t__
] hang
Cc ,gle
animation always get a better response,
___m___d G__s
Some ads prevent a website from loading all
above the fold the way.
i}$f §,§|\
n
tY |!l'].":'
-'*,*-".i.-,j;.*,
..., -...=..
S ritl in the blankswilh
tl,e correct words
com míssion, above or phrases: §peakürx6
tne roia, 6|r"r"ir r.
t website is asking for
@ Witrr a partner, act
|he a high out the
to host ads, roles below based
2 on Task 7.
Ads that are Thenn switch roles.
but more visible. are more expensive,
3 The last UsE I"ANGUAGESUGH
A§
increased sales. l have some questions
about .,,
# d
e o n l n e..a d v.e rti s n g
th
And that's ,.,?
il:li
a
;n;" 3 " 9. I" i
c om pany
H", Whv would an advertis;;;;";i.il|i.ing
i
Could you exptain
that?
geo targetinjl'
Lümtenríng
Student A; You are
w ga Listen
to t
between a callerand
an adverlising
employee. Talk to
online an. :ompany
company employee. Student B about:
correct "6u"61|_Tversation Crroo.". ii J.
.
"n"*""".,§ billing options
1 What is the caller
asking about?
r the most popular
option
A which bar is most popular
r how location affects
the rate
B why,nu .]n"
c how,",".'J;;','fi."iJJ:[".
D how to change an
advertisernent's location
2 whatcan be inferred
about the calter?
A He has noi cted a
Pricing option,
B He thinks D rates are too high.
Writing
C He,o,t,",,o]onovan's
D
O 1o, are an ontine advertising
He *".o company employee.
"'il]iffiI,jJ'[X,l1il,. website,
contract and the
Use the-
conversation
& g* Listen
again and complete
the conversation.
from Task 8 to write
advertising with your"b;;i;;;
Employee: company
Well. 1 works (í20-150 words).
Talk
_- fl
_ ] meaning ffiu;;n*
about:
::'
every _ r"t" t*
Caller: And that's the
1,000 people wr,o
ui"ó il;;;;ff'" .
most 2 -
The banner options
Employee: yes, that,s
correct. o The billing options
Caller: lsee, So, a How the rate is determined
how do you determine
3
-
is going to O"i--.-.-.-.--t-_- -oPtion? a What your company guarantees
Employee: There
are actually two things
that affect that. The
the banner is one
Caller: Okay. Could of them.
you explain that?
Employee: sure.
Banners that are. above
the fold are more
odveríising
expensive. That's just
because p;"il;;;:ihave
to
-.--.--.-.--.-..-.--.__-
Caller: l see, The contract
o mentions something
6 "tu about
- -
Get ready!
passage,
Q eetore you read the
questaons.
talk about these
1 Why do companies use automation?
2 How has automation advanced recently?
Reading
@ Reaa the investor report on World lndustries,
Then, choose the correct answers.
equipment. Oui devices have a high redundancy for simple D lts latency time is too low.
replacement.
Equipment at World Indusnies is designed to work fast and
nara. an of our machines have the lowest possible latency
úme and a high fault toleranL Our software is protected
from priority inversions that could lower production, 6k*&
Oscilloscopes monitor all of our hardware to ensure that
any problem will be repaired immediately by our trained
engineers.
our invesínents in automaúon have rewarded us with success,
An investment in World Industries will do the same for you,
B
Hffi
1:§;:."1 ,;-; "1 ;1-t
i.*r !t;:,;.!'j:,j
,,, Listen again and complete the
:i::i Match the words or phrases (1-7)with the conversation"
definitions (A-G). Lei's 1 ___. Take
1 Ethernet network 5 automation a look at that conveyor belt moving the
soda bottles forward. 2
2 _ fault tolerant 6_ open System
Engineer 2: Yeah, it looks a little jerky.
3_ priority inversion 7_ CAM
4 _ encoder
Engineer 1; Let's3 _atthe
oscilIoscope pattern.
A a device that relays mechanica| data io a network Engineer 2: Yeah, something is definiteiy wrong.
B the ability to continue functioning after an error Engineer,t: Very good. 4 on how to
c this links computers together at high speeds fix it?
D the use of machines to perform tasks without Engineer 2: How about checking the 5
human assistance ? Maybe the cotlipi:ter can't
communicate.
a system that can use many diíferent types of
machines Englneer 1: Good idea. Let's check it oui, Does this
computer log look normal tc yor,r?
the use of programs to control machines that
manufacture products Engineer 2: Well, the Eihernet connectjor- is fiile. but
6
G a soítware problem that can |ower production
él
i I
l
Mr. Tobin,
l= |'m writing to you today on behalf of several employees with a request to
star1 a telecommuting program here aIZone So|utions. To do so will require
changes, but they would ultimately benefit our company,
l suggest that we invest in Basecamp'. lt's a web-based software
package,
Re§árdless of where we're working, it will increase productivity. BasicallY, we
would centralize all projects. communication and updates,
Basecamp opens in any browser, so employees can use it from home
or the ofíice. And tt's easy to navigate. so there's nc training 1equired,
color-coding identifies different projects. The dashboard displays
recently accessed files. so we can ail see what is bern9 worked on. The
proleci gallery allows everyone to toggle quickly between files. And a
message board is updated in real tirne io facilitate rapid exchanges.
ln addition to Basecamp . free video conferencing software such as
^1t
SkypeTM, Zoomo or Microsoft Teamsu] can be downloaded for any
communications that require speaking person to person. we can have
* _.,] conference caIls with clients around the world without even needing
,,l,ii discuss the issue wrth you. Additionally, both Backpack@ and
skypeTM offer tours with detailed information about their products.
tp}u't#
-ü ,1
l look forward to your response
t
* E
$i
-jilj
' !. '.i,iií
,,íl.:F,:!+- l', Sincerely,
áh
Erica Robin
message board
telecommuting?
B lt requires users to pay a monthly subscription.
2 What are the challenges of
telecommuting, for workers and
C lt provides better sound quality than phones,
L-.o é
, ',a:
A being updated as new iníormation arrives Manager: Let's start with production. l'd need
a way
B to swiich from one file to another to check that people are getting work
C a display that shows recently used files done at home.
D available on the lnternet Employee: Absolutely, The Basecampo program
E a series of pages that offer information
about a
would take care of that.
product Manager: Really? l 3__the tour,
F working away from an office using technology but l didn't see anything about monitoring
production.
Employee: lt's on the dashboard. lt shows all the
files
Place the words and phrases from the word being worked on, and who's working on them,
bank under the correct headings. Manager: Okay, 4
Now, what about communication?
Würd Employee: Well, there's the 5
Basecampi. i*:,r"lr i5;: i:*:,3l
Zoom@
underlined part.
t,.l Wittt a partner, act out the
1 Email is used to contaminate computers with viruses. roles below based on Task 7.
i___c_ Then, switch roIes,
2 Enter identification that allows one to use a computer first.
USE LANGUAGE SUCH AS:
L__ _n
Have you seen thls article in
3 Some viruses can make copies of themselves.
today's paper?
r___r__t_
How much damage are we talking
4 lf the virus inserts into a disk drive, it will be hard to delete,
about?
mS
5 Viruses that become par1 of files but do nothing until activated
Something like that would ruin the
Company.
can go unnoticed for months.
R___d__t _,r,s__
::]',' , . Listen to and read the newspaper aÉicle again. How : Talk to Student B about:
did Greene gain unauthorized access to other peop|e's . viruses
computers? r potential damage to the
company
:,,. Listen to a conversation between an employee and §j:i.rit::-:i §: You are a manager.
his manager. Mark the following,statements as true (T) Discuss consequences of a virus
or false (F). attack at work with student A.
l
in files and disk drives.
..} j
;'iii.lii:i:- 'jiIl,;1-._.,
il
*l$i! N].aghónk aollt
phishing pharming
Card scanning is one simple'?,, :1:Yl:,:,j^'il: 2 Pharming relies on the use of card scanners.
:.lffi #;"".;;.";acard=,:i::"]:""_,^"::::"T:,n
debit cards
3 Trojan horses are spread bry pharming sites.
ii'l"r..r"',"" .'á,"J "" credit or _91: .::x,"
as well
|]:'illiHi" ,"Ü"i o,ssporl iníormation
tmatl
Email atscl vyr-, --
lLJ opportunitie,
presents
also pIüJvl l:i "*::j)"li?.
,"":::,:'1:?l^ lware. This
,
;;;
:
)IJalll';;"solicited | emails,
Trojan n.,.""..
horses, Write a word or phrase that is similar in
malicious software tnc ;ludes spyware,
:
onÓ',
":..:*":.lo^*:fl i
il:#il-;;ilT"n is conducted ::::""il3*
atso
1 l had a lot oí malicious software on my o|d
iH. #;;;, *;;; ,;i;""s trick oeool1]::":'::?
to represeni a legitimate
T:[ ,
computer.
information by pretending
lr
business.
phishing but is often done over
2 you have a malicious virus that seems beneficial.
Pretexting is similar to , ___an __r__
Úr,,n a hacker redirects
the phone, Ptrarming ol,u" 3
bv t|em_ The site looks Tricking peop|e into giving informatron through
someone to a site op"rut"a
intt giving away personal email is a serious crine.
legitimate and tricks [á"o" P h_ g
information.
the victim oí identity theft, 4 |t's a program that gathers personal information
lí you believe you may be steps to ensure that _p__ _e
W" willtake
contact us immediat,Ü,
your assets are safe,
5 caoturino information stored on cards is a new
form of stealing,
.
___d _c ___n
6 Using a legitimate-looking webstte to trick
people foo|s rnany peoo|e.
Pm
ff rill in the blanks with the correct words from the word §p*m ful§<tpg
bank.
ffi Wittr a partner, act out the
roles below based on Task 7,
Then, switch roles,
Worm scanner
1 The man on the phone was parl of a USE LANGUAGE SUCH AS:
2 lgota l think l received a phishíng
in my email and now my computer
won't work, scam.
The criminal used a Did you emailthem that information?
to steal the
information on her card. lt even linked to a site that looked
4 Avoid crime by being safe on your
official.
computer.
l
ffi eetore you read the passage, talk about
these questions.
í How do people keep their computers safe?
2 Why would a company worry about security?
Fd**#E§1{}§
the software supplier is releasing a patch ihat will C reviewing the audit logs.
fix this error. We will inform you wh'en this patch D looking for authenticated programs.
becomes available,
However, this provides a good opportunity io 3 What can you infer about Harper Company?
remind you of the measures we must take to make
our network safer.
A They have authenticated the patch,
Remember, you must keep the firewall settings as B They already have a virus scan program,
strict as possible on your computer, This prevents C They allow many authenticated programs,
attacks from hackers and keeps certain types of
malware out of the system.
D This is their first security breach.
§
{$ -: Listen to and read the email ffi Witrr a partner, act out the roles
below based on Task 7.
about safety measures again. Then, switch roles, §
what should users do when
pop-ups appear on a web USE LANGUAGE SUGH AS:
browser? What about your browser?
D
How high are your settings?
;.i§ i ln § You need to lower the level if you
,:=l;": want your programs to work.
il;l
causing the employee's
problems. ;;. il;fi;;*.,-.",*;-
_ i ::_l-- :1,I"" programs -' rlvv v
!
|l
The browser cannot access wlth accessing online.
any online information. -**- *-*-_ _-. .: j
!
settings are too strict. bWx,n§#mg
I
i F
'
\
"i,
Webpage analysis \
§
a
t
*s"#
*'#alffi €.
?:
z
,',",'='=_,
cyber criminal
v" ;liffi! 'i
! 't
a{lru*;
t
'i
z
_--.,á
§i -,.'' &'€ = ;;r -
virus removal software
,:^
Antivirus P/us is an update of our first product. Antivirus,This
antiv rus software sweeps your computer system to detect
Read the antivirus software advertisement.
viruses. A|| viruses are ihen quarantined so they cannot harm
your computer. lt's the most re|iabIe software on the market,
Then, choose the correct answers.
providlng fewer false positives and false negatives than any 1 What is the advert]sement most|y about?
other software.
A damage that rootkits can cause
RapidClean is a virus removal software that destroys the
mal cious software discovered by Antivtrus P/us. This includes B k nds of webrpage analysis
rootkit viruses. These viruses are designed to disgulse C types of security soTlware
themse|ves as a pad of your computer's operating system. Th s D how to prevent false negatives
makes them very difficu t to get rid of. Most security software
won't destroy rootkits but. lvith RapidClean, you can, 2 Which oí the fo||owlng is intended to b|ock
unsafe Internet pages?
Defender is the u]timate security software, A combination of A Antivirus c webAdvisor
both of our software packages, Defender keeps your complter B RapidCIean D Antivirus Plus
complete|y safe from cyber criminals, Defender also comes
with our computer backup service. This means that the data on 3 What can be inferred about fa|se negatives and
your computer's hard drive wilI be backed up on our company's false pos tives?
servers. With Defender. you cannot lose your f les,
A They aid virus detect on.
backup B They disrupt webpage ana|ysis,
block c
i
#) This site has been blocked because it
D
They mark the presence of a virus,
Tiey occur in n,ost art,virus pro9ranls.
may be a security risk. Do you Wish to
continue?
..,,,,::,l,,, Listen again and complete the
Match the words or phrases (1-6) with the conversation.
deíinitions (A-F).
Caller: Well, l almost fell for a 1_ scam
1 _ backup 4 _ sweep last week, so l'm worried about that.
2 _ rootkit 5 _ quarantine Employee: Our WebAdvisor software can help you
3 _ block 6 _ cyber criminal there. lt performs 2
for all the websItes you visit.
A a person who commits illegal acts online Caller: Okay. Will it 3_
B to stop a website from being loaded from viruses, too?
c to isolate a file Employee: No, it won't. You'd need Antivirus Plus
D the creation of a duplicate copy of data with RapidClean for that.
E a virus that hides itself as part of an OS Caller: So, l have to buy 4 __
F to search a system for viruses
?
\
. Listen to a conversation between a
caller and a software company employee,
1
Mark the following statements as true (T) or You are an antivirus software company
íalse (F). employee. Use the advertisement and
1 The caller lost money in a scam. the conversation írom Task 8 to write out
suggestions for a potential customer
2 The woman recommends software that
(120-150 words). Talk about:
provides webpage analysis.
3_ The Antivirus Plus program comes with a
. Which types of software are available
backup service, . Which software you would recommend
. Why that particular type of software would be
helpful
I
í É
G
q:}
?
Before you read
the passage, talk about these questions.
ffi
Match the words or phrases (1-6) with the
definitions (A-F).
application
1 _ pub|ic cloud 4 _ PaaS
2 uiiIity computing 5 private cloud
3 scalability 6 laaS
Developmenttools, operatingsystems
A itrternet servlces available for a fee
database mana9ement, B Internet services available to everyone
bu5iness analytic5
C a clouC servlce providing servers and
&&
netvlorki ir g resotj rceS
D a ciouc] service providing an OS. servers.
storage, networks. databases
E=:5 __ö-
Networking Data center physical
E potentlal for a system to change size
servers & §torage Firewalls / security plant / building
F contputing as a meterec] service
s rill in the blanks with the correct words or phrases from §peaklatg
the word bank.
S.* Wittr a partner, act out the
roles below based on Task 7.
Thenn switch ro|es.
depIoyment §li\_,_ss_v$ij_$,i: i:l]::l:] , ] ü§3M
USE LANGUAGE SUCH AS:
1 Thanks to pricing, we're only
billed when we use it. l was readíng this column
2 Set up a(n) to increase the
on cloud computing,
available bandwidth, How exactly would it help?
Cloud computing increases the Deployment is really easy.
of our computer systems.
Use to avoid installing new
programs on each computer.
5 Cloud computing makes of new
software much easier.
d
bar coding
fr;"!:fJq:"ffii"íil *t-ifitq;*{tnnfu:,u*m
öi§*§jijí:br=u
gffiffiii::l*:ll]"*;
íj,:,-":l",t ,,H3};T,^"l*?x:,§."Jiil
"3,
wth the
#
lr
"*.
§ i
optic scanner €_
*
u,f §=
#
=r,..*t "{
implanted microchip
""qry
A!lhl,]am,'pilValÉ alea"
ÁuilrDlgeslDomain /priVale/
ilip:, ninoImy dOiVpliVni92/
A!lhDigestFiie I!ell/a!th/ diO€sl _pW
root directory
Fil! in the blanks with the correct words or phrases írom
the word bank. , With a partner, act out the
roIes below based on Task 7.
$iord Then, switch roles.
-::::.-]. ii,jii.: egress fiiter keyword
trust logo USE LANGUAGE SUCH AS:
l'd like to improve my
A(n) prevents people from sending
buslness3 website.
mali cious software to you.
we mask customers' information
A(n) shows that information is safe
when they enter it.
on a page.
l have two suggesílons.
3 the website so that it's more interesting,
4 Our site shows up when peop|e search the
"hardware". You are a webpage
5 A(n) prevents malicious software from designer. Your client wants he|p
leaving a network improving a website. Talk to
,)
j,, l,r. i í:lii'jF.fa1l :
i...€ 1., ;i. i 1,: §_,*'L§ *l :.
"ll§ §J;
administrator
a d m i ni 1(] lull
1
:
#;riúü i;réetting up and J[?
maintatntng 1 What are the main responsibilities of the
a'JfrT'$:';'[§§, :#ilÍ,,system,s"T:::,"
ál nn l b á uti e s w il l i nv o lv e :
advertised position?
" "
] instatling and maintaining
A configuring and purging file archives
hardware and
o Configuring and *öi,irrÉ,",puter B organizing and maintaining computer systems
peripherals C
, ;e tuning oí networks
D
troubleshooting and backing up damaged files
fi :."i:iiöi'ili,Fi§ásm *m a#ii.:fiü
researching and improving computer
hardware and peripherals
5,1?","iii .ffi !+rii* : g*: Hl fl ;l,ffij1fi
§;-ffi
uavnup" .."*l, ]
i
Why is information deleted from the system?
weexly baekups,, Ií]€5€ rdministratorwill
iu;;i; beooming
cjataírom lost or_damagT.,].§,,i*o.
becomtrt9'"-..ö;T;;íá ln addition,
arcniving. .n
A to make room for new data
oáta to protect B to protect clients' data
il-_"j..J,;?,fffiln r:Jr'.ffiil o*n"-",n
think and
C to organize system logs
íor this lob will b*:!]:^,o D
i'fJilTꤤ,,l-,- to repair system servers
,", q,."xr,, n" :],jTxii*:"*;:l;ffi""'.:J,"J;.fl
What is NOT needed to get the job?
a technica| íield. L,artu:ua* ** **ir**g v.lith ad$itionai
Ti::iT::l1,1,3'35;,Y,í"il§H;;**;*;:3:1fJ;; A familiarity with a Unix@ operating system
worxing with Unix', B holding a degree in a technical area
rs a pirls,
oÓ*rátiig systems egveí l€tt6íts
lnterested applicants "u"
,unO a résumé and C experience offering troubleshooting help
hr@belltower,net, * ,"*: D experience working as a system administrator
duties i
t Match the words or phrases (1-6) with the
definitions (A-F).
\"'#-
":§§:"
§ , - )4o' 1 _technical 4_ configure
\
\ 2 _purge 5_ troubleshooting
]fre]
\W^*
-t l 3 Unix@ 6 cover letter
, purge
A to modify or arrange something
'"
,t]., .,__
resume B involving science and industry
C a computer operating system
D to delete files or data from a computer
E the process of identifying and fixing technical
problems
F a document that explains why a person wants,
and is qualified for a job
$ Write a word or phrase that is similar in meaning to the §p*ak§rtg
underlined part.
ffi Wittr a partner, act out the
í With some adjustment to increase efficiency, our network ro|es below based on Task 7,
would be faster. Then, switch roles.
_e___r_a___ t__i
2 List all previous jobs on your document showing qualifications. USE LANGUAGE SUCH AS:
r___m_ Two candidates really stand
3 Lucy is a person who manages a computer system. out.
s__te d__n__tr__o_ He's very familiar with ...
4 Get the new software and add it to the system, Does he have any weaknesses?
_n__a__
5 Organizing computer files in an orderly way is important.
F__e a__h_v__g
§tti{ir.:l;t l\; You are an employee.
6 Fixing the network is the manager's task to complete,
Talk to Student B about:
__t_ o two candidates
. their qualifications
@ ra Listen to and read the job posting from Bell Tower . their drawbacks
!ndustries again. What wilIthe administrator be
expected to do with past information in files?
Student B; You are Student As 1
tü*Éerx§mg i
who to hire for a position.
*
1
]
I tnp,zz"*,piöfrffiffi
Freelance PÖraffim
í* pRoGRAt{ilERs
WEB DEVELOPER
] am seeking
a talented web developer to
neip me buiid an
inl website io, .y
company. Must be
,l?:í"''u"
li ke PHP . ;;"j;;
Create scripts for r '- 'lqVq Ltte dOllltv to
:7!";::,"^o -,i^'1r,)syages
f,amitiarili;iiú"L i'm alreáoy
+
f li handle th" "ljl::g"'
learning
t";i;::?:T th e webs xML, so
.í pro9rammer .unJ vo"*',.!#f§,"J ite.
,|':^:::
]aned@commonreaitv,com.
web deler11",
''title"Big Wolf VlsUAL BAslc ExpERT
/,". Baker Are you a maste
y /§ t neeo ;"; i;;:;i "^' Yi""l' Basic? Then.
y,,%*,
/§i ,"author"Joe on the GUl component
: GY V/S,
-\
:l 'n".;;il;,"'il^
)
\ \r' /ffil *::!i,ií,.J;#;ryPffi:Ti#".ltí
moneVlamstili
in
\ / lú , i ff/ tnvestors. rr,,,"
tnVeSiors. Thus, pavn
l-'vvvgo or
^-,l1e^!|oc9ss
wl lU(JKlno
Éox"ing ío|
tor
::iíi+"_i
LílIdll
;;J,?ffi:lö iT:i the báck
me at
(\r_"^ formore,n,o,,iáöi€
lormoreinform"i;^% ger.aldfe
\l§
>\ § Read the job postings for programming iobs.
Then, choose the correct answers.
1 Which is NOT true about the Web Developer adveftisement?
A
ff B
The advertiser needs he|p with HTML.
The adver.tiser wants Java components on her website.
c The advertiser wilI work on the site's content.
D The position requires knowing mu|tipIe programming |anguages,
Before you read the passage, 3 What does the third advertiser want?
talk about these questions. A to learn how to use Visual Basic
'1 íor?
What is programming used B help securing investors and funding
2 How can a person prepare for a C information about creating user-friendly software
career in programming? D a programmer to create the software's visual e|ement
Listen again and complete the
Match the words or phrases (1-6) with the conversation.
deíinitions (A-F).
Programmer 1: There's one asking for a
1 _ interactjve
1
4_ script _for a realty company.
2 _ user-friendly 5_ component Programmer 2: 2
3 _ editor 6_ back end would l have to create content, too?
No, the ad said that the client would
A occuring at the end of a project 3
B a part of a website or program Programmer 2: 4
C responsive to a user when you get the chance.
D a group of automatic commands |'ll check it out,
E easily accessible 5 __-. l've got a
F someone who creates and changes files couple of potential jobs, too.
Programmer 2: Oh yeah? What are they?
Programmer 1: There's one client looking to decipher
,: Place the words and phrases from the word
bank under the correct headings.
5
You are a programmer. TaIk to
programming jobs again. Which job listing
Student B about:
is asking for someone who is extremely
ski!led?
. a job Student B may be interested in
. duties involved
. .. . .: ;,.| .|,:i
) $i:_;li.=l-,: § You are a programmer. Talk to
Student A about the latest job postings.
Listen to a conversation between two )
freelance pro9rammers. Mark the fotlowing
statements as true (T) or false (F).
1_ The web developer job includes creating
content.
You are a programmer. Use the job postings
and the conversation from Task 8 to write an
2_ The woman believes that she can finish the
email responding to one of the free|ance job
programming project,
listings (120-150 words). Talk about:
3_ The woman wants to be paid before starting
a project.
. Why you want the job
l What programming languages you know
. Similar projects you have worked on before
f
above the fold [ADJ-U4] lf content on a website is above t§:* fold, it is visible without scrolling down after the page
has loaded.
ad product IN-COUNT-U4] An ad proe|u*t is an advertising opportunity such as a banner that is located on a website.
ADM IABBREV-U12] An ADM (Automated Dispensing Machine) is a hospital machine that measures out specific
amounts of medication into containers.
anchor [N-COUNT-U3] An anchor is a word, phrase, or image that includes a hyperlink and can be used for
navigation,
animated GlF [N-COUNT-U4] An e§iffiat{*d §lF is the combination of multiple GlF files in one advertisement to create
animation.
anti-antivirus virus [N-COUNT-U7] An anti-antivirus virun is a computer virus that attacks and often disables
antivirus software.
AppIe@ [N-UNCOUNT-U1] Apple'Ü is the company that produces Mac@s and other computing products.
applet IN-COUNT-U3] An applet is a small app|ication that is embedded in another web application often as a plug-in.
attack IN-COUNT-U9] An attack is an attempt to get through computer security.
audit log [N-COUNT-U9] An audit lcg is a record of who has accessed a computer system and what actions they
took.
authenticated [ADJ-U9] lf software or a program, process etc. is authonticatxd, it is legitimate or genuine.
automation [N-UNCOUNT-US] Automütiüil is the use of electronically controlled systems to perform tasks without
human assistance.
back end [ADJ-U15] lf something is back end, it occurs at the end of a project or job.
backdoor IN-COUNT-U9] A backdoor is a hidden way to get by security in computers and programs. They are usually
built into software.
backup IN-UNCOUNT-U1O] A *ackup ió the creation of a duplicate copy of data that is stored on a separate hard
drive or computer system to prevent the loss oí the data,
bar coding [N-UNCOUNT-U121Bar coding is a system in which doctors scan medicines and match them to patients.
Basecamp@ [N-UNCOUNT-U6] Basec&mpti'l 1" a web-based project management tool offered by the company
37 signals and that can be accessed by multiple users simultaneously.
block [V-T-U10] To block something is to prevent access to it.
bug [N-COUNT-U9]A bug is a flaw or error in software or hardware.
CAD [ABBREV-U3] *&§ (Computer-Aided Design) is the use of a computer to design things such as machines or
buildings.
CAM IABBREV-U5] OAfrfr {Computer Aided Manufacturin9) is the use of computers to control production equipment.
campaign [N-COUNT-U4] A campaign is an agreement between an advertising company and a client that outlines
which types of advertisements are to be used, where they are to be placed, and how long they will appear.
card scanning [N-UNCOUNT-UB] Carcl gtnnning is the practice of capturing the personal information stored on
credit cards, debit cards, or passports.
CBT [ABBREV-U3] *§§"(Computer-Based Training) is a type of training or education in which students practice
working on programs using a computer.
CDN IABBREV-U11] A *üfit (Content Delivery Network) is a system oí computers on a network containing copies of
data that nearby users can access,
CDSS IABBREV-U12] üb$S (Clinical Decision Suppor1 System) is a system that helps doctors diagnose problems. lt
also suggests treatment options,
centralize [V-T-U6] To c+t,ltralize things is to bring them from multiple places and make them available in one
location.
click-through rate [N-COUNT-U4] The x§i*k-thraugh rate is the ratio of c|icked advertisements to the number of
advertisements that are viewed,
click tracking [N-UNCOUNT-U4] Click trnnkinE is the process of counting and keeping track of the number of clicks
an adveÉisement receives.
color-coding [N-UNCOUNT-U6] {-i<:i*r-.::i"l,:;l:* is the practice of labe|ing things with different colors in order to tell
them apart.
COlOr matChing [N-UNCOUNT-U1] í_ii:l.::j! :,iii3l{;l,:tl"l1,1 i3 the ability to create colors as you see them on the screen,
COmmand line [N-COUNT-U2] A;,iln,!,,;ll-liiii;.l:1 ii1,1,; is a word or phrase that makes a computer perform an operation.
commission [N-COUNT-U4] A ,l ,;,l.,;ll,:; .,1,1i1 is the amount of money charged by a website for hosting
advertisements.
component IN-COUNT-U15] A r;1,1:,-lr:,,:ií;.,)iili is a par1 of something bigger,
configure |V-T-U14] To i:.*n,í'tg*t"* something is to modify or arrange it so that it works in a ceftain way.
COVer letter [N-COUNT-U14] A l;;,,:;,' ;;:1,1i,:i is a document that explains why a person is applying for a job and why
ihat person believes he or she is qualified for that job,
CPC [ABBREV-U4] (Cost Per Click-Through) is a pricing model wherein rates are charged according to how
many clicks an advertisement receives.
CPM [ABBREV-U4] (Cost Per 1,000 lmpressions) is a pricing model wherein rates are charged according to how
many thousands of people view the advertisement.
CPOE IABBREV-U12] ',,i]!*f;l (Computerized Provider Order Entry) is a system that lets a doctor fi|l out e|ectronic
orders,
customize |V-T-U1] To r;t:*i.*li;l;:í something is to change it to meet your individua| needs and purposes.
CYber [ADJ-U8] lf something is í:\,!ilí::, it is related to computers or the lnternet,
cyber criminal [N-COUNT-U10] A .;|iLl,.1í:i ,,;llil,]iil;lri is a person who uses computers and the lnternet to commit crimes
such as identity theft and fraud,
dashboard IN-COUNT-U6] A t!;li.;ll!,,,,,;,;l,,r-i is a disp|ay on a computer that shows commonly or recently used files and
programs.
deployment [N-UNCOUNT-U11] í..lc];:rl*.:=l,:,t*lt-i is installing and running new software into a group of hardware,
detect [V-T-U10] To ,.:,:|,,.li:.,i something is to discover it.
dUtY [N-COUNT-U14] A ,llili! is a task that someone is responsible for completing at a job.
editOr IN-COUNT-U15]An t,ljlX'll, is a program that is used to create and change files.
egress filter [N-COUNT-U13] An :,,l'll,'.," illli1,1'prevents harmful software from leaving a network,
EHR IABBREV-U12] An i_:}{il| (Electronic Health Record) is a computerized version of a patient's health record.
elasticity [N-UNCOUNT-U11] Hi;;:.il:';-:.,", is a computer system's ability to gain or lose computer resources as a user
sees fit.
electronic bulletin board [N-COUNT-U3] An *l*l:tr,:lill_ l:ri:!lrliiri
§,lűj,l,,ti is an onIine communication center or
computer server that runs software and enables users to share files or information electronically.
embedded SYStem IN-COUNT-US] An , ll;lli,:l{llij:,j : :1,1,i. :t is a combination of hardware and software designed to
pedorm a specific task.
EMM IABBREV-U12] r$fu]l (Electronic Materials Management) is a system that helps hospitals keep track of
medications and medical supplies.
enCOder [N-COUNT-U5] Íi;':l":*,$l,:l:.; are devices that convert mechanical information into electronic signals.
Ethernet network [N-COUNT-U5] An i_i,l,:l,:i'rlf;i !l;.lt,niil_:-li is a high-speed neiwork that links computers together.
false negative [N-COUNT-U10] A i.lil:i: :1.:-:{.1;1:ii j!]{:l is a case when antivirus software incorrectly indicates that an
infected file is clean.
false positive [N-COUNT-U10] A l',lll:,,. iillr::;.!iiv,ir is a case when antivirus software incorrectly indicates that a clean file
has been infected with a computer virus.
FAQs [ABBREV-U3] A i .' l' . (Frequently Asked Questions) section is a list of common questions with their answers.
fault tolerant [N-UNCOUNT-US] iijliii i.]li:t,;t*_{ is the ability to continue functioning even though an error has
occurred.
file archiving [N-UNCOUNT-U14] i,ir :il i;lin+itlr! is the process of organizing computer files in an orderly way. This lets
you retrieve them easily.
firewall [N-COUNT-U9] A firewall is a program that restricts access on a network.
Flash@ IN-UNCOUNT-U3] Flash* is a media format that can be used to add videos, animations, and other media to a
website.
free software license [N-COUNT-U2] A free software linense allows users to change and distribute programs,
Írequency capping [N-UNCOUNT-U4] Frequency capping is the process of ensuring that a specific website visitor
does not see the same advertisement an excessive number of times.
gallery [N-COUNT-U6] A gallery is a collection of icons or pictures that have been organized in a file or page,
geo targeting [N-UNCOUNT-U4] §e* t*rgeiing is the process of showing advertisements in geographical areas
where they are relevant.
hacker [N-COUNT-U7] A hacker is a person who exploits computer hardware and software for their own purposes.
hang [V-T-U4] To hang a website is to prevent it from loading all the way.
host comPuter [N-COUNT-U7] A host computer is a computer that allows other computers to have access to a
network via several means (e,g. software, network address, etc.).
laaS [ABBREV-U11] laa§ (lnfrastructure as a Service) is a cloud computing service that delivers servers, storage and
networking resources.
imbed [V-T-U7] lf something imbe$s itself into something else, it becomes part of it.
imPlanted microchip IN-COUNT-U12] An inrplanted miurochip is a tiny device in a person's body that releases
specific amounts of medicine.
in real time [PHRASE-U6j lf information is updated or shown in real time, it is updated or shown at the same time as
new information is received.
infect [V-T-U7] To infe*t a computer is to contaminate it with a computer virus.
ingress filter [N-COUNT-U13] An ingrexs filter prevents harmful software from entering a network.
install [V-T-U14] To §n*tall something is to add a new component or program to a computer or system.
integrated circuit IN-COUNT-US]An int*gratöd §irüuit is a small chip that has several electronic devices attached to it,
interactive IADJ-U15] lf something is intaractive, it will respond to a user's commands.
interoperability [N-UNCOUNT-U12] lntnrnperability is the ability to easily send or combine electronic health data
from one system into another.
intruder [N-COUNT-U9] An intruder is a person or program that attempts to access a network or computer without
permission.
keylogger IN-COUNT-U9] A keylogg§f is a type of trojan or virus that tracks what keystrokes are entered into a
compuier,
keyword [N-COUNT-U13] A keyword is a term or phrase that is created to describe a webpage, so that it can be
found in a search engine.
lab-on-a-chip [N-COUNT-U12] A lab-on-a-clrip is a tiny device that holds cells and fluid that a doctor can analyze
easily.
latencY [N-UNCOUNT-U5] Letency is the time between the end of one computer communication and the stari of
another,
Linux@ [N-UNCOUNT-U2] Linuxu} is a computer operating system.
Linux@ distribution [N-COUNT-U2] A L*nux§ distribution is a collection of software for Linux@.
|og in [V-|-U7] To log irr is to provide a computer security system with the proper identification to use the computer,
Mac@ [N-COUNT-U1] A Mac'") (Macintosh) is a type of computer from Apple@.
malware [N-UNCOUNT-U8] Malwarc is any type of malicious, harmful software, whose aim is to destroy or steal data.
mask [V-COUNT-U13]To mask information is to block it from being viewed,
media Player [N-COUNT-U3] A med§a player is software for playing media such as videos and animations and can be
embedded in a webpage.
message board [N-COUNT-U6]A m*ssage board is an online application that displays and organizes messages
from users,
':,
;:;.
''T:1|,,:1""ilfffi:lt}f.:,::1;:].'' tl§e€:*r§ are very tiny tweezers that allow a doctor
to operaie
"'*-t**eti*
Microsofl §ffice" is a software package ihat
"'":";""*."#:r";ffi}:,""YJT-U2] offers word processing,
os x@ IN-UNOOUNT-U1]o§ X*ris an
operating system from Apple@ for Mac@
computers.
oscilloscoPe [N-COUNT-U5] An oscilloscope
is a device that allows the user to view the electrical voltage of a
machine.
*"ffijT?JJ',l,iJ};"r";Y}T-U7]An *r*er*ritl*6'wiyxs is a computer virus that
copies its code over and destroys the
PaaS [ABBREV-U11] Paa§ (Platform as
a Service) is a cloud computing service
sYstem and related comPonents (e.g. where users receive an operating
servers, storage, networks, databases)
over the lnternet.
PAcs IABBREV-U12] PAcs (Picture Archiving and Communications
System) is a system that captures and
medical images from different sources. stores
Patch [N-CoUNT-U9] A Patch is a Piece of code that is
used to fix a flaw, error or vulnerability in
a computer pro'ram,
Pay-as-You-go IADJ-U1'1] lÍ a software is
Pay-sx*y*t§-§§, it is purchased as it is needed by the
Pc IABBREV-U1] A §* customer.
(Personal ComPuter) refers to a computer
that runs a Windows@ operating system.
PCl comP|iance [N-UNCoUNT-U13] lf someone is in P§l (Payment Card lndustry) ccnlpliance, they
Procedures when accePting credit cards and other cards follow security
Ónline; security issues regard user authentication,
encryption, vulnerability testing, etc.
Performance tuning IN-UNCoUNT-U14] Pefformmnce tuning
is the act of adjusting a network or
works as efficiently as possible. system so that it
Pharming [N-UNCoUNT-U8] F*mr*liltE is a
Process wherein thieves reroute people to a fake website
be legitimate in order to trick them into giving that appears to
away their personal information.
Phishing [N-UNcoUNT-U8] Phisfuing is a process wherein
thieves trick people into giving away their personal
information through email and other apps,
PHP (PHP: HYPertext PreProcessor) is a
"'-$,::fiY*U15] scripting language that is used to create
dynamic
E'-
Career Paths: lnformatiolt Technology 2nd Edition is a new educational resource for
information technology professionals who want to improve their English communication
skills in a work environment. lncorporatin9 career-specific vocabulary and contexts,
each unit offers step-by-step instruction that immerses students in the four key language
comPonents: reading, listening, speaking, and writing. Career Paths: lnformation
Technology 2nd Edition addresses topics including computer components, accessories,
software, lnternet security, web design, and the future of the industry.
The series is organized into three levels of difficulty and otfers over 400 vocabulary terms
and phrases. Every unit includes a test of reading comprehension, vocabulary, and listening
skills, and leads studenis through written and oral production.
lncluded Features:
. A variety of realistic reading passages
o Career-specific dialogues
. 45 reading and listening comprehension checks
. Over 400 vocabulary terms and phrases
. Guided speaking and writing exercises
. Complete glossary oí terms and phrases
The Teacher's Guide contains detailed lesson plans, a full answer key and audio scripts,