You are on page 1of 21

1 Working in the IT industry

Meeting people

1. How do you greet people in your country? What do you say when you
greet people in English?

Always shake hands as mutual sign of respect. In confidence, we can give two
kisses.

2. Complete these dialogues w i t h the words in the box.


[all is meet name's Nice this too you Welcome What's]
a. Name's
b. meet
c. too
d. what's
e. you
f. Nice
g. this
h. is
i. all
j. Welcome
8. Complete this email with am, is, are, their, our or my.
a. Is
b. am
c. are
d. is
e. are
f. their
g. My
h. our
i. is
9. Write a reply t o the email in 8. Introduce yourself and three people in
your group.

Jobs in IT

1. Work in small groups. List the IT jobs y ou know


2. [database analyst network architect IT support officer network
administrator]
a. 1 Sylvia is a network administrator
b. 2 Isabelle is a network architect
c. 3 Andrew is an IT support officer
d. 4 Mark and Latika are database analysts
7. What is your dream job? Write a j ob description for the j ob of your
choice.
Schedules

4. Work in pairs. Ask and answer questions about your daily schedule and
breaks. Make notes.
6. Complete these sentences w i t h the words in the box.
[at at in for from]
a. for
b. from
c. in
d. at
e. at
7. Write three sentences about yourself and your daily schedule.

Every morning, from Monday to Friday, I go to class till 14:30, I've got a half
hour break at 11:15. I play with my band from 17:00 to 21:00 every sunday.

Spelling

1. Work in small groups. List the IT acronyms you know


Business matters
1. You are at a training workshop. The trainer asks all the trainees to
complete the form and introduce themselves. Complete this form about
yourself.

Name: Luis Date: Whilstday, 34th Septober, 4083


DOB: 12/2/1989 Place of residence: Madrid
Contact:
Phone: 6** *** *** Email:example@thisdoesntexist.com
Interests:
IT job you want and why:

2. Write an email message to introduce yourself to the employees in the


company using the profile below or your own information.
[You are a new employee in a company. Your position is a network
administrator. You are responsible for setting up firewalls, security levels,
wireless connection, usernames and passwords.]
2 Computer systems

1. Label the diagram with the correct items 1-11.


1 monitor
2 case
3 motherboard
4 CPU (Central Processing
Unit
or Processor)
5 main memory (RAM)
6 expansion cards (video,
graphic)
7 power supply unit
8 optical disk drive
9 hard disk drive
10 keyboard
11 mouse

4. Make the comparative form of these adjectives.


Light lighter
Dark darker
Soft softer
Hard harder
durable more durable
efficient more efficient
long longer
wide wider
heavy havier
fast faster

2. Read these product descriptions and make sentences using


comparatives.

Corsair flash survivor is better tan Imarion Clip in all ways, except Price.
Imation is chepaer, it costs less than half.

Computer software

3.
4.
Working with computers

2. Complete these sentences with is/isn't, am/am not, are/aren't.


a. 1- is
b. 2- am
c. 3-isn’t
d. 4- are
e. 5- are
f. 6- aren’t
g. 7- are
h. 8- are
i. 9- am not
j. 10- is
3. Match the sentence halves 1-8 t o a - h .
1-c, 2-f, 3- b, 4-a, 5-d, 6-e
4. Look at the pictures A-F. Describe what is happening

(Just kidding, don´t kill me. The real answers are below)
a. Pam is telling Bill she wants the divorce because he wastes the
whole day playing videogames.
b. Amy, who’s seventeen, doesn’t know how a DVD works, because
she never needed it, she can watch all movies and series she
wants through her Smartphone and tablet. She also has a
smartTV in her parten’s house, and owns a Netflix account.
c. Tom owns a mouse since 1995, It doesn’t move because the ball
inside needs to be cleaned
d. Harry was fired from his company, now he’s stealing the copper
from the cables before he leaves.
e. Erika, by the expression of her eyes, she should be writing the
place where she and her date are going to go after work for
dinner.
f. Little Felicity just erased the hard drive of her father’s computer,
because her parents don’t buy her the toys she wants. And now is
turning off the PC so nobody suspects.
THE REAL ONES
a. Maybe they are testing new software.
b. She is introducing the CD/DVD in a vertical system, maybe an
iMac.
c. He is using the mouse.
d. He is connecting the cables.
e. She is pointing some kind of data that she asked by phone.
f. She is turning off the screen.
7. Write three sentences saying what you and y o u r collegues are doing
at the moment in your work or study.

We’re studing how to make web pages using CSS


We’re making virtual hosts using Apache.
We’re learning security, by doing RAID systems.

Computer usage

1. Read what Ben says about computer usage in his office. Answer the
questions.
a. What must Ben do? He must update his calendar, and login using
his own user/pass.
b. What can Ben do? He can use Excel.
c. What can't Ben do? He can neither access some websites, nor eat
near the PC.
d. Can he open any website? No, he can’t.
e. Why is it important to follow computer dos and don'ts? Because
efficiency is important in a company, and the rules are for
guarantee that efficiency.
3. Write an email to a colleague about yourself using must, mustn't, can,
can't, have to, don't have to.

Wellcome to the company, James, here’s all you need to know to work good
everyday:
First of all, you must use your user id and and password (there are on the
previous mail), if you don’t, you won’t be able to start working. If you are
getting trouble at any time, write me an email.
There’s a list of programs you can use, but if you want, you can use others.
You have to report your work in the company log everyday.
you can’t access some websites, for more effiency. Of course, you’re not
allowed to install or play videogames.
And finnaly, you can neither eat nor drink in your workplace, except in case of
a waterbottle.
If you have any question, please write me an email.

Business matters

3. Write a short email to the IT manager with your recommendations.

[A company asks you to recommend a computer and work station


configuration for their sales team. In small groups, decide what to
recommend. Use the office floor plan below t o prepare the computer
and work station configuration. Think about these things:
1 There are six people in the sales team.
2 Five people are out of the office four days of the week.
3 One person is in the office all the time - the team admin assistant.
4 Employees need a network connection (wired and wireless).
5 Employees print, scan and copy.
6 Company and client data must be stored on a separate device and
backed up regularly.]

In every case,we need to buy a Pc for the team admin assistant, and a
printer station (a complete machine or by modules in a furniture),
provided by a scanner, that allows to, print and copy. And a server
station too, to save data. We need also an Internet connection, and a
router.

The cheapest option (assuming that the five workers are rotating and
working one day a week): buy one more Pc for the single worker with all
the software they need to use.

Other option is (assuming that one day a week, all workers work
together): five more Pcs with custom programs for each worker.

3 Websites
2. Read this text about different types of website. Answer these questions.
a. Why do people visit organisational websites? To inform theirselves
about ideas or events.
b. Why do people visit company websites? To buy something or
compare prices, maybe.
c. Why do people visit entertainment websites? To have fun.
d. Why do people visit news websites? To obtain information.
3. Complete these sentences about the purpose of websites w i t h the
words in the box.

a. Read
b. Offer
c. Sell
d. Promote
e. Practise
f. Share

Website analytics
2. Which items of the analytics programme above answer these questions?
a. Where can you find out how many people visit the website? In
visitors overview, in visits.
b. Where can you see what percentage of people view only one page
on the website? Also in visitors overview, but in bounce rate.
c. Where do you find information about how long they spend on the
website? Same place, in time on site.
d. Where do you see how many people searched for 'gotapps' to find
the website? In Keyword.
4. Match the website analysis tools 1-5 to the descriptions a-e
a. 1-e
b. 2-b
c. 3-a
d. 4-c
e. 5-d
6. How do y ou say these numbers?
a. 30,000 Thirty thousand.
b. 700,000 Seven hundred thousand.
c. 10,000,000 Ten million.
d. 100,000 One hundred thousand.
e. 80,000 Eighty thousand.
Website development

1. Describe something y ou do every day at home or at work. Use the


words in the language box below.

Testing a new operative system: First do double click in the virtual machine
program icono n the desktop, after that, the program starts running. Then
select a new virtual machine and configure it. Finnaly, the virtual machine is
prepared to run.

2. Complete this text with the words in the box.


[After that Finally First Next Secondly Then Thirdly]
a. First
b. Secondly
c. Afetr that
d. Thirdly
e. Next
f. Then
g. Finally
5. Look at the websites below and answer these questions.
a. What are the websites?
The one on the the left, an economy news page. The other is for
learning english language.
b. Do you use these websites? Why/Why not?
No, I don’t, because I didn’t know them.
c. What is the purpose of each website: sell, inform, share, educate?
Left: inform, Right: educate.
d. What are the main features of each website?
Each website offers a suitable environment for their visitors.
e. Think of two more websites that have the same purpose
Economist.com and Britishcouncil.es
6. You are the owner of a company that needs a new website. Make a list
of things that you need/would like for your website. Answer the following
questions.
• What is the name of your company?
• What is the business type?
• What is the purpose of your website?

My company, Econative Union, needs to be in the internet. We need to tell the


people how to buy our products and concienciate about climate change.

We need a list of our products, not oly a shopping section, we need the people
to see what kind of products we are working on, free of any kind of
contamination, produced using only renewable energy and manufactured
guaranteeing the human rights of all the workers.
We also need a section that informs the visitors how they can contribute
everyday with tricks and “lifehacks”.

The best websites

1. What are your favourite websites? Why? Use the words in t h e box t o
describe them.
[beautiful well-designed easy-to-use/navigate clear reliable useful informative
fun funny exciting interesting]
There are Tumblr accounts that can fi tinto “beautiful” term, and “well-
designed too.
Google is the prefect example of “easy to use” and I use it everyday.
Useful and informative are both Facebook and Twitter, they are very
interesting if you know where to look.
For fun, sometimes, I visit 4chan, but that’s not a funny page for everyone
because of black humor.
2. Write about the things you like and dislike about different websites.
I like different things from each website, but the things I dislike exist in every
freaking site nowadays. No privacy, and tons of ads.

Business matters

1. You are a website designer. Read the information about Learning Now
Ltd. Answer these questions.
a. What is the business type? Education
b. What is the purpose of the website? Promote its courses
(educate)
c. Who are the website users? Where are the website users? Young
adults all around the world
d. What are the features of the website? Good interactivity, fast
download times and audio.

4 Databases

1. What database products do you know and use at work and at home?
Access and MySQL

Data procesing

1. Match the headings in the box to the data processing steps a-f.

a. Data colletion - 1
b. Data tabulation - 6
c. Data validation - 2
d. Data entry - 3
e. Data coidng - 5
f. Data sorting - 4
2. Put the data processing steps in 1 into the correct order. (above)
6. Complete these sentences with the words in the box.
a. Between
b. for
c. about
d. at
e. of
f. from
g. to
h. into
Data storage and backup

1. Match the data storage and backup solutions in the box to pictures A-F.
a. Usb flash drive
b. Hard disk
c. External hard drive
d. server
e. The internet
f. Mp3 player
2. Read this article about data storage. Complete the sentences with the
words in the box
a. emerging
b. volumes
c. offsite
d. cloud
e. loss
f. theft
g. encrypt
h. security
i. magnetic
j. flash
k. contents
l. protect

Databes benefits

1. What kind of data do companies create, manipulate, store and retrieve?


Market research, personal data of their customers, and, of course, their own
private data.
2. Match the company department 1-8 with the type of data it works with
a- h.
a. 1-c
b. 2-f
c. 3-a
d. 4-e
e. 5-b
f. 6-h
g. 7-d
h. 8-g
Business matters

1. Read part of this email from the owner of Jumbo Book Store. Answer
these questions.
a. What types of information does Jumbo Book Store communicate
between its employees?
b. How do the employees exchange information in t h e company?
The driver takes the reports and delivers them to the main office.
c. What documents does Amiki prepare? handwritten sales reports.
d. How much time does i t take to compile the data? 5 to 6 hours.
e. Why do the customers complain? Because of poor information
about available books and stationary products
5 E-commerce

1. What products or services do you usually buy online? What products do you
not buy online? Why?

The only things I don’t buy online are things I need at the moment, like food or
stuff like batteries. Beacause of personal comfort.

3. Choose the correct words t o complete these sentences


a. A lot of, many
b. Some
c. much
d. A lot of
e. A few
6. Match the types of business in the box to the correct column 1-4.
a. B2B business-to-business
b. B2C business-to-consumer
c. C2C consumer-to-consumer
d. M-commerce
7. Give examples of the four types of business in 6

B2C business-to-consumer: every shop that sells to any consumer.


B2B business-to-business: suppliers
C2C consumer-to-consumer: on line services like Wallapop.
M-commerce: apps like JustEat, Steam, or many more.

6. What are the advantages and disadvantages of shopping online? Use this
table to make notes and then make sentences.

Maybe shopping online is physically more secure, because you neither have to
go out of your home nor take your car. But, shopping on line, you must give
personal data that can be stolen. When you buy online, you don’t mind about
the time, because the order will take even a few days. The product offer
doesn’t change so much between online shops and physical shops. Buying
online is more comfortable, and the price are almost always the same, but
transport is an extra service that must be paid.

E-commerce features

2. What are the steps in buying products online? Number these sentences
incorrect order.
a. 5a) The customer opens an account.
b. 5b) The customer goes to t h e check-out.
c. 4c) The customer puts the item(s) in a basket or shopping cart.
d. 6d) The customer pays for the product(s) w i t h a credit or debit
card.
e. 2e) The customer goes t o the website.
f. 1f) The customer searches and/or browses the website.
g. 3g) The customer chooses the item(s) t o buy.
h. 7h) The customers checks the order.
3. Complete this text w i t h the words in the box
a. so
b. but
c. and
d. or
4. Match the first half of the sentences to the second half
a. 1- f
b. 2-b
c. 3-d
d. 4-a
e. 5-e
f. 6-c

Transaction security

1. What are the potential security threats t o online shopping? Share your
ideas with the group

The stealing of personal data and, in consequence, the stealing of ony from the
custumers. Also cyber attacks, like ddos attack.

2. Read this email. Answer these questions.


a. 1 How many security features w i l l the company have? 6
b. 2 Which security feature w i l l stop attacks on the company
network? a firewall
c. 3 What solution w i l l protect customer contacts and login boxes?
The web application protection firewall.
d. 4 What w i l l protect private user information sent over the
network? two-factor authentication
e. 5 What w i l l the two-factor authentication prevent? hackers
f. 6 What w i l l protect information? Encryptation
3. Label the network diagram w i t h the correct item 1-8

Online transactions

1. Shayan is t e l l i ng Monika how customers w i l l pay for something online


on a newwebsite. Complete this dialogue w i t h the words in t h e box.
a. completes
b. First
c. gateaway
d. payment
e. web
f. bank
g. rejection
h. confirmation
i. customers
j. accounts
6 Network systems

1. What computer networks do you use in your work or studies? What do you
usethe networks for? How do you access the networks?
We have a LAN in our classroom and we access by Wifi (cellphones) or by
cable (pcs). We use it for surf the internet as a complementary tool.
3. Read Katharina's email t o Agatha. Complete this email w i t h the words in
t he box.
a. should
b. lan
c. equipment
d. wan
e. reecommend
f. remote
g. vpn
h. internet
4. Look at the three network solutions. What are the differences?

The difference between 1 and 2 is the size, also the price and the
manteinance, always according to the needs of the owners. The third one is for
cellphne usaage only, you must to pay for a SIM card and a suscription, so you
can use internet out of a house or an office.

5. Which network solution would you recommend for a large corporation or


organisation, a small business and a family home? Why?

I recommend solution 1 for a family home because is the cheapest way to


connect all your home devices like PC, TV, phone, laptop, etc... I also
reccomend this for a small bussines ofr the same reasons.

I reccomend solution 2 for big organisations, because htey have bigger needs,
like data archiving, connect mor than one pc (much more), implement security
systems, and divide the network by areas.

6. Write a description of the network solution y ou use at work or at home


Which of the the three solutions in 4 is i t most like? Why?
I use solution 1 in my home because I have only a few devices to connect, I
only need basic connection. I only have a router-modem connected to my Pcs,
TV, cellphone… just to use internet in every machine.

Networking hardware

1. Which of the items below do you know? What are they? What do they do?
A router to create a LAN and connect it to internet if it was a modem too, a
network card to use a PC inside a network, and a switch, that allows control
multiple devices in a network.
3. Match the words 1-8 to the descriptions a-g.
a. 1-d
b. 2-f
c. 3-g
d. 4 -h
e. 5-a
f. 6-b
g. 7-e
h. 8-c
5. Complete this dialogue w i t h the words in the box.
a. speed
b. change
c. about
d. problem
e. devices
f. what
g. necessary
h. should
i. User
8. Complete these sentences with the words in the box.
a. with
b. over
c. to
d. between
e. on
Talking about the past

1. How much do y ou know about the history of networking? Can y ou match


these events 1-4 t o the dates a-d?
a. The creation of the World Wide Web - 1990
b. 2 The start of Facebook - 2004
c. 3 The launch of Twitter - 2006
d. 4 The beginning of MySpace - 2003
2. What social networks do y ou use? How much time do y ou spend on them?
I use Facebook and Twitter as a comunication tool, to promote my band and,
smoe years ago my pub too. Further than taht, not much.
3. Read this text about Karl's IT career up until now and answer these
questions.
a. 1 When did Karl go t o university? At the age of 18
b. 2 When did he leave university? In 2004
c. 3 What did he do after university? Travel around the world
d. 4 Where d id Karl go in 2006? To Cambridge
e. 5 When did he go t o Seattle? In 2008
7. Write three or four sentences about your own computing education and/or
work up until now. Use the text in 3 t o help you.
Well, nine years ago I started my studies, I successfully passed, but in the
beggining of the following year, I broke my back (two vertebrae). That was a
funny year, six months without waking upoff my bed. The following year, the
state changed the study plan, so I couldn’t finnish my studies. The following
year I decided to open my own pub, till 2013, when I closed it, then I studied
business administration, and now I’m here, now I can finnish because I can
validate last studies with this actual plan.

Network range and speed

5. Read these texts and answer these questions.


a. 1 How many things does network range depend on? 3
b. 2 What can reduce network range? Walls or metal frames
c. 3 What can improve network range? Repeaters
d. 4 What two things affect speed? Bandwith and latency

Business matters

1. Complete the table in 1 w i t h notes about what y ou d id last week at work


or college.

7 IT support
1. Read this dialogue and complete it w i t h the words in the box.
a. switched
b. type
c. worked
d. tight
e. switched
f. found
g. unplugged
h. go
i. working
j. disconnected
5. Complete these questions w i t h have or has and t h e correct form of the
verb in brackets.
a. Have you ran
b. Have you had
c. have you changed
d. Has he opened
e. Has she entered
f. Have they changed
g. Have you installed or uninstalled
h. Has Dillip updated
6. Use the present perfect to make positive or negative sentences
a. 1 the charger’s stopped working
b. 2 I haven’t upgraded the operating system
c. 3 She hasn’t installed the updates
d. 4 They’ve reinstalled the application
e. 5 She hasn’t been able to fix the problem
f. 6 I’ve defragmented your drive

Software repair

1. Complete the service reports for the IT support team. Use the information
in the three tickets and the words in the box.
a. version
b. file
c. install
d. run
e. saved
f. viruses
g. resend
h. version
i. check
j. Move

Hardware repair

3. Match the tool 1-8 t o its use a-h.


a. 1-d
b. 2-c
c. 3-g
d. 4-e
e. 5-h
f. 6-a
g. 7-f
h. 8-b
5. Match the diagnostic tools 1-4 t o the descriptions a-d
a. 2
b. 1
c. 4
d. 3
6. Now answer these questions.
a. 1 What is a multimeter used for? It measures electrical properties
such as AC or DC voltage, current and resistance. It troubleshoots
electrical problems in batteries, power supplies, and wiring
systems
b. 2 What is the cable tester used for? It is an electronic device that
checks the electrical connections in wired devices.
c. 3 What is a system diagnostic card used for? It is a device w h i c
h tests the operation of the system as it boots up
d. 4 What is the diagnostic software used for? It checks the system
and identifies problems in different areas of the computer
hardware.

8 IT Security and safety


2 Read the descriptions 1-8. Match the words in t h e box t o the descriptions

1-Virus
2-trojan
3-worm
4-hacker
5-Browser hijacker
6-malware attack
7-adware
8-spyware

3 Have y ou ever had a computer security threat? Has anyone ever hacked into
your
computer system? Use the words and phrases in 2 t o describe what
happened.

Years ago, using a P2P program, downloading shared movies, I used to not
turn off the computer at night because then, a single .avi file took a lot of time,
sometimes even a few days. The following day, after I awakened, my pc was
invaded by a virus (I don't know what kind of virus, that was more than a
decade ago) that waas installing software like userbars, media players, games,
etc... I had to restart the entire system.

5 Match the security solution 1-5 t o its purpose a-e

1-e
2-a
3-c
4-b
5-d
Workstation health and safety

2 Label this diagram w i t h the advice 1-8.

1 There should be clearance under the work surface. D


2 You should have your feet flat on the floor. E
3 Make sure your forearms and hands are in a straight line. H
4 Your lower back should be supported. F
5 Your screen should be positioned t o avoid reflected glare. B
6 Keep your shoulders relaxed. G
7 You should have your thighs t i l t ed slightly. C
8 Make sure the t op of the screen is at or slightly below eye level. A

5 Read this list of rules for using a company computer. Which ones do you
follow? Why?

Things you should do:


- Keep your keyboard and screen clean.
- Keep CDs and DVDs in covers and hold them by the edge when using.

Things you should not do:


- Don't clean your hardware with a household polish or cleaner.
- Don't turn your computer off for lunch breaks.
- Don't load unauthorised software.

Because the other ones are restrictive, but the really important thing is to be
careful. Be careful if you eat/drink, be careful installing software, be careful
using an antivirus, and be careful moving the hardware.

6 Match the verb 1-5 w i t h the noun a-e.


1-e
2-d
3-c
4-a,b
5-a,b

Security procedures

2 Read this text on security and match the headings in t he box w i th the
paragraphs 1-5.

1-Safety security requirements


2-Password recommendations
3-Email and network usage
4-Data transfer and backup
5-Reporting IT security incidents

3Match the v e rb 1-6 w i t h the noun a-f.

1-d
2-b
3-c
4-a
5-f
6-e

4 What are the most important procedures to follow in the document in 2?


Which procedures do people sometimes not follow?

I think 4 (Transfer files via a secure connection. Back up files regularly on the
server in your home folder. Do not use external drives.) and 3 (Configure your
email software to use secure protocols. Use company officiale-mail software
only. Always double check that you are sending your messageto the right
recipient. Do not send sensitive data over the network. Use mail encryption to
send sensitive data. Do not download unknown files or files for private use,
such as movies and music.)
But, certainly, number 3 is the most unfollowed procedure.
7 Write a document listing the regulations y ou talked about in 7. Use these
headings.

Personal use of computers

Security

Health and safety

Rporting problems
Reporting incidents

1 Have you ever reported a security incident? What was it about?

I never have reported any security incident in a job, but, the most similar
situation was that, long time ago, someone stole a game account of mine, that
contains a lot of presonal data. I reported the company to cancel access to my
account from other IP adresses, then I got an authenticator system.
Fortunately, it only was a "farmer" who wanted to stole "in-game" items.

3
E,c,d,b,a

You might also like