Professional Documents
Culture Documents
Meeting people
1. How do you greet people in your country? What do you say when you
greet people in English?
Always shake hands as mutual sign of respect. In confidence, we can give two
kisses.
Jobs in IT
4. Work in pairs. Ask and answer questions about your daily schedule and
breaks. Make notes.
6. Complete these sentences w i t h the words in the box.
[at at in for from]
a. for
b. from
c. in
d. at
e. at
7. Write three sentences about yourself and your daily schedule.
Every morning, from Monday to Friday, I go to class till 14:30, I've got a half
hour break at 11:15. I play with my band from 17:00 to 21:00 every sunday.
Spelling
Corsair flash survivor is better tan Imarion Clip in all ways, except Price.
Imation is chepaer, it costs less than half.
Computer software
3.
4.
Working with computers
(Just kidding, don´t kill me. The real answers are below)
a. Pam is telling Bill she wants the divorce because he wastes the
whole day playing videogames.
b. Amy, who’s seventeen, doesn’t know how a DVD works, because
she never needed it, she can watch all movies and series she
wants through her Smartphone and tablet. She also has a
smartTV in her parten’s house, and owns a Netflix account.
c. Tom owns a mouse since 1995, It doesn’t move because the ball
inside needs to be cleaned
d. Harry was fired from his company, now he’s stealing the copper
from the cables before he leaves.
e. Erika, by the expression of her eyes, she should be writing the
place where she and her date are going to go after work for
dinner.
f. Little Felicity just erased the hard drive of her father’s computer,
because her parents don’t buy her the toys she wants. And now is
turning off the PC so nobody suspects.
THE REAL ONES
a. Maybe they are testing new software.
b. She is introducing the CD/DVD in a vertical system, maybe an
iMac.
c. He is using the mouse.
d. He is connecting the cables.
e. She is pointing some kind of data that she asked by phone.
f. She is turning off the screen.
7. Write three sentences saying what you and y o u r collegues are doing
at the moment in your work or study.
Computer usage
1. Read what Ben says about computer usage in his office. Answer the
questions.
a. What must Ben do? He must update his calendar, and login using
his own user/pass.
b. What can Ben do? He can use Excel.
c. What can't Ben do? He can neither access some websites, nor eat
near the PC.
d. Can he open any website? No, he can’t.
e. Why is it important to follow computer dos and don'ts? Because
efficiency is important in a company, and the rules are for
guarantee that efficiency.
3. Write an email to a colleague about yourself using must, mustn't, can,
can't, have to, don't have to.
Wellcome to the company, James, here’s all you need to know to work good
everyday:
First of all, you must use your user id and and password (there are on the
previous mail), if you don’t, you won’t be able to start working. If you are
getting trouble at any time, write me an email.
There’s a list of programs you can use, but if you want, you can use others.
You have to report your work in the company log everyday.
you can’t access some websites, for more effiency. Of course, you’re not
allowed to install or play videogames.
And finnaly, you can neither eat nor drink in your workplace, except in case of
a waterbottle.
If you have any question, please write me an email.
Business matters
In every case,we need to buy a Pc for the team admin assistant, and a
printer station (a complete machine or by modules in a furniture),
provided by a scanner, that allows to, print and copy. And a server
station too, to save data. We need also an Internet connection, and a
router.
The cheapest option (assuming that the five workers are rotating and
working one day a week): buy one more Pc for the single worker with all
the software they need to use.
Other option is (assuming that one day a week, all workers work
together): five more Pcs with custom programs for each worker.
3 Websites
2. Read this text about different types of website. Answer these questions.
a. Why do people visit organisational websites? To inform theirselves
about ideas or events.
b. Why do people visit company websites? To buy something or
compare prices, maybe.
c. Why do people visit entertainment websites? To have fun.
d. Why do people visit news websites? To obtain information.
3. Complete these sentences about the purpose of websites w i t h the
words in the box.
a. Read
b. Offer
c. Sell
d. Promote
e. Practise
f. Share
Website analytics
2. Which items of the analytics programme above answer these questions?
a. Where can you find out how many people visit the website? In
visitors overview, in visits.
b. Where can you see what percentage of people view only one page
on the website? Also in visitors overview, but in bounce rate.
c. Where do you find information about how long they spend on the
website? Same place, in time on site.
d. Where do you see how many people searched for 'gotapps' to find
the website? In Keyword.
4. Match the website analysis tools 1-5 to the descriptions a-e
a. 1-e
b. 2-b
c. 3-a
d. 4-c
e. 5-d
6. How do y ou say these numbers?
a. 30,000 Thirty thousand.
b. 700,000 Seven hundred thousand.
c. 10,000,000 Ten million.
d. 100,000 One hundred thousand.
e. 80,000 Eighty thousand.
Website development
Testing a new operative system: First do double click in the virtual machine
program icono n the desktop, after that, the program starts running. Then
select a new virtual machine and configure it. Finnaly, the virtual machine is
prepared to run.
We need a list of our products, not oly a shopping section, we need the people
to see what kind of products we are working on, free of any kind of
contamination, produced using only renewable energy and manufactured
guaranteeing the human rights of all the workers.
We also need a section that informs the visitors how they can contribute
everyday with tricks and “lifehacks”.
1. What are your favourite websites? Why? Use the words in t h e box t o
describe them.
[beautiful well-designed easy-to-use/navigate clear reliable useful informative
fun funny exciting interesting]
There are Tumblr accounts that can fi tinto “beautiful” term, and “well-
designed too.
Google is the prefect example of “easy to use” and I use it everyday.
Useful and informative are both Facebook and Twitter, they are very
interesting if you know where to look.
For fun, sometimes, I visit 4chan, but that’s not a funny page for everyone
because of black humor.
2. Write about the things you like and dislike about different websites.
I like different things from each website, but the things I dislike exist in every
freaking site nowadays. No privacy, and tons of ads.
Business matters
1. You are a website designer. Read the information about Learning Now
Ltd. Answer these questions.
a. What is the business type? Education
b. What is the purpose of the website? Promote its courses
(educate)
c. Who are the website users? Where are the website users? Young
adults all around the world
d. What are the features of the website? Good interactivity, fast
download times and audio.
4 Databases
1. What database products do you know and use at work and at home?
Access and MySQL
Data procesing
1. Match the headings in the box to the data processing steps a-f.
a. Data colletion - 1
b. Data tabulation - 6
c. Data validation - 2
d. Data entry - 3
e. Data coidng - 5
f. Data sorting - 4
2. Put the data processing steps in 1 into the correct order. (above)
6. Complete these sentences with the words in the box.
a. Between
b. for
c. about
d. at
e. of
f. from
g. to
h. into
Data storage and backup
1. Match the data storage and backup solutions in the box to pictures A-F.
a. Usb flash drive
b. Hard disk
c. External hard drive
d. server
e. The internet
f. Mp3 player
2. Read this article about data storage. Complete the sentences with the
words in the box
a. emerging
b. volumes
c. offsite
d. cloud
e. loss
f. theft
g. encrypt
h. security
i. magnetic
j. flash
k. contents
l. protect
Databes benefits
1. Read part of this email from the owner of Jumbo Book Store. Answer
these questions.
a. What types of information does Jumbo Book Store communicate
between its employees?
b. How do the employees exchange information in t h e company?
The driver takes the reports and delivers them to the main office.
c. What documents does Amiki prepare? handwritten sales reports.
d. How much time does i t take to compile the data? 5 to 6 hours.
e. Why do the customers complain? Because of poor information
about available books and stationary products
5 E-commerce
1. What products or services do you usually buy online? What products do you
not buy online? Why?
The only things I don’t buy online are things I need at the moment, like food or
stuff like batteries. Beacause of personal comfort.
6. What are the advantages and disadvantages of shopping online? Use this
table to make notes and then make sentences.
Maybe shopping online is physically more secure, because you neither have to
go out of your home nor take your car. But, shopping on line, you must give
personal data that can be stolen. When you buy online, you don’t mind about
the time, because the order will take even a few days. The product offer
doesn’t change so much between online shops and physical shops. Buying
online is more comfortable, and the price are almost always the same, but
transport is an extra service that must be paid.
E-commerce features
2. What are the steps in buying products online? Number these sentences
incorrect order.
a. 5a) The customer opens an account.
b. 5b) The customer goes to t h e check-out.
c. 4c) The customer puts the item(s) in a basket or shopping cart.
d. 6d) The customer pays for the product(s) w i t h a credit or debit
card.
e. 2e) The customer goes t o the website.
f. 1f) The customer searches and/or browses the website.
g. 3g) The customer chooses the item(s) t o buy.
h. 7h) The customers checks the order.
3. Complete this text w i t h the words in the box
a. so
b. but
c. and
d. or
4. Match the first half of the sentences to the second half
a. 1- f
b. 2-b
c. 3-d
d. 4-a
e. 5-e
f. 6-c
Transaction security
1. What are the potential security threats t o online shopping? Share your
ideas with the group
The stealing of personal data and, in consequence, the stealing of ony from the
custumers. Also cyber attacks, like ddos attack.
Online transactions
1. What computer networks do you use in your work or studies? What do you
usethe networks for? How do you access the networks?
We have a LAN in our classroom and we access by Wifi (cellphones) or by
cable (pcs). We use it for surf the internet as a complementary tool.
3. Read Katharina's email t o Agatha. Complete this email w i t h the words in
t he box.
a. should
b. lan
c. equipment
d. wan
e. reecommend
f. remote
g. vpn
h. internet
4. Look at the three network solutions. What are the differences?
The difference between 1 and 2 is the size, also the price and the
manteinance, always according to the needs of the owners. The third one is for
cellphne usaage only, you must to pay for a SIM card and a suscription, so you
can use internet out of a house or an office.
I reccomend solution 2 for big organisations, because htey have bigger needs,
like data archiving, connect mor than one pc (much more), implement security
systems, and divide the network by areas.
Networking hardware
1. Which of the items below do you know? What are they? What do they do?
A router to create a LAN and connect it to internet if it was a modem too, a
network card to use a PC inside a network, and a switch, that allows control
multiple devices in a network.
3. Match the words 1-8 to the descriptions a-g.
a. 1-d
b. 2-f
c. 3-g
d. 4 -h
e. 5-a
f. 6-b
g. 7-e
h. 8-c
5. Complete this dialogue w i t h the words in the box.
a. speed
b. change
c. about
d. problem
e. devices
f. what
g. necessary
h. should
i. User
8. Complete these sentences with the words in the box.
a. with
b. over
c. to
d. between
e. on
Talking about the past
Business matters
7 IT support
1. Read this dialogue and complete it w i t h the words in the box.
a. switched
b. type
c. worked
d. tight
e. switched
f. found
g. unplugged
h. go
i. working
j. disconnected
5. Complete these questions w i t h have or has and t h e correct form of the
verb in brackets.
a. Have you ran
b. Have you had
c. have you changed
d. Has he opened
e. Has she entered
f. Have they changed
g. Have you installed or uninstalled
h. Has Dillip updated
6. Use the present perfect to make positive or negative sentences
a. 1 the charger’s stopped working
b. 2 I haven’t upgraded the operating system
c. 3 She hasn’t installed the updates
d. 4 They’ve reinstalled the application
e. 5 She hasn’t been able to fix the problem
f. 6 I’ve defragmented your drive
Software repair
1. Complete the service reports for the IT support team. Use the information
in the three tickets and the words in the box.
a. version
b. file
c. install
d. run
e. saved
f. viruses
g. resend
h. version
i. check
j. Move
Hardware repair
1-Virus
2-trojan
3-worm
4-hacker
5-Browser hijacker
6-malware attack
7-adware
8-spyware
3 Have y ou ever had a computer security threat? Has anyone ever hacked into
your
computer system? Use the words and phrases in 2 t o describe what
happened.
Years ago, using a P2P program, downloading shared movies, I used to not
turn off the computer at night because then, a single .avi file took a lot of time,
sometimes even a few days. The following day, after I awakened, my pc was
invaded by a virus (I don't know what kind of virus, that was more than a
decade ago) that waas installing software like userbars, media players, games,
etc... I had to restart the entire system.
1-e
2-a
3-c
4-b
5-d
Workstation health and safety
5 Read this list of rules for using a company computer. Which ones do you
follow? Why?
Because the other ones are restrictive, but the really important thing is to be
careful. Be careful if you eat/drink, be careful installing software, be careful
using an antivirus, and be careful moving the hardware.
Security procedures
2 Read this text on security and match the headings in t he box w i th the
paragraphs 1-5.
1-d
2-b
3-c
4-a
5-f
6-e
I think 4 (Transfer files via a secure connection. Back up files regularly on the
server in your home folder. Do not use external drives.) and 3 (Configure your
email software to use secure protocols. Use company officiale-mail software
only. Always double check that you are sending your messageto the right
recipient. Do not send sensitive data over the network. Use mail encryption to
send sensitive data. Do not download unknown files or files for private use,
such as movies and music.)
But, certainly, number 3 is the most unfollowed procedure.
7 Write a document listing the regulations y ou talked about in 7. Use these
headings.
Security
Rporting problems
Reporting incidents
I never have reported any security incident in a job, but, the most similar
situation was that, long time ago, someone stole a game account of mine, that
contains a lot of presonal data. I reported the company to cancel access to my
account from other IP adresses, then I got an authenticator system.
Fortunately, it only was a "farmer" who wanted to stole "in-game" items.
3
E,c,d,b,a