Professional Documents
Culture Documents
. Jelen knyvet, illetve annak rszeit tilos reproduklni, adatrgzt rendszerben trolni, brmilyen formban vagy eszkzzel - elektronikus ton vagy ms mdon - kzlni a szerz s a kiad engedlye nlkl.
Lektorok: Metodikai lektor: Nyelvi lektor: Szerkeszt: Kozmr Bianka Chris Lacey Btonyi Zsuzsanna
A jegyzet megrendelhet, illetve megvsrolhat az LSI Informatikai Oktatkzpontban 1037 Budapest, Bcsi t 324. Telefon: 436-6520 Fax: 436-6521
Kiad: LSI Informatikai Oktatkzpont Felels vezet: Dr. Kovcs Magda Tmafelels: Flier Istvn
TARTALOMJEGYZK
1. rsz - ltalnos bevezets, a kzpfok vizsga kvetelmnyrendszernek lersa 2. rsz - rsbeli I. feladat - rott szveg rtse II. feladat - Szakmai szkincsteszt III. feladat - Irnytott fogalmazs IV. feladat - Fordts idegen nyelvrl 3. rsz - Szbeli I. feladat - Szakmai beszlgets II. feladat - Szvegrts III. feladat - PowerPoint Presentation IV. feladat - Szakmai beszlgets egy adott tmrl Kulcs (Key)
8 40 51 56
68 69 . 79 81 82
Kedves olvas,
Egy olyan gyakorlknyvet tart a kezben, amely segti abban, hogy a LEXINFO informatikai angol kzpfok nyelvvizsga kvetelmnyeit megismerhesse, illetve fel tudjon kszlni a kzpfok nyelvvizsga sikeres lettelre. A jelen knyv hrom rszbl ll. Az elsben kpet kaphat arrl, hogy milyenek az rsbeli s a szbeli vizsga feladatsorai, hogyan lehet rjuk felkszlni, illetve milyen ms segtsgre is lehet szksg ahhoz,
hogy az akadlyokat n le tudja gyzni. Ezen tl megprblok segtsget nyjtani ahhoz, hogy a
ga rtkelsi rendszerbe is betekintst kapjon.
vizs-
A msodik rsz az rsbeli vizsga feladataibl ad vlogatst. Az egyflekppen megoldhat feladatok megoldsa, illetve a kifejts feladatok kzl nhny mintamegolds htul tallhat. A harmadik rsz a szbeli feladatsorokbl ad vlogatst. Itt megadok nhny segt krdst - ezek termszetesen csak mintk, hiszen a vizsgabizottsg krdez tanrai brmilyen krdst feltehetnek. Ezekhez a feladatokhoz is adtam meg htul lehetsges megoldsokat, illetve kapaszkodkat ahhoz, hogy a vizsgra nyugodtabban s felkszltebben mehessen el. A szbeli vizsga halls utni rtst ellenrz feladatait jelen kiadvnyunkban csak rintlegesen trgyalom. Erre a rszfeladatra a felkszlst brmilyen hanganyaggal kiegsztett ltalnos nyelvknyvvel, illetve angolul beszl TV- s rdimsorok hallgatsval, nem szinkronizlt filmek rendszeres nzsvel gyakorolhatja. Remlem, a knyv feladatainak elvgzse utn knnyebb szvvel jelentkezik az nnek leginkbb megfelel vizsgra, s annak akadlyait sikerrel veszi. Ehhez kvnok kitartst s sok sikert,
a Knyv rja
A LEXINFO vizsgarendszer lerst a Vizsgakzpont Tjkoztat kiadvnyaibl ismerheti meg rszletesen. Itt most rvid tfog tjkoztatst kap azzal a cllal, hogy a jelen kiadvnyt knnyebben s nagyobb haszonnal tudja forgatni. A vizsga ktnyelv - azaz mind a szbeli mind az rsbeli vizsgn szerepet kap a magyar nyelv is, szintez' - azaz a vizsgznak elre el kell dntenie, milyen szint vizsgra jelentkezik. Egy magasabb szint vizsga sikertelen lettele - brmilyen hatrrtk elrse esetn - nem jelenti az alacsonyabb szint teljestst. a megfelels kt felttelhez kttt: minden rszfeladatbl el kell rni a minimum 40%-ot, illetve az sszpontszm 60%-t. az rsbeli s a szbeli vizsga sztvlik - kln idpontban, egymstl fggetlenl teljesthet'.
RSBELI Az rsbeli vizsga ngy feladatbl ll. Az 1. s a 2. feladatra 60 perc ll rendelkezsre, ezeket a feladatokat sztr nlkl kell elvgezni. Ez a kt feladat tetszleges sorrendben teljesthet. Az els feladat n. rott szveg rtse". A szveg kb. 1200-1500 letsbl ll. ltalban az Internetrl levett, eredeti, az informatika tmakrbl vett anyag. A szveg elolvassa utn az rtst ellenrz feladat kvetkezik. Ez tbbfle lehet, pl. 10 angol lltsrl meg kell llaptani, hogy Igaz/Hamis/Nem szerepelt, egy, a szvegre rkrdez krdsre az adott vlaszokbl ki kell vlasztani a legjobban illt, egy adott mondat msodik felt kell kivlasztani az adott 2-3 lehetsg kzl stb. A szvegben a feladat termszetbl addan lehetnek ismeretlen szavak, a lnyeg a szveg-sszefggsek felismerse, illetve az ltalnos informatikai ismeretek kreatv alkalmazsa. A msodik feladat egy szakmai szkincsteszt kitltse. Ez ltalban kt rszbl ll, de mindkt rsz clja az, hogy a vizsgabizottsg meggyzdjk arrl, hogy a vizsgz tisztban van a szmtstechnika alapvet fogalmaival angolul, illetve rti az egyszer nyelven megfogalmazott defincikat. A feladatok tbbflk lehetnek, pl. prosts, behelyettests, krdsekre val rvid vlaszads, rvidtsek feloldsa stb. A harmadik s negyedik feladatra fordthat sszesen 90 perc. A harmadik feladat megoldshoz sztr hasznlata engedlyezett, a rendelkezsre ll id kb. 45 perc. Itt kt adott tmakrbl vlaszthatan az egyikrl egy 220-250 szbl ll fogalmazst kell rni. Mindkt tmakr az informatika terletrl szl, az egyik kapcsoldik az els feladat tmakrhez. Ehhez a feladathoz a jellt sztrt hasznlhat. A negyedik feladat egy kb. 150 szbl ll angol nyelv informatikai szveg lefordtsa magyar nyelvre sztr segtsgvel. A szveg eredeti, ltalban az Internetrl leszedett jsgcikk, vagy ms rdekes szveg. Megrtshez az ltalnos informatikai ismereteknl mlyebb tuds - a fordtshoz szksges ltalnos nyelvi kszsgeken fell - nem szksges. Itt fontos az sszefgg szveg megfelel stilisztikai szinten val ellltsa is. Mindegyik feladat 20-20 pontot r, a 80 pont 60%-a, azaz 48 pont adja ki a megfelelt minstst. Ugyanakkor a jelltnek mg egy felttelnek eleget kell tennie ahhoz, hogy a vizsgt sikerrel letegye: mindhrom feladatbl legalbb 8-8 pontot kell elrni (azaz 40-40% -ot). A feladatoknl itt, a gyakorlknyvben, illetve a vizsgn a Feladatlapon" pontosan fel van tntetve a feladatok pontrtke. gy a vizsgz tudja, hogy egy feladat kihagysval hny pontot veszt.
Krtckelcs A szvegrtsi feladatnl minden helyes vlasz kt pontot r. Itt rszpontok nem adhatk. A szakmai szkincstcszt feladatai I vagy 2 pontosak, ahol rszpontok adhatk, azt mindentt jellik. A fogalmazs - termszetbl addan - nehezebben rtkelhet. Mind a nyelvhelyessget, mind a/ ltalnos, illetve szakszkincs helyes hasznlatt, mind a szveg tartalmt cs szerkezett pontozzk Ennek jobb megrtse erdekben - a knyv utols rszben - megadunk nhny mintafogalmazst. A negyedik feladat lefordtand szvegt az rtkel tanr tiz hosszabb egysgre bontva egysgenknt maximum 2-2 ponttal rtkeli. Ennl a feladatnl figyelembe kell venni a fordts pontossgt, a magyar stlust, az esetleges flrefordtsok slyt s arnyt, a szvegsszefggsek helyes tolmcsolst magyar nyelven.
SZBELI A szbeli vizsga t feladatot lel magba. Az els ngy a vizsgabizottsg eltt zajlik, amely egy krdeztanrbl s egy elnkbl ll. A vizsga eredmnyt a bizottsg tagjai kzsen dntik el. Mivel a szbeli vizsga harmadik feladata egy elre elksztett PowerPoint-os elads tartsa, ezt a megfelel mszaki elrsok betartsval a szbeli vizsga idpontja eltt a Vizsgaszablyzatnak megfelelen a Vizsgahelyre kell eljuttatni. A laborfeladatot a Vizsgahely szmtgp segtsgvel szervezi. Itt az rtkelst szoftver vgzi. A szbeli vizsga eredmnyt a labor- s a szbeli vizsga teljestmnynek sszestett pontszma teszi ki. Itt is rvnyes az, hogy minden rszfeladatot legalbb 40%-ra kell teljesteni, illetve az sszpontszm 60%-a adja ki a megfelelt minstst. Az els feladat egy rvid, szakmai trgy ltalnos beszlgets, amelyben a vizsgztat a jellt munkjrl, tanulmnyairl, szakmai rdekldsi krrl, szakmai tjkozottsgrl, a szmtstechnikhoz kapcsold hobbijairl tesz fel krdseket. Ennek idtartama maximum 5-6 perc, mely idtartam els 2-3 perce a bemelegtst szolglja, azaz nem kerl rtkelsre. A msodik feladat az n. olvasott szveg rtse", amely egy rvid, 12-15 sorbl ll szakmai szveg olvassbl, sszefoglalsbl, ha szksges egy rvid rsz fordtsbl s a szveghez kapcsold krdsek megvitatsbl ll. A harmadik feladat egy elre elksztett PowcrPoint-os kiselads megtartsa. A trgy megvlasztsa a jellt feladata, egyetlen kikts, hogy az valamilyen informatikai tmhoz kapcsoldjk. Hosszsga kb. 5 perc, amely id alatt a jellt a kivettett dik segtsgvel kifejti vlemnyt az adott tmakrben. Felolvass esetn ez a feladat nem rtkelhet. A negyedik feladat az n. irnytott szakmai beszlgets. Ez annyiban klnbzik az elstl, hogy ennek tmakre kttt. A krdez tanr dntse alapjn a jellt vagy az olvasott szveg tmakrben fejti ki vlemnyt, vagy az ltala vlasztott PowerPoint-os elads tmjban ad tbbletinformcit, illetve esetleg vdi meg llspontjt. Az tdik feladat az n. hallott szveg rtse". Ez a feladat a szbelitl eltr napon is trtnhet a Vizsgakzpont egy szmtgpes termben. A vizsga kt rszbl ll. A kb. 20 percig tart vizsga els rszben egy rvid szveget kell hromszori meghallgats alapjn feldolgozni. Az els meghallgats mg feladatlap nlkl trtnik, a msodik s a harmadik meghallgats kzben egy angol lltsokat tartalmaz feladatsort kell kitlteni. A msodik rsz a szakmai szkincs-ismeret mrsre szolgl. A msfl-kt perces id alatt a jellt a hallott informcik alapjn tlti ki a kpernyn megjelen szkincstesztet.
(i
A szbeli vizsga pontjainak sszrtke 60. Ebbl a vizsgabizottsg eltti ngy feladatra egyenknt 10 pontot lelict kapni, mig a laborfeladat sszesen 20 pontot r. Itt is rvnyesek azok a szablyok, amelyek az rsbelinl kvetendk, azaz minden rszfeladatbl legalbb 40%-ot kell teljesteni, mig az sszpontszm 60%-a, azaz ebben az esetben 36 pont elrse jelenti a vizsga sikeres lettelt. Mg a laborfeladat krdseinek rtkelse teljesen objektv (a szoftver vgzi cl), addig a szbeli feladatok megtlse a vizsgabizottsg dolga. A szbeli vizsga sorn a bizottsg elnke a pontozson kvl rszletes feljegyzseket kszt a vizsgz teljestmnyrl, azaz a nyelvhelyessgrl, kommunikcis kszsgrl, szakmai szkincsismeretrl, rtsi szintrl stb. A jelen kiadvny utols rszben megtallhat nhny, a klnbz feladatokhoz kapcsold - mintakrds s vlasz azzal a cllal, hogy a vizsgra val felkszls sorn a jelentkez konkrt kapaszkodkat kapjon.
FELKSZLS A LEXINFO informatikai kzpfok szaknyelvi vizsgra olyan angolul jl tud jelentkezket vrnak, akik tanulmnyaik vagy munkjuk sorn informatikval, szmtstechnikval foglalkoznak, esetleg tanulmnyaikat klfldn szeretnk folytatni. A vizsgasorok sszelltinak meggyzdse, hogy azok, akik rendszeresen angolul hasznljk az Internetet, chatelnek vagy emaileznek angolul, hasznlati tmutatkat, informcis anyagokat lapozgatnak vagy esetleg mg egy-egy angol nyelv szaklap is kerl a kezkbe, megfelel clirnyos felkszlssel s az ltalnos nyelvi kszsgek birtokban sikeresen prblkoznak a nyelvvizsga lettelvel. A jelen kiadvny clja az informcik tadsn s a nyelvi kszsgek fejlesztsn tl az is, hogy a jvbeli vizsgzk betekintst nyerjenek a vizsga folyamatba, illetve az alkalmazott rtkelsi rendszerbe. Amennyiben gy gondoljk, hogy a jelen knyvben tallhat feladatok meghaladjk tudsukat, az albbi, az alapfokra felkszt kiadvnyokat tudjuk ajnlani: Btri Blanka-Fazekas Katalin: Everyday English for Computer Use (2003, DI-PRESS Kiad) Fazekas Katalin: Computer Reader (LSI Kiad, nyomtatott vltozat 2002, elektronikus vltozat SZMALK 2003) Fazekas Katalin: Tanuli segdlet a Computer Reader-hez (LSI Kiad 2002) Fazekas Katalin: Elkszt feladatsorok Informatikai Szaknyelvi Vizsgra - Angol Alapfok (LSI 2004) Sajt kiadvnyainkon kvl az Oxford University Press informatikai tmj knyveire hvjuk fel figyelmket. A Vizsgakzpont ltal forgalmazott kiadvnyokat egyedl is lehet hasznlni, termszetesen mg hatkonyabb, ha a vizsga eltt egy, a Nyelvvizsga Kzpont ltal szervezett, rvidebb-hosszabb elkszt tanfolyamon vesz rszt az a vizsgz, aki lehetsg szerint mr az els alkalommal meg akar felelni a vizsga kvetelmnyeinek. Ezekrl a tanfolyamokrl a Vizsgakzpont Titkrsg szemlyesen vagy telefonon a 4366-582 szmon az LSI Idegen Nyelvi Lektortusn, illetve a LEXINFO honlapjn http://www.gdf-ri.hu/Lexinfo lehet pontos informcihoz jutni. J munkt, sikeres felkszlst s vizsgzst kvn,
a Szerz
2. rsz - RSBELI
I. FELADAT - rott szveg rtse
v Rending Comprehension is the most important skill anil it is part of both the written ami the oral examinations, we have prepared two kinds of practice materials. A: The first type is a bit easier than the task at the written exam. Our aim was to five ample practice material in a graded from. In this part all the reading passages are followed by 5 simple comprehension questions, all yon have to do is decide whether they are True or False. B: The second part gives you 15 more articles with comprehension questions. These passages are longer (see examination specification) and contain 10 comprehension questions or statements. They are more complicated and show you what type of tusks you are going to face at the written exam. I./A.
1. Middle-aged women are getting hooked on card games and puzzles online, says a report.
W h i l e h a r d c o r e o n l i n e g a m i n g r e m a i n s the p r e s e r v e o f y o u n g m e n , research f i r m S c r e e n D i g e s t f o u n d that " b o r e d housew i v e s " are fuelling the g r o w t h of other g a m e s o f f e r e d on the net. F e m a l e s m a k e up 6 5 % of the g r o w i n g m a r k e t in skill-based g a m e s such as cards, solitaire and puzzles. This kind of casual g a m i n g is estimated to have been worth 2 7 0 m in 2003. Willing to pay T h e g i a n t s o f the g a m e w o r l d h a v e s e t t h e i r s i g h t s o n e n t i c i n g a w h o l e n e w g e n e r a t i o n o f p l a y e r s , a p p e a l i n g t o p e o p l e w h o are described as casual g a m e r s . M i c r o s o f t h a s a l r e a d y l a u n c h e d a n e w r a n g e o f o n l i n e g a m e s f o r its X b o x c o n s o l e t o a p p e a l t o t h e less h a r d c o r e g a m e r . " A m a z i n g l y , e v e r y s i n g l e o n e o f t h e m a j o r c a s u a l g a m e s s e r v i c e p r o v i d e r s r e p o r t e d t h a t this g r o w t h w a s b e i n g predominantly fuelled by middle-aged and f e m a l e gamers, the antithesis of the hardcore g a m i n g markets," said report author Nick Gibson. " W e j o k i n g l y t e r m e d this the bored h o u s e w i f e , " he added. Increasingly these " h o u s e w i v e s " are getting involved in competitive gaming, entering skill-based w e b games tournaments to c o m p e t e for cash and other prizes.
http://news.bbc.co.Uk/2/hi/technology/3791983.stm
{T}rue of (F)alse j
1. The article says that today the number of bored housewives spending a lot of time with online games and puzzles is higher than the number of middle aged young men doing the same. 2. Most women attracted by skill-based online games are in their forties. 3. The term "casual g a m e r ' refers to these women. 4. "Hardcore" gaming is a new trend in the online game industry. 5. These "housewives" seem to be attracted by the feeling of challenge.
I I CD CD CD
http://news.bbc.co.Uk/2/hi/technoIogy/3774747.stm
(T)rue or (F)alse
1. The article deals with the issue of data transfer. 2. Sony Computer Science Laboratories have invented a new tool for swapping information between two PDAs. 3 The new invention was presented to the public in a conference in Austria. 4. The term "pick and drop" technique here refers to how files can be moved from one directory to the other. 5. Dr. Jun Rekimoto, the Japanese scientist has developed the new device according to public expectations, which take into account that for most people abstract concepts are too hard to manipulate with.
I I
http://news.bbc.co. uk/2/hi/technology/2333041.stm
I lie gesture sensor called MultiTouch is acluallv a device fastened in the user's wrist. II you put (his device on your wrist, it will directly communicate u ith your computer.
inru.Mir (I i.it-..
v I his new invention has been developed in answer to complaints about physical problems. 4. The new invention's only positive side is that it can protect the user's wrists and shoulders. 5. In the future the computer mouse is expected to be replaced by some more flexible and less strainful devicc.
I |
http://news.bbc.co.Uk/2/hi/in_deptli/sci_tech/2003/denver_2003/2769741.stm
(T)rue or (Raise
1. K-bot is very similar to a live cat's head. 2. Its face can participate in communicative situations like smiling, frowning etc. 3. Its face muscles are moved by very small motors. 4. Although the reaction time of its facial expressions is long, the future lies in this type of robots. 5. Considering how smart this robot looks, its production price is relatively low.
in
S t r e s s levels Robot m a k e r N i l a n j a n Sark.ir and psychologist C r a i g S m i t h f r o m Vandcrbilt U n i v e r s i t y in T e n n e s s e e a r e collaborating on the project to m a k e the sensitive m a c h i n e . The pair are not c o n c e r n e d with g i v i n g their robot e m o t i o n s . T h e y j u s t want it to u n d e r s t a n d what h u m a n s are feeling. Marly work is c o n c e n t r a t i n g on w a y s of accurately s e n s i n g w h a t p e o p l e arc feeling, but P r o f e s s o r S m i t h a c k n o w l e d g e d the difficulty of the task lacing t h e m . " T h e hard fact is that different i n d i v i d u a l s e x p r e s s the s a m e e m o t i o n rather differently/* he said. To get a better idea of h o w p e o p l e r e s p o n d to d i f f e r e n t situations, the pair are fitting e x p e r i m e n t a l s u b j e c t s with small wearable sensors that m o n i t o r their r e a c t i o n s w h i l e they play video g a m e s .
http://ncws.hbc.co.Uk/2/hi/technology/25900S7.stm
(T)ruo or (F)alse
1. The aim of these two US researchers was to design a robot that can be as sensible as a human being. 2. The robot's main task will be to serve its owner like a good butler. 3. The task is very complcx as different individuals have different needs. 4. The researchers think that by observations thev can draw general conclusions from tests carried out in everyday situations. 5. The researchers are trying to get some ideas by following human responses to video games with the help of wearable sensors.
http://news.bbe.co.iJ k/2/hi/in_depth/sci_tech/200 l/artificial_intelligence/l 536962. stm (T)rue or (F'ialse 1. The robot dog is so life-like that you immediately want to play with him. 2. When Aibo appeared, he immediately smiled at his master. 3. Me not only looks nice but moves around like a dog. 4. He is called Aibo, which name lie understands immediately. 5. He can be programmed to behave in different ways.
http://news.bbc.co.uk/l/hi/in_depth/sci_tech/2001/artificial_intelligence/1537842.stm
(T)rue or (F)alse
1. The robot the passage is about is called a "child" because it can be programmed to love. 2. The novelty of this child android is that it can acquire a language the same way as a human does. 3. If a robot develops its language knowledge like people, it will probably be able to communicate in a more natural way than being preprogrammed for talk. 4. The process of teaching this robot to talk is similar to the way parents teach their babies in their first years. 5. As the robot has no long years to grow up like a baby does, its "mummy" is immediately teaching it how to behave in adult situations.
http://news.bbc.co.Uk/l/hi/technology/3746887.stm
1. PlayStation 2 is a game that enables users to sing to music like at a caraoke party. 2. The problem with PS2 is that only one singer can use it at one time. 3. While singing, the gamers can get a critical feedback from the software. 4. The repertoire can be enlarged by recent hits - which reflects the teen audience' expectations. 5. The game package includes a camera, which can record the gamers' performance.
(T)rue or (F)alse
O CH CH I I I I
http://news.bbc.co.Uk/l/hi/technology/3770353.stm
(T)rue or (F)alse
1. This new invention has got a special award granted for engineering products. 2. This active glass is made of microcrystalline titanium oxide. 3. If we use this glass in our windows, we don't need anything else just water to keep them clean. 4. Titanium dioxide is poisonous stuff. 5. The essence of the cleaning process is that it gets into reaction with light, which breaks down filth. CH I I CD
\ n Mirpri.si' I lie etoiip was set up alter c o n c e r n s w e r e raised in media rcporis about the possible dangers particles c n g i n c e i e d mi ilnnano-scale - a n a n o m e l i c is a billionth of a m e t r e - p o s e to people's health. Science fiction writers, notably M i c h a e l C r i c h t o n . h a v e also Honied the idea that " n a n o b o t s " could run a m o k , turning the u hi Id into a "grey g o o " Mosi people t h o u g h , h a v e liule idea w h a t nanotcch is - for better or worse.
http://ne\vs.bl>c.co.u k/l/hi/sci/tcch/3513382.stm
(T)rue or (Raise
| | j
1. A survey shows that the majority of people have never heard of the term "nanotechnology". 2. 19% of the people asked in the survey could give a correct definition of term. 3. Researchers have accurate ideas about what potentials nanotechnology has for scicncc.
I 4. There is a rising public concern about the potential harmful effects of nanotechnology-cngincered inventions. | i 5 These public worries have been caused by issues first raised by science fiction writers in their books.
http://ncws.bbc.co.Uk/l/hi/sci/tech/2698649.stm
(T)rue ot {Flalse
I. There is a great scientific potential in nanotechnology. ; I I 2 The new research centre in London is mainly funded by the state. 3. The word "clean" here probably refers to a scientific term meaning that the location is free of dust or any other nano-scalc dirt in the an 4. Nanotechnology is expected to produce revolutionary inventions in one field. 5. At least half of the staff will come from universities.
14
http://news.bbc.co.Uk/l/hi/sci/tech/1668415.stm
(T)rue or (F)alse
1. Scientists have produced a nanocomputer in order to create a device capable of cracking the genetic code of organisms. 2. DNA sequencing is still a problem for the scientists to solve 3. Once ready, the computer doesn't need any human help to perform its task. 4. The computer itself consists of one DNA molecule. 5. The new tool of today hasn't still reached its full potential.
I ""Patrolling" Internet cliatrooms in tins case means sneaking into these circles without being seen and checking on activities going on among the members. 2. The Cyber police will have legal means to take measures in order to stop child pornography. .). The maul aim of the operation is to reduce the number of porno sites on the Internet. 4. MSN Web portal has already tried to handle the problem without the police intervention. 5. Everybody welcomed the step when MSN closed down some portals because of their illegal activities.
(T)iij.'
,1 Ml'-.
http://www.cnn.com/2004/TECH/internet/05/28/domains.reut/iridex.litmI
(T)rue or (F)alse
I j
1. From now on there is a new regulatory body to decide on new Internet domains.
2. If you want to introduce a new domain name ending, you have to pay 8 dollars. I 3. The selection criteria for new domain name endings havealways been clearly defined and made public, i 4. Whether a domain name ending is accepted depends on two I main factors. j i 5 Most of the new endings suggest the main field of activity the URLs belong to.
K.
http://money.cnn.com/2004/06/09/technology/personaltech/bc.tech.laptop.reut/index.htm
(T)rue or (F)alse
1. liven if you think you have wiped the memory of your laptop clean, it is not advisable to sell them. 2. The Swedish company has been surprised to find that second-hand laptops bought at auctions or online give out the sensitive information of their previous owners. 3. Even companies make the mistake of selling their laptops not considering security issues. 4. You can easily buy a second-hand laptop that even your grandmother can crack. 5. Be careful with your laptop when traveling because, if lost and sold at an auction, your sensitive data may be accessed by the new owner.
I1
I I I I I I II
I./B 1. A headlong rush is taking place in cyberspace to grab a slice of the potentially lucrative market for legal music downloads.
C o c a - C o l a is the latest to j o i n the fray, l a u n c h i n g its o w n b r a n d e d o n l i n e m u s i c s e r v i c e with m o r e than 2 5 0 , 0 0 0 tracks costing from 80 p e n c e each. It s e e m s that e v e r y o n e f r o m r e c o r d labels to s o f t w a r e c o m p a n i e s is t r y i n g to cash in on the s u c c e s s of A p p l e ' s iTunes music store w h i c h has sold 25 m i l l i o n s o n g s in j u s t n i n e m o n t h s . To t h o s e in the m u s i c b u s i n e s s , it reflects a s h i f t in h o w t h e industry s e e s t h e Internet. " T h e t e n o r o f our d i s c u s s i o n s h a s entirely c h a n g e d . " " W e w e n t f r o m zero r e v e n u e a s a n industry t o $ 3 0 m b y the e n d o f last y e a r for legitimate digital d o w n l o a d s . " O v e r t h e p a s t 12 m o n t h s , the b i g record labels h a v e realized there is an u n t a p p e d d e m a n d f o r online music. N o w singles c a n be d o w n l o a d e d o v e r the net f o r j u s t u n d e r a p o u n d , as w e l l as w h o l e a l b u m s by c h a r t - t o p p i n g artists. " T h e r e has b e e n an absolute sea c h a n g e in the last y e a r , " " T h e r e has b e e n a c o m p l e t e s h i f t in e m p h a s i s a n d p h i l o s o p h y in getting this c o n t e n t o u t to t h e p u b l i c . " The shift i n the r e c o r d industry d i d not c o m e o v e r n i g h t . T h e w i d e s p r e a d o n l i n e s h a r i n g o f copyrighted s o n g s and the vision o f A p p l e f o r c e d the h a n d o f t h e business. " P e o p l e u s e d t o bitch that y o u can't c o m p e t e w i t h f r e e . " " N o w e v e r y o n e has a c c e p t e d that y o u can c o m p e t e w i t h f r e e , o f f e r i n g s o m e t h i n g that i s better than f r e e . " A t the d i s c u s s i o n o n digital d o w n l o a d s a t the r e c e n t C o n s u m e r E l e c t r o n i c s S h o w i n L a s Vegas, m o s t panellists a g r e e d that the k e y to s u c c e s s p r o v i d i n g a b e t t e r alternative to u n a u t h o r i s e d file-sharing services.
(1350
characters)
http://news.bbc.co.Uk/l/hi/technology/3409089.stm
Finish the following sentences by choosing the best answer from the given alternatives. 1. Legal music downloads a. seem to be a profitable business nowadays. b. make online firms rush in a competition for the market. c. Both a. and b. 2. Coca-Cola a. started its enterprise in this field before many other companies could see how profitable this activity would be. b. has joined the large number of online music service providers because it can see huge potentials in the business. c. Neither a. nor b. 3. Apple's iTunes music store a. showed the others that selling online music could be a very profitable enterprise. b. started its online music trading about three quarters of a year ago. c. Both a. and b. 4. Many people have realized now that a. the Internet is not a threat to the music industry. b. from zero revenue their profits can grow to 30 million dollars in one year. c. Neither a. nor b. 5. Even the best-known music manufacturers a. know now that online music is the future. b. have realized that downloading music cannot be stopped with legal measures. c. Neither a. nor b.
18
6. The price for downloading legally greatly depends on a. whether we want a single song or a whole album. b. how rccent and trendy the music is. c. Neither a. nor b. 7. The change came last year when a. the participants of the industry decided to change their approach to music downloading. b. Apple Tunes introduced online music sharing overnight. c. Both a. and b. 8. The concept that nobody can compete with free software a. cannot be beaten. b. has overcome the headlong rush for the potentially lucrative market. c. Neither a. nor b. 9. Many participants in the music industry have already accepted that a. the competition is free. b. if the service is better, people are ready to pay for it. c. Both a. and b. 10. At the Consumer Electronics Show a. people agreed that unauthorized file-sharing services are not the best answer to the public demand. b. there was a public discussion about the ways of providing legal ways for downloading files. c. Neither a. nor b.
2. The number of songs sold via Europe's biggest music download sites has increased tenfold over the past year.
M o r e than a million d o w n l o a d s h a v e b e e n sold via sites such a s F r e e s e r v e , M S N a n d M y c o k e m u s i c f r o m J a n u a r y - M a r c h - 10 times up on t h e s a m e p e r i o d in 2 0 0 3 . O D 2 , the f i r m that p r o v i d e s the d o w n l o a d s , said O u t K a s t ' s H e y Ya! w a s the m o s t p o p u l a r s o n g i n the U K . It said it p r o v e d there w a s d e m a n d for a " d e c e n t , legal alternative to p o o r quality illegal peer-to-peer n e t w o r k s " . M u s i c fans are d o w n l o a d i n g a w i d e r a n g e of songs, w i t h the top 100 d o w n l o a d s a c c o u n t i n g f o r j u s t 11% of sales, the c o m p a n y said. T h i s contrasts with C D s i n g l e sales, w h e r e the top 100 C D singles a c c o u n t for 7 7 % o f total C D singles sales. " T h i s indicates that O D 2 ' s legal d o w n l o a d sites are i n t r o d u c i n g m u s i c - l o v e r s to all k i n d s of n e w t y p e s of m u s i c , " said O D 2 chief e x e c u t i v e C h a r l e s G r i m s d a l e . M e a n w h i l e , a report by r e s e a r c h e r s at H a r v a r d and N o r t h Carolina U n i v e r s i t i e s h a s s u g g e s t e d that s w a p p i n g s o n g s online has h a d no n e g a t i v e e f f e c t on m u s i c sales. T h e report said h i g h levels o f f i l e - s w a p p i n g had a n e f f e c t o n C D s a l e s that w a s " i n d i s t i n g u i s h a b l e f r o m z e r o " . T h e research, c o n d u c t e d o v e r 17 w e e k s in 2 0 0 2 , b l a m e d "a r e d u c t i o n in m u s i c v a r i e t y " a n d "a c o n s u m e r b a c k l a s h " for declining sales. T h e study says illicit s o n g - s w a p p i n g a c c o u n t s f o r a "tiny f r a c t i o n " of a 2 0 % dip in m u s i c sales o v e r the last three years.
(1170
characters)
http://news.bbc.co.Uk/l/hi/entertainment/music/3590777.stm
Which is the host (closest to the information covered by the passage) answer to the following questions? I What docs the headline suggest'.' a. In one year about ten times as many songs were illegally downloaded in liurope as in the world globally. b. Downloading music with the help of European file-swapping sites has drastically increased in one year. 2. I low many songs were sold online in 2003? a. The article doesn't exactly say. h. More than one million. 3 Which is/are Europe's biggest music download site/s? a. OD2. b. Frceserve, MSN and Mycokemusic. 4. Which" was the most popular song downloaded online? a. We don't exactly know. b. Outkast's Hey Ya. 5. What does the passage say about file-sharing software services? a. They are poor quality. c. They are illegal but decent. 6. What information can we get if we compare sales with downloading habits? a. 11 percent of the downloaded music makes up 100 percent of the sales. b. Only a minority of people who download certain songs will buy them on CDs or records. 7. Why are CDs different? a. CD sales figures show different preferences than downloading statistics. b. They are mostly sought after. 8. What is OD2? a. It is a site from where we can legally download music by paying for the copyright. b. [t is a company which services several sites offering legal downloading for music fans. 9. What do the researchers at Harvard and North Carolina Universities suggest? a. Their researches have shown them that CD sales are not greatly influenced by the illegal file-sharing practice. b. They have found that CD sales figures haven't been significantly dropping. 10. What arc the research's findings? a. The main reason for the decline in sales figures is the lack of mustc variety. b. Illicit music downloading can be blamed for a major drop in music sales.
20
(1314
characters)
http://news.bbc.co.Uk/l/hi/technology/3766023.stm Which sentence is True? 1. a. According to the headline of this article the control on video games in China hasn't been tight enough so far. b. According to the headline China is considering video games as a tool for tightening controls.
2.
a. The censorship committee banned a Swedish game called Hearts of Iron. b. The censorship committee's task is to check whether online games violate the political ideas of China.
a. The Ministry of Culture stated that video games with a politically adverse content will be banned. b. The Ministry of Culture declared that these video games mean a political threat against China. 4. a. The problem with the Swedish game was that it threatened the national unit)' by handling certain formerly independent territories as separate ones. b. The game "Hearts and Iron" took place in territories which used to be independent.
a. The Ministry of Culture is in charge of the censorship starting from 1st September. b. The censorship involves authorization by the Ministry of Culture.
6.
a. After the 1st September games will not be sold without the authorization from the Mtnistrv of Culture. b. Unless the video sanies are given green light, their operators " '! -
a. The committees run by ihe Ministry of" Culture mainly include people representing the different educational fields of China. b. Even the political power is represented among those deciding what content "could threaten" the nation.
8.
a. The members of the committee come from the National Committee of the Chinese People's Political Consultative Conference. b. Members of the National Committee of the Chinese People's Political Consultative Conference are represented in this screening committee too. 9. a. The Chinese online game market is mainly based on products manufactured in the far East. b. Only 20% of online games are home products.
10.
a. Chinese officials think superstition-related games may play a negative political influence on the young. b. In Certain Chinese officials' opinion the mental health of the Chinese youth may be harmfully affected by the contents of the online video games produced by foreign firms.
4. A pesky computer virus is taking advantage of the excitement surrounding the latest Harry Potter film.
T h e N e t s k y . P w o r m is e n j o y i n g a r e s u r g e n c e by d i s g u i s i n g itself as a P o t t e r g a m e , s a y anti-virus experts. T h e virus, w h i c h f i r s t a p p e a r e d t o w a r d s t h e e n d o f M a r c h , s p r e a d s b y e - m a i l a n d via f i l e - s h a r i n g services. T h e t h i r d f i l m about t h e a d v e n t u r e s o f t h e b o y w i z a r d , H a r r y P o t t e r a n d t h e P r i s o n e r o f A z k a b a n , w a s r e l e a s e d o n Monday, m a k i n g 5 m i n o n e day. A c c o r d i n g t o anti-virus f i r m S o p h o s , N e t s k y . P w a s the s e c o n d m o s t c o m m o n virus i n M a y , t o p p e d only b y the i n f a m o u s Sasser w o r m . It n o w s e e m s to be p i c k i n g up s t e a m a g a i n , with S o p h o s s a y i n g it h a d spotted t h o u s a n d s of c o p i e s of it in the last f e w days. Netsky.P, which only a f f e c t s M i c r o s o f t W i n d o w s PCs, relies on tricking a c o m p u t e r user into c l i c k i n g on an i n f e c t e d file. Virus w r i t e r s h a v e i n c r e a s i n g l y u s e d t h e n a m e s of celebrities to try to m a k e p e o p l e o p e n an e - m a i l and unleash its m a l i c i o u s payload. Past c o p i e s o f N e t s k y . P h a v e m a s q u e r a d e d a s n u d e p h o t o s o f B r i t n e y S p e a r s , E m i n e m M P 3 m u s i c f i l e s and illegal software. " E c h o i n g a t e c h n i q u e u s e d in 2 0 0 0 by t h e P i k a c h u w o r m , N e t s k y . P targets y o u n g c o m p u t e r u s e r s by s o m e t i m e s p o s i n g as c o n t e n t c o n n e c t e d w i t h the H a r r y P o t t e r b o o k s a n d m o v i e f r a n c h i s e , " s a i d G r a h a m Cluley, s e n i o r technology consultant at S o p h o s . " P a r e n t s n e e d to e d u c a t e their c h i l d r e n against the threats of viruses, to e n s u r e t h e popularity of P o t t e r doesn't cast a nasty spell o n their c o m p u t e r s y s t e m s . "
(1250
characters)
http://news.bbc.co.Uk/l/hi/technology/3773443.stm
22
Which sentence is closer in meaning to the original reading passage? 1. a. The headline suggests that the more popular the latest Harry Potter film is, the easier it is for the virus to spread all over the world. b. According to the headline this computer virus is attracting so much excitement because it's spreading with the help of the popular Harry Potter film.
2.
a. The virus appeared when the third Harry Potter film was released. b. The virus has been spreading faster since the HP Film was released. 3. a. The virus mainly spreads like most, via e-mails and file-sharing software. b. The virus can spread mainly because it disguises itself as a game.
a. The well-known Sasser worm was the most common virus in May. b. When the film came out, Netsky stepped up to first place. 5. a. Netsky can spread on computers running on operation systems other than MS. b. Sophos confirms that this virus - like most - takes advantage of users opening infected files.
6.
a. A way to make people eager to open suspicious emails is to send it in the name of well-known people. b. People who know celebrities are more exposed to malicious viruses.
a. If a virus was disguised by nude photos of Britney Spears to click open, it would have more chance to spread than MP3 music files. b. Netsky has been able to spread so fast because its creator has found a very effective way of disguising it. 8. a. The technique for effective dissemination used in this virus has never been applied before. b. There doesn't seem to be anything new in the way this virus is spreading among young users. 9. a. Young computer users are attracted to the Harry Potter books so much that they seem to forget all precaution when opening up emails from unknown senders. b. Young computer users are still inexperienced, this is why Netsky.P has been spreading on the net so successfully.
a. Parents must be involved in the war against the threats of viruses. b. The popularity of the Harry Potter books may spoil the pleasures gained from the computer.
5. UK music fans have legally downloaded more than 500,000 songs so far this year, industry figures show.
T h e biggest-selling d o w n l o a d of the y e a r to date is C o l d p l a y ' s 2 , 0 0 0 Miles, j u s t a h e a d of O u t K a s t ' s H e y Ya!. T h e half-a-million barrier w a s b r o k e n j u s t a w e e k after the UK launch of Napster, w h o s e s a l e s are not included in the figures. T h e British P h o n o g r a p h i c Industry's ( B P I ) figures also reveal that the cassette s i n g l e has d i e d as a f o r m a t . In the first quarter of 2 0 0 3 , 4 1 8 , 0 0 0 w o r t h of cassette singles w e r e sold - b u t there w e r e no s h i p m e n t s in the first three m o n t h s of this year. But the UK m u s i c industry will be b u o y e d by the g r o w t h in legal d o w n l o a d s . T h a t m a r k e t w a s practically non-existent this t i m e last year. BPI c h a i r m a n Peter J a m i e s o n said: "With 5 0 0 , 0 0 0 legal d o w n l o a d s sold already this year, we h a v e hit yet another m i l e s t o n e in the d e v e l o p m e n t of this e x c i t i n g n e w m a r k e t f o r music. "This-is s h a p i n g up to be a b r e a k t h r o u g h y e a r f o r the m u s i c industry." T h e first quarter of 2 0 0 4 also s a w a 4 7 . 8 % rise in the sales of vinyl 7-inch s i n g l e s . B u t C D s i n g l e sales d r o p p e d b y a l m o s t a t h i r d o n t h e s a m e period last year, w h i l e C D a l b u m s a l e s w e r e d o w n a l m o s t 3%. T h e B P I said t h e small d e c l i n e in CD a l b u m sales w o u l d " c o m e as a relief in an industry w h i c h h a s seen double digit declines in some major markets". A l b u m sales account f o r m o r e than 9 0 % o f t h e U K industry's revenue. T h e total v a l u e o f t h e U K m u s i c i n d u s t r y fell 4 . 3 % i n t h e f i r s t three m o n t h s o f 2 0 0 4 c o m p a r e d w i t h t h e s a m e period last year.
(258
characters)
http://news.bbc.co.Uk/l/hi/entertainment/music/3769365.stm
Find the answer to the following questions: 1. When were 500.000 songs downloaded legally in the UK? a. In the first few months of 2004. b. In all 2004. 2. How do we know how these songs were downloaded? a. It is just a guess, as the traffic on the Internet cannot be traced. b. Legal downloads can easily be followed by the companies themselves. 3. Which is the most popular song this year? a. Number one is OutKast's Hey Ya. b. We still don't know because the figures refer to the first part of the year. 4. What does the number half a million refer to? a. It is the number of sold copies of the biggest-selling song. b. It refers to the times when the top song was downloaded legally. 5. When did Napster start in the UK? a. We don't exactly know it from the article. b. When OutKast's Hey ya! was launched to the legal file-sharing sites. 6. Why does the passage say that the cassette single is no longer the most wanted item on the music market? a. It compares the sales figures of 2004 to those of last year. b. It gives the sales figures of 2003, which were very high.
24
7. Wlial can the British music industry financially gain in this situation? a. The rise of albums. b. The growth of legal downloading. 8. Why does the BPI chairman think that 2004 may be a breakthrough for the music industry? a. He is sure that the exciting new albums are shaping the market. b. Because legal downloads - opposed to illegal music piracy - may bring more profits. 9. What is the difference between the demand for traditional records and CDs? a. Whereas single records are selling, single CD sales drop drastically. b. Whereas CD albums sales dropped by 3%, record albums are on the rise. 10. What does the BPI say about the British market? a. They think that in the British market, where there have been huge drops recently, the mild decline of the CD album sales must be considered as something positive. b. They know that the decline in the sales of the British music industry has been huge.
6. The smoke alarm has beaten the digital camera, mobile phone and the microwave oven in a survey to find out the British public's top 10 innovations.
T h e s a f e t y d e t e c t o r n o w fitted i n all n e w b u i l d i n g s i n t h e U K w a s c o n s i d e r e d t h e t o p g a d g e t b y 7 0 % o f t h o s e asked. T h e first b a t t e r y - o p e r a t e d h o m e s m o k e d e t e c t o r w a s p a t e n t e d i n t h e U S i n 1969 b y R a n d o l p h S m i t h a n d K e n n e t h H o u s e . A l m o s t t w o - t h i r d s o f r e s p o n d e n t s p u t t h e m o b i l e p h o n e i n t h e i r t o p 1 0 innovations. T h e c o n v e n i e n c e o f the m i c r o w a v e o v e n a p p e a l e d t o many, w i n n i n g o v e r h a l f t h e v o t e s . A n d the h u g e g r o w t h i n digital p h o t o g r a p h y i n r e c e n t y e a r s h a s c l e a r l y p l a y e d w e l l f o r t h e c a m e r a w h i c h c a m e f o u r t h i n t h e list. Scientific a n d technological b r e a k t h r o u g h s i n the s h a p e o f D N A t e s t i n g and laser e y e - s u r g e r y c a m e i n f i f t h a n d sixth. G a d g e t s s u c h a s M P 3 players, w h i c h i n o t h e r t e c h p o l l s h a v e p r o v e d popular, c a m e n o w h e r e i n t h e vote. " B y f a v o u r i n g the s m o k e a l a r m , B r i t s h a v e o p t e d f o r a n i n n o v a t i o n that f u l f i l s o n e o f o u r m o s t b a s i c a n d primal n e e d s s a f e t y in the h o m e . " C o n v e n i e n c e w a s also a f a c t o r i n the n a t i o n ' s c h o i c e . T h e m i c r o w a v e o v e n , cash a n d debit c a r d s a n d l o n g - l i f e light b u l b s w e r e all labour-saving d e v i c e s that m a d e it i n t o the t o p 10. W h e n asked w h a t p e o p l e w o u l d like to s e e f r o m f u t u r e i n n o v a t i o n s , a third v o t e d for a w a s h i n g m a c h i n e that w a s h e d , dried and ironed clothes. O n e in five o p t e d for a w e i g h t loss drink a n d o n e in 10 w a n t e d to cut out the hassles of c o m m u t i n g w i t h a t i m e capsule to e n s u r e a s p e e d y route to w o r k . " T h e s e c h o i c e s d e m o n s t r a t e that p e o p l e i n t h e U K a r e m o r e i n t e r e s t e d i n practical, e v e r y d a y i n n o v a t i o n than revolutionary dreams."
(1420
characters)
http://news.bbc.co.Uk/l/hi/technology/3770559.stm Which sentence is closer to the article: 1. a. The British buy more digital cameras and mobile phones than smoke alarms. b. Most people agree that the smoke alarm is a more important innovation than the digital camera or the mobile phone.
2.
a. Seven people out o f t e n surveyed in the UK think that the smoke alarm is a top gadget. b. Among those who were asked in a questionnaire, about 3% think that the digital camera is more important than the smoke alarm.
a. Many Britons put the microwave oven among the first 10 innovations. b. The digital camera's position didn't really reflect the importance of digital photography in our life.
4.
a. The medical applications of high tech inventions were well represented in the respondents' evaluation. b. DNA testing was given a high position although laser eye surgery was found more important. 5. a. Interestingly enough, the results of this poll differ in certain aspects such as the place of MP3 players. b. In all surveys MP3 players show how popular they are in our everyday life.
6.
a. The high position of the smoke alarm shows how important our convenience proves to be. b. The Brits have given their vote to the smoke alarm because they are getting more conscious of safety hazards. 7. a. The top 10 high tech inventions show that people are most interested in the labour saving devices, b Long life light bulbs belong to a different category.
8.
a. Most people's future expectation of high tech devices includes even more convenient labour saving devices. b. Every third person among the respondents expect that in the future the high tech inventions should take even more load off the household duties. 9. a. The answers show that even in the UK many people are worried about their weight. b. Some people are dreaming of speedy vehicles so that their commuting time could be reduced drastically.
10.
a. The Brits are not very practical people. b. The Brits think that down to earth innovations can improve their quality of life.
Hul although sales h a v e d e c l i n e d in m a n y m a t u r e markets, s o m e d e v e l o p i n g m a r k e t s arc still strong. N e w s p a p e r s a l e s w e i e up by o v e r 4% in C h i n a , the world's biggest market, and by an impressive 9% in India. China has the largest lotal d a i l y circulation of any country in the world, with m o r e lhan 85 million c o p i e s sold, f o l l o w e d by India, Japan and the U S A . In Russia, the n u m b e r of dailies published has a l m o s t doubled in Iwo years. The g r o w t h in n e w free c o m m u t e r dailies is also e x p a n d i n g the reach of the written press to a y o u n g e r generation, said the association's T i m o t h y B a l d i n g . T h e n u m b e r of free dailies has sliol up, with a 16% increase in 2 0 0 3 f r o m a year earlier, and a 2 4 % increase in the past five y e a r s in c o u n t r i e s for w h i c h data exists.
Which is closer to the article? I. a. The number of newspapers is increasing drastically all over the world. b. There is an increasing number of online newspapers accessible on the Internet. c. Both a. and b.
a. Timothy Balding is a director general, who was talking about the increasing number of online newspapers to the audience of the World Association of Newspapers' annual congress. b. The World Association of Newspapers has had its meetings once a year for the past 5 years. c. Neither a. nor b. 3. a. The World Association of Newspapers is based in Istanbul, where it annually holds its meetings. b. The Association is based in Paris and represents 18,000 online papers. c. Neither a. nor b. 4. a. The problem in the past year was that although the circulation of online newspapers increased, the demand for traditional papers slightly decreased. b. The problem last year was that all the 18.000 newspapers represented by the Association had a slight drop in the circulation numbers. c. Both a. and b. 5. a. The ligures showing the drop in circulation numbers still don't represent the 10 new EU member states. b. The Irish seem to spend the least money on newspapers among the "old" EU member states. c. Neither a. nor b.
6.
a. The tendency for circulation numbers to decline seems to be global. b. People buy the greatest number of newspapers in India. c. Neither a. nor b.
7.
a. In China more than 85 papers are sold each day. b. People buy fewer daily papers in India than in China. c. Both a. and b. 8. a. Russian people buy much more daily papers today than two years ago. b. One year ago the number of Russian daily papers was three quarters of what is published today. c. Neither a. nor b. 9. a. There is a rise in the number of free commuter dailies because editors wish to reach the younger generations. b. The article suggests that the younger generation doesn't actually spend money on traditional papers. c. Both a. and b.
10.
a. In the past 5 years there has been a steady and gradual increase in the number of free dailies. b. We don't have updated global data regarding the increase of the number of free dailies. c. Both a. and b.
Find the best answer/s to the following questions: 1. What do we know about real estate prices? a. They are very high. b. They have decreased due to rising interest rates. c. Both a. and b. 2. Why has the concept of virtual home ownership become so fashionable? a. The interest rates are growing.
til.
b. The real estate prices are very high. c. Both a. and b. 3. What kind of online gamers does the article refer to? a. They are people willing to invest in virtual real estate. b. They are people who are paying with virtual cash for virtual real estates. c. Neither a. nor b. 4. What is the price for these online properties? a. They can be around 550 dollars. b. The price depends on how big the estate is. c. Both a. and b. 5. What are these properties like? a. Some of them look like a nice real estate similar to those on the West Coast. b. They very much look like an idyllic place with palm trees. c. Both a. and b. 6. What is "Second Life"? a. It is an online game for people who want to play a role. b. It is the name of the virtual real estate agency selling online properties. c. Neither a. nor b. 7. What docs Philip Rosedale think about Second Life? a. He thinks that Second Life can be poisonous. b. He says that with the help of Second Life one can easily become a landowner. c. Neither a. nor b. 8. What is MMO? a. It is the abbreviation of online games attracting huge numbers of players on the Internet. b. It is the name for players enthusiastic about online games. c. Both a. and b. 9. What costs 9.95 dollars a month? a. It is the subscription fee for joining the group of MMOs. b. It is the fee for becoming an online player on the Internet. c. Neither a. nor b. 10. What is the Second Life world like? a. It is an online ecosystem with many virtual institutions of the real society. b. It is a virtual place where gamers can live a fantasy life without worrying about the real problems of existence. c. Both a. and b.
Which ending is closer to the original article? 1. The headline of the article suggests that a. porn sites are more popular than search engines. b. more surfers visit porn sites than use the different search functions c. Both a. and b. 2. Google is said a. to belong to the leading search engines of the Internet. b. to be visited three times less often than the online porn sites. c. Both a. and b. 3. The article gives figures a. about the visits by the American Internet users. b. about how many American users visit the different American search engines. c. Neither a. nor b. 4. Search Engines and Directories a. is the name for the three leading search providers. b. include a great number of search and directory sites. c. Both a. and b. 5. Yahoo.com a. is different from Yahoo Search because one is the name of the provider and the other is a portal. b. is the same as Yahoo Search. c. Neither a. nor b.
30
6. 'Computers and Internet' a. is the category into which different subcategories like Email Services and others fall. b. is similar to Net Communities or Software in the fact that they all belong to a larger category. c. Both a. and b. 7. Mitwise must be a. the name of a research firm. b. the firm that has categorized the portals according to the number of visitors. c. Both a. and b. 8. The 'Adult' subcategory, which has got 18.8%, a. must refer to its content. b. is visited by more people than 'Business and Finance' and 'Shopping and Classifieds' together. c. Both a. and b. 9. The research found that a. Google was the only search site that could grow its market share. b. both Yahoo Search and MSN Search have gained less market share than Google. c. Both a. and b. 10. Top travel sites seem a. to be gaining popularity by the Web search providers. b. to be losing their popularity among surfers. c. Neither a. nor b.
W hich sfatcmcnl is closer (o (he article in meaning? a. Computers seem to be collecting toxic dust. b. The dust on computers seem to be loxic as it may cause different disorders.
a. Environmental groups have conducted different surveys to find out the toxic content oI dust collected from common devices. b. The survey, conducted by different environmental groups wanted to study how toxic dust influences the human reproductive organs. 3. a. The amount of dust collected on these devices has been increasing ever since companies started using polybrominted diphenyl. b. The dust collected on these devices had not been toxic until firms started to use polybrominatc diphenyl 011 their surfaces. 4. a. I'BDEs are used on these surfaces because they make our deviccs less flammable. b. PBDEs are not toxic because they stay closed in the casings of our dcviccs.
a. Ted Smith, the director of the Toxics Coalition thinks that we are tn danger due to being subjected to toxic chemicals used on our devices. b. Ted Smith, the director of the Toxics Coalition thinks that the chemical industry is trespassing the commercial law.
6.
a. In Ted Smith' opinion most people have already been aware of the dangers their computers expose them to. b. According to Ted Smith people will be surprised if they hear about the dangers their computers mean to their health.
a. The different environmental groups state that the products manufactured by the chemical industry threaten the life of humans and other species. b. The use of different chemical substances may have a lasting effect on both humans and other species. 8. a. The research covered different computers and one monitor. b. The researchers wanted to find out whether common monitors or interactive displays are more hazardous. 9. a. The scientists conducting the survey tested all the different types of chemicals suspccted to be toxic b. The scientists examined the dust collected from computers covered by three types of polybrominatc diphenyl.
10.
a. The research has reached its aim: toxic substanccs have been banned from the devices. b. The environmentalists still have a lot to do in this issue.
(1characters) http://\\\v\v.iisatoday.com/tcchAvirelcss/phoncs/2004-06-04-stolen-mobile-pliones_x.htm?I>()F.='ir.CIS\A
Finish the sentence! 1. An ex employee of a mobile phone company a. has tried to sell his firm's products on the Internet. b. has joined an online auction site to sell cell phones online. 2. The company employee, Paul Richard Cook a. was accuscd of stealing 29 computers. b. was charged with theft and computer fraud. 3. Cook stole a. 500 cell phones worth 500 dollars each. b. the mobile phones in order to sell them online. 4. eBay seems to be a. an Internet portal for e-commerce. b. the portal for Cook's company where they run their c trading activities. 5. Cook not only stole cell phones and traded them online but he a. used his company's portal for his illegal trading business. b. was even unfair to his virtual customers. 6. Mr. Stansbury, the public information officer of Cook's company a. thinks that these illegal transactions are 011 the rise because the victims arc out of luck. b. has said that it is easier to carry out illegal online transactions because the victims live far from where the fraudulent traders are. 7. If you arc the victim of an Internet crime, a. you should turn to eBay or other Internet buying sites. b. your situation is difficult because it is very hard to find online criminals.
S. Cook is believed to have been carrying out these illegal transactions a for less than a year, b. for more than a year. 9. Cook probably stole the cell phones a. on a regular basis. b. from his own company called Cingular. 10. The value of cell phones Cook has stolen from his company and buyers a. surpasses 13 thousand dollars. b. amounts up to 82 thousand dollars.
Which answer is closer to the article? 1. What were the two Silicon Valley businessmen accused of? a. They sold merchandise that was on the list of goods banned from being imported to China. b. They violated the American export code by exporting military cameras to China. c. Both a. and b. 2. How many times did they ship the cameras to China? a. They did it nine times. b. We don't know the exact number. c. Neither a. nor b. 3. What sentence did the federal grand jury bring? a. The sentence consists of two parts: one is imprisonment and the other is a financial punishment. b. The businessmen will spend the rest of their life in prison. c. Neither a. nor b.
34
4. Why is Ihc sentence so severe? a. Because the camcras were shipped for the Chinese army. b. Because due to the growing number of terrorist attacks the Department of Homeland Security has increased security steps. c. Both a. and b. 5. What is ICE'.' a It is the abbreviation for the Department of Homeland Security. b. It is the short form for a regional agency investigating customs enforcements. c. Neither a. nor b. 6. What is ICE's main field of activity? a. To investigate the violation of export code. b. To investigate whether military equipment is shipped to China. c. Both a. and b. 7. What shows that the agency is effective? a. Each month ICE uncovers several plots in which satellite and military equipment is smuggled to China. b. ICE is successfully uncovering different plots that try to illegally acquire America's military technology. c. Both a. and b. 8. What happened last month? a. Two separate plots were organized to smuggle high tech military products to China. b. ICE caught some agents trying to smuggle military products to China. c. Neither a. nor b. 9. What products seem to be on the list of articles banned from export to China? a. Satellite and military helicopters and components as well as military cameras. b. A wide range of articles. Only some of them have been mentioned in the article. c. Both a. and b. 10. Why did ICE agents arrest two businessmen in Los Angeles? a. They tried to buy satellite technology articles for China. b. They had been carrying out export activities with China. c. Neither a. nor b. 13. Iraq seeks '.IQ' domain to make its mark on Net
Iraq is m a k i n g its first claim for an internationally r e c o g n i z e d p r e s e n c e on the Internet. Iraq's m e d i a c o m m i s s i o n and the U . S . - l e d a d m i n i s t r a t i o n in Iraq w a n t to set up W e b a d d r e s s e s u s i n g the d o m a i n c o d e " . I Q " as the final tag. That w o u l d m e a n a d d r e s s e s f o r Web p a g e s w o u l d be distinctively identified on the Internet with Iraq's o w n c o u n t r y code. T h e Iraqi c h a i r m a n of the National C o m m u n i c a t i o n s & M e d i a C o m m i s s i o n , S i y a m e n d O t h m a n , said the .IQ d o m a i n n a m e w o u l d allow Iraqis to stake a "virtual flag" in the w o r l d w i d e Internet community. It is "an important tangible and symbolic m i l e s t o n e f o r this nation, as well as the f r e e d o m a n d h o p e s of the Iraqi p e o p l e , " he w r o t e in a letter d a t e d M a y 20 to the Internet C o r p o r a t i o n for A s s i g n e d N a m e s and N u m b e r s ( I C A N N ) . A l t h o u g h Internet c a f e s are p o p p i n g u p t h r o u g h o u t B a g h d a d , f e w p e o p l e qj^n c o m p u t e r s , a n d e v e n f e w e r have regular a c c e s s to the Internet. A recent s u r v e y cited by t h e U . S . - l e d administration in Iraq f o u n d that about 6% of Iraqis say they h a v e access to the Internet but f e w e r than 2% use it regularly. A b o u t 12% of t h e p o p u l a t i o n r e p o r t s h a v i n g a computer. Iraqi o f f i c i a l s say the rebuilding of Iraq has b e e n h a m p e r e d by p o o r national c o m m u n i c a t i o n s . B e f o r e the war, a n Internet c o m m u n i t y h a d b e g u n t o e m e r g e u n d e r the r e g i m e ' s State C o m p a n y f o r Internet Services, f o u n d e d in 2001.
I lie Stale C o m p a n y is n o w ihc m a i n national Internet service provider. t h e U.S.-run administration in Iraq s a y s it has begun to create electronic c o n n e c t i o n s b e t w e e n various g o v e r n m e n t b u r e a u s and to m a k e the Internet m o r e a c c e s s i b l e to the private sector. (IMill cluirnrlcrx)
Decide which is the best ending to the following sentences: 1. Iraq is trying a. to introduce its portals on the Internet. b. to show its political existence by using its special domain name ending. 2. The new domain names with the tag "IQ" a. have been established by the US led administration in Iraq. b. are going to be introduced as a joint action by some Iraqi office and the American administration. 3. The new domain code a. will show clearly that the portal the surfer is using belongs to the Iraqi National Communications and Media Commission. b. will help to clearly identify the Iraqi portals. 4. Siyamend Othman thinks that a. the new domain name is like a flag. b. the new tag symbolizes the beginning of freedom for the Iraqi people. 5. ICANN is a. an international association which decides on new Internet addresses and tags. b. a virtual society that operates on the Internet. 6. As far as the Internet and computers are concerned a. even in the capital the Iraqi people are still very much behind. b. in Baghdad the situation is not so bad as people can use the Internet cafes. 7. There is a recent survey about Internet access in Iraq, which a. has been can ted out by the American administration. b. shows that even those who have access to the Internet don't use it regularly. 8. In the Iraqi officials' opinion a. the reconstruction of the country has been delayed by the lack of computers and Internet access. b. to rebuild the country will take longer as people cannot access updated information. 9 Before the war a. the situation in the field of Internet application was completely different. b. more and more Iraqi people started to use the Internet services. 10. After the war a. the US run administration is trying to expand the Internet service to the private companies as well. b. the US inn administration, together with the State Company for Internet Services, is doing its best to provide an efficient Internet service both to the private and the state sectors.
Which sentence is correct? 1. a. With the growth of memory capacities the range of high tech gadgets is growing. b. The larger memory capacities are, the smarter high tech gadgets become. c. Both a. and b.
2.
a. Flash microchips are the heart of our smart devices. b. Flash microchips can be found in the different memory cards. c. Both a. and b. 3. a. Some of the drives we use with our computers have shrunk into a size as small as a key. b. These very small drives (unlike the normal size) plug into the computer's USB drive. c. Neither a. nor b. 4. a. Although memory capacities arc growing rapidly, the prices of these gadgets are dropping at a slower pacc. b. The growth of memory capacities induce manufacturers to produce more and more flash based devices. c. Both a. and b. 5. a. This fast rise in the number of flash based devices is similar to what happened to compact disks and DVDs. b. This growth in the flash based applications may dramatically reduce demand !' -' ' ' c. Both a. and b.
6.
a. One ol" the typical applications of flash technology is MusicDrivc, a product of KingByte Information. b. MusicDrive is a flash technology based gadget. c Both a. and b. 7. a. Luisa Sam, the vice manager of sales at Samsung said she expected a drastic drop in price in the music gadget market. b. The vice manager of sales said their product, MusicDrive, could be bought at 98 dollars in early 2004. c. Neither a. nor b.
8.
a. The sales manager at KingByte Information explains their good sales figures by the fact that the price has recently fallen considerably. b. The annual sales figures of MusicDrives have tripled in 2004. c. Neither a. nor b. 9. a. Sam thinks that the price of 2000 dollars for a music device with 16 gigabytes of memory is lower than it was at the beginning of the year. b. The sales manager at KingByte Information is sure that the music devices based on flash memory can reach a capacity of 16 gigabytes of memory in the near future. c. Neither a. nor b.
10.
a. Many people have been ordering music devices with a huge memory capacity at a low price. b. Sam has named some of their most important customers who are greatly interested in their product. c. Neither a. nor b.
(1230
characters)
http://www.usatoday.com/tech/news/2004-06-03-mcdonalds_x.htm
38
Answer the following questions with the most appropriate sentence! 1. Why arc McDonald's and Sony teaming up? a. McDonald's has decidcd to break off its partnership with Walt Disney. b. McDonald's is opening up to the market of young adults. c. Both a. and b. 2. What is McDonald's promotion about? a. They are introducing a new service for their young customers eating in one of their chain restaurants. b. Those who order a special meal get an access code to use McDonald's Hotspots free for browsing the Internet. c. Neither a. nor b. 3. How does Sony come into the picture? a. Sony has opened a music store next to McDonald's in the States. b. People who get the free access code will be able to download one song free from Sony's online music store. c. Both a. and b. 4. Is the promotion called Big Mac Meal Tracks global? a. Not at the moment, but they are planning to take it overseas later. b. It is, but it will finish after 6 to 10 weeks. c. Neither a. nor b. 5. How do analysts explain McDonald's alliance with Sony? a. McDonald's is said to have made this alliance because it wants to get rid of its tie-in with Disney. b. McDonald's probably wants to attract a different audience from what it targeted earlier. c. Both a. and b. 6. How is McDonald's trying to change its image? a. It is launching global campaigns suggesting that it is more than a fast food chain. b. With its slogan "I'm loving it" it suggests that it combines food with music. c. Neither a. nor b. 7. Why do non-restaurant venues appear in McDonald's commercials? a. The aim is to convey that going to McDonalds' is not just eatmg in a fast food restaurant but taking up a life style. b. Th'ey incorporate hip hop music as a tool to propagate Sony, their partner in the alliance. c. Neither a. nor b. 8. What does Jack Trout refer to when he uses the expression "kiddyland box"? a. He is referring to McDonald's image as a popular destination for Kids. b. He recalls the meals specially made for kids at McDonald's. c. Neither a. nor b. 9. What is Jack Trout's opinion about the traditional alliance of McDonald's with the Disney Co? a. He thinks Disney (at the present state of affairs) has a negative effect on the efficiency of McDonald's new marketing campaign. b. He is sure Disney cannot help McDonald's in its new marketing campaign. c. Both a. and b. 10. How does Jack Trout, the marketing consultant of Trout and Partners, explain McDonald's alliance with Sony? a. McDonald's has been trying to find marketing partners who help it to leave its traditional image behind. b. McDonald's has looked for a new partner that can help it to appeal to an older generation than the target group of Disney. c. Both a. and b.
I. Read the following definitions. You will find blanks that must be filled with one of the words from the list. Be careful because there arc more words in the list than needed. Each correct solution is 2 points.
1. horizontal, identify, linking, recognize, tracking, transmits, vertical bar code Invented in South Beach, Miami, by Joseph Woodland and Bernard Silver, in 1949, it was patented in 1952 and first used commercially in 1974. Composed of a series of (I) lines printed on most physical merchandise, it's used to identify the product and its price (among other details). A scanner (2) the information to a cash register or computer for action (such as printing out a receipt). Bar codes are used in a variety of ways, including (3) medical records to a hospital patient's ID bracelet or (4) packages from overnight shippers. Considered to be the killer application of the digital age, bar-coded UPC symbols are used by more than one million companies worldwide to (5) consumer products.
2. accessed, downloaded, found, improves, reuse, retrieved, saved cache or caching The action of storing Web files for later (1) so that they can be (2) more quickly by the end-user. When you're on the Web, the cache (3) your Web browser's performance: it stores HTML page code, graphics, and multimedia elements so that when you return to that particular Web page (even if you just hit the back button), the information doesn't have to be (4) all over again. The cache is a form of high-speed memory that your computer sets aside to store frequently accessed data; once the data is stored, it can be (5) directly from your hard drive rather than from a server.
The incredibly complex yet tiny modules that store computer memory or
(I) logic
circuitry for microprocessors. Perhaps the best-known chips arc the Pentium microprocessors from Intel. The PowerPC microprocessor, (2) by Apple, Motorola, and IBM, is used m Macintosh personal computers and some workstations. AMD and Cyrix also make popular microprocessor chips. There are quite a few (3) of memory chips. Many (4) chips, known as application-specific (5) circuits, are being made today for automobiles, home appliances, telephones, and other devices.
40
4. access, browse, contact, contain, identity, saved, stored cookics ll is a tunny name for a small piece of information about you (about your computer, actually). It is a small file that a Web server automatically sends to your PC when you (!) certain Web sites. Cookies arc (2) as text files 011 your hard drive so servers can (31 them when you return to Web sites you've visited before. Cookics (4) information that identifies each user, for example: login orusername, passwords, shopping cart information, preferences, and so on. When a user revisits a Web site, his or her computer automatically "serves up" the cookie, which establishes the user's (5).
At its basic level, it is the (1) of a network system that (2) users within a single home to simultaneously connect to the Internet over a single account and to (3) printers and other peripherals. As smart homes become an everyday reality, a wide (4) of devices that contain chips will become part of the system (including lighting, (5), security, and televisions). Systems are based on coaxial cable, existing telephone wires (POTS), and wireless radio frequency (RF).
6. difference, installed, maintained, outdated, query, statement, updated ghost site The name for a Web site that is no longer (1) but remains online and available for viewing. Some ghost sites continue to be useful because the content may not be (2) (see: guru site). The (3) between a ghost site and other abandonned sites is that the ghost site contains a (4) acknowledging that it is no longer being (5).
7. account, binary, cancellation, crash, deletion, receiver, recipient mail bomb An e-mail message with huge (1) files attached to it, sent to (2) the (3) 's mail server (the server that houses e-mail) or mail reader (a software program for e-mail). Mail bombing is a form of electronic harassment that is one step beyond flaming, and on many systems, it can result in the (4) of the bomber's (5).
8. circulated, messages, sent, term, unsolicited, unwanted, via, way meatloaf Unlike spam, which is (1) commercial e-mail (UCE), meatloaf is unwanted personal e-mail. It's (2) by friends or office mates (3) group e-mail lists. Meatloaf consists of jokes, anecdotes, and other trivia. The (4) is a variation on spam to reflect that these (5) are "homemade."
9. distant, online, offline, remote, searching, site, surfing, thumb mouse potato The (I) version of a couch potato, as in, one who sits for an extended period of tunc in front of the computer screen just (2) around. Instead of using the (3) to press down on the (4) control, the pointer finger is constantly called upon to "surf' from one (5) to another.
10. bandwidth, capacity, designed, enables, planned, provides, running, speed multilink A protocol standard that (I) higher Internet access speeds and greater (2). Multilink uses two modems to connect to the Net simultaneously, at double the (3) of a single modem. It requires two or more modems, a phone line, a dial-up account for each, and a PC (4) either Windows 98 (or higher) or Windows NT; also, your ISP must have the necessary hardware and software to support this service. It was originally (5) for ISDN connections.
11. You can find a list of IT words and 10 definitions. You must match them. Be careful because there are more IT terms than definitions. Each correct match is 1 point. 1. annotation 1 |, authorization | |, lurker I, biometrics 1 I, COM port I I, digital watermark
dirty connection [
, mip d ] , patch 1
1. A very slow Internet connection due to a large amount of Internet traffic or some other type of technical glitch between your computer and your ISP. 2. The science of combining telecommunications and computers to control the electronic and mechanical functions in automobiles. 3. The fundamental material used in making computer chips, it is a semiconductor (meaning it has electrical conductivity). 4. A measure of a computer's processing speed. 5. A visitor to a newsgroup or chat room who only reads other people's posts, never posting his or her own, thus remaining anonymous. 6. Notes that you can add to documents. These notes are stored on your local disk (hard drive) and are available each time you access a document. This feature is found in some Web browsers as well. 7. A method for identifying an electronic document, it is usually information placed in the code. 8. A socket in the back of a computer for hooking up or plugging in devices, such as modems or printers. 9. Popular in sci-fi movies, it refers to voice, fingerprint, or retinal identification. Not widely used in the real world, however, future uses may include e-commerce transaction signatures identified by its means. 10. Supplemental software code that, when installed to the original software program, fixes problems. It can usually be downloaded off the Internet in order to fix a bug.
42
2.
1. customize I 1, nerd 1
I, default | |, protocol [
I, dirty |, router | |,
|, formula I
1. An option that allows you to connect to a site, search through available files, and download any file, document, or program without having to establish an account (a username and password) on the system where the material resides. 2. To make changes or specifications to a program or Web site so that it meets your individual needs. 3. A computer software setting or preference that states what will automatically happen in the event that the user has not stated another preference. 4. A set of characters that contains both letters and numbers. Often used in cryptic passwords, these codes can also consist of punctuation and symbols found on a standard keyboard. 5. A program that activates itself when a computer has been inactive for a period of time. 6. An electronic device that connects two networks. For example, this is what connects a local network to an ISP for Internet access. 7. A specification that describes how computers talk to each other on a network. It is an established method of exchanging data over the Internet. 8. Similar to a geek (a person who knows a lot about the Internet), but this is more of a brainy person who knows everything there is to know about computers. 9. An abnormally slow or lagging Internet connection due to heavy traffic or some other type of anomaly. 10. An e-mail server that automatically responds to requests for information. 3. authorization | multitasking | zine [ 1 |, beta bugs [ |, bulletin board | |, identification | |, switch | I, mirror | 1, |,
|, newsgroup Q ^ j , redirect |
|, smiley |
|, web rating [
1. This is either a domain name that another domain points to or a server that holds copies of a different domain's files. Some servers are so popular that other servers have been set up to spread the traffic load to more than one site. 2. The simultaneous execution of more than one task. For example, a computer that launches or runs more than one program simultaneously. 3. When you type in a URJL and hit "enter" but notice that the browser automatically sends you to another URL, you are experiencing it. 4. A measurement of the size of a Web site's audience. 5. The nickname for an electronic newspaper. Just like their real-world counterparts, they primarily derive revenue from ad banner sales. 6. It is a forum for sharing information. Each one is an area on the Internet that allows users to post messages and reply to other users. 7. A process that verifies whether or not an individual or organization that has requested an action actually has the right to make the request.
8. The problems, errors, glitches, or anomalies identified during the pre-release phase of a commercial computer product. 9. In telecommunications, it is a network device that selects a path or circuit for sending a unit of data to its next destination. It may also include the function of the router, a device or program thai determines the route the data should be sent to. 10. It is a sequence of typed characters that creates a rough picture of something, such as a facial expression. 4. configuration | menu | |, demon | |, delete [ [, dial-up | |, erase | |, virtual j 1, flowchart | ] |, icon
|, refresh [
|, retrieval |
|, thumbnail |
1. The service whereby a functional unit can use the telephone to initiate and effect communication with another functional unit 2. A graphical representation of a process or the step-by-step solution of a problem, using suitably annotated geometric figures connected by flowlmes, for the purpose of designing or documenting a process or program 3. A miniature graphical representation of a document or of an image. 4. The manner in which the hardware, software, or other aspects of an information processing system are organized and interconnected. 5. A list of options displayed by a data processing system, from which the user can select an action to be initiated. 6. The process of repeatedly producing a display image on a screen so that the image remains visible. 7. To remove data from a data medium. It will not only delete the data but will also overwrite it in such a manner that it cannot be retrieved by a later operation. 8. In information processing, the act or process of recovering data or information. 9. Pertaining to something that appears to have some characteristics of something else for which it serves as a surrogate. 10. A procedure that is invoked without being called explicitly whenever an alteration, an addition, a deletion or other event occurs. 5. connector ( ~ J , digit node j [, shrink | , dots | |, transfer [ |, feasibility study| |, virus | | , icon Q ] ] , indent j | |, invert| [ , j, word wrap j
1. A character that represents a natural number. For example, one of the characters 0 through 9 in the decimal system. 2. A graphic symbol, displayed on a screen, to which the user can point with a device, such as a mouse, in order to select. 3. A study to identify and analyze a problem and its potential solutions to determine their viability, costs, and benefits. 4. To begin a line farther in from the margin than the other lines. 5. A flowchart symbol that represents a break in a flowline and that indicates where the flowline is continued.
fi To change a physical or logical stale lo its opposite. 7 In a network, an entity that is associated with or connected to one or more other entities. In network topology or in an abstract arrangement, they arc points on a scheme. In a computer network, they arc computers or data communication equipment. S. I n rcducc the size of a window. 9. A program that propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infectcd program is invoked. It often causes damage or annoyance and may be triggered by some event. 10. A function that automatically places a whole word on the next line when the length of the word and its associated punctuation exceeds the available space on the line.
file |
|, justify |
|, latency |
|, maintenance | |, wizard |
I, memory |
|,
|, slowness |
|, word wrap
1. An interactive aid that guides a user through a series of steps to accomplish a task. 2. Unauthorized access to a data processing system via an authorized user's legitimate connection. 3. Software that is distributed without a licensing fee, but for which a nominal payment is requested for continued use. 4. The time interval between the instant at which a call for data is initiated and the instant at which the actual transfer of the data begins. Synonymous with waiting time. 5. To align text horizontally so that the first or last characters, or both, of every line are aligned with their corresponding margins or to align text vertically so that the first and last lines of the text are aligned with their corresponding margins. 6. A named set of records treated as a unit. 7. A flat circular plate with a magnetizable surface layer on one or both sides of which data can be stored. 8. A usually programmable mechanical device designed to perform tasks of manipulation or locomotion under automatic control. 9. Any of the addressable storage space in a processing unit or any other internal storage that is used to execute instructions. 10. A set of activities intended to keep a functional unit in, or to restore it to, a state in which it can perform a required function. It includes activities such as tests, measurements, replacements, adjustments, and repairs.
III. What do the following definitions define? We give you the first letter. Each correct word is 2 points. 1. 1. In text processing, a generally unused area that lies between the text area of a page or screen and any of the four edges of the page or screen. It may contain elements such as page headers, page footers, small illustrations, notes, and page numbers. M 2. Software that permits multiple users on a network to work together; for example, software ti'electronic mail, for scheduling and planning, and for file sharing. G
3. A person who uses his or her knowledge and means to gain unauthorized access to protected resources. II 4. In text processing, a named, structured unit of text and possibly images that can be stored, edited, retrieved, and exchanged among systems or users as a separate unit. D 5. The movement of a display image vertically or horizontally, to view data not otherwise visible within the boundaries of a screen or window. S 6. In a process computer system, the means for interconnection between the computer system and the process interface system. A bus may be used as one. H 7. A preliminary version of a document prepared for review, approval, or editing. D C 8. A horizontal arrangement of characters or other expressions. R 9. A hidden software or hardware mechanism usually created for testing and troubleshooting, that may be used to circumvent computer security. T 10. A card in which hole patterns can be made. P C 2. 1. A permanent copy of machine output in a visually readable form, generated on a device such as a printer or plotter; for example, printed reports, listings, documents, and summaries. H C 2 Non-volatile memory- that can be erased and reprogrammed in blocks instead of one byte at a time. F M 1 T h e movement of data through the active parts of a data processing system in the course of the pertormance of specific work. D F 4. An ordered tree in which each node has at most two other nodes that are directly subordinate. It T 5. A relatively small area on a Web page with content independent from the remainder of the Web page; the content may be dynamic, contain audio, etc. B 6. To make an identical copy of an existing document. D 7. A locator or a pointing device that employs a lever with at least two degrees of freedom. J 8. The arrangement of text or graphics on a page so that the page is oriented for normal reading when its width exceeds its length. L 9. A hand-held pointing device operated by moving it on a surface other than the display surface. It is usually equipped with one or more pushbuttons for selecting items. M 10. A read/write storage device or register that may be used for the temporary storage of intermediate data or pointers. S P
3. 1. Pertaining to events that occur at the same instant of time. S 2. To work at home and to use a workstation to send or receive information to or from the office. T 3. A test that uses a representative set of programs and data designed to evaluate the performance of computer hardware and software in a given configuration. B 4. An order for an action to take place. C 5. To terminate abruptly a processing activity in a data processing system because it is impossible or undesirable for the activity to proceed. A 6. A non-impact printer that forms the characters or unique images by projecting heated particles or droplets of ink onto the output medium. B P 7. An e-mail server that automatically responds to requests for information. M 8. To translate all or part of a program expressed in a high-level language into a program expressed in an intermediate language, an assembly language, or a machine language. C 9. An online forum for sharing information. N 10. Supplemental software code that, when installed to the original software program, fixes problems. It can usually be downloaded off the Internet in order to fix a bug. P
46
9.
1. Popular in sci-fi movies, it refers to voice, fingerprint, or retinal identification. Not widely used in the real world, however, future uses may include e-commerce transaction signatures identified by its means. B 2. A drop-down menu that only appears in certain parts of a GUI. To see it, you click on the upper right button of your mouse (PC). C S M 3. A computer software setting or preference that states what will automatically happen in the event that the user has not stated another preference. D 4. An abnormally slow or lagging Internet connection due to heavy traffic or some other type of anomaly occurring between your computer's connection and the ISP you're using. D C 5. The capability of a functional unit to meet the requirements of a specified interface without appreciable modification. C 6. A routine or storage used to compensate for differences in rate of flow of data, or time of occurrence of events, when transferring data from one device to another. B 7. Process of making a reserve copy of a file, of a document, etc. B 8. An open-loop device designed for transferring data between several devices located between its two end-points, only one device being able to transmit at a given time. B 9. A menu structure whereby a selection may cause the appearance of another menu. C M 10. The name for a Web site that is no longer maintained but remains online and available for viewing. G S
IV. In the following definitions there are 4-5 basic IT words missing. Which are they? We give you the first letter. Each correct word is 2 points. 1. BASIC: A procedural algebraic language with a small i (J) set and originally d (2) to be. i (3) and for ease of learning. The name is the a (4) derived from Beginner's AllP (5) Symbolic Instruction Code.
2.
broadband: A frequency band that is used for an application r (1) a wide r (2) of frequencies. The broadband can be d (3) into several narrower bands, each band of which can be used for different p (4) or be made available to different users. Synonymous with w (5). 3. callback: Ap (1) in which a data p the call, and dials the calling terminal to a d (5) back.
(2) system identifies a calling terminal, d (4) the calling terminal. Synonymous with
(3)
4. clock: The electronic c (1) in an electronic device that generates a steady s (2) of regularly spaced pulses. A clock is generally used for r (3) the time of state transitions, synchronizing multiple events, or m (4) time intervals inside the electronic d (5).
color resolution: A m (I) of the ability to d (2) between two color v (3). Typically. color resolution is expressed by the number of b (4) necessary to express in b (5) form the maximum number of possible different color value.
6.
hot plugging: The ability to add or r (I) hardware or p (2) devices to a computer while the computer is running. The operating system automatically recognizes the change and the system isn't i (3) Also known as "hot swapping/' hot plugging is currently s (4) by two external bus standards: Universal S (5) Bus (USB) and FireWire. 7. mail bomb: An e-mail m (1) with huge binary files a (2) to it, sent to crash the recipient's mail s (3) or mail reader (a software program for e-mail). Mail bombing is a form of electronic h (4) that is one step beyond flaming, and on many systems, it can result in the cancellation of the bomber's a (5).
mirror: cither "i -j (I) name that another domain points to or a server that holds copier >!% different domain's files. Some servers are so p (2) thai othci servers have been set up to mirror them, in order to s (3) the traffic load to more than one site. Many international sites have mirrors s (4) up in other countries to allow quicker access for i (5) users. 9. mouse potato: The o (I) version of a couch potato, as in, one who sits for an extended period of time in front of the computer s (2) just s (3) around. Instead of using the thumb to press down on the r (4) control, the pointer finger is constantly called upon to s (5) from one "site" to another. 10. Multitasking (multiprocessing): The simultaneous e : (1) of more than one task. For example, a computer that launches or r (2) more than one program s (3) is multitasking. This term has e (4) to include human activities, such as talking on the phone, reading e-mail, and eating lunch at the s (5) time.
V. In the following section we give you both the definition and the word. The problem is we have left out one or two basic IT words. Can you write them in? To make it easier we have given you the first character. Each correct word is 2 points. 1. 1. A malicious program that r itself until it fills all of the s space on a drive or network: Worm 2. A short application program especially for p a simple specific task: Applet
48
3. A program that works with the operating system as a command processor, used to enter commands and initiate their e Shell 4. Playing sound or video in real time as it is downloaded over the Internet o to storing it in a local file first. Streaming 5. Any computer on a network that is a repository for services a to other computers on the network. Host 6. A place where i goes into or out of a computer, or both. Port 7. In online chat "Emoticons" are clusters of punctuation such as : ) and : > that are used to set the tone for the s that precedes them. 8. Sandbox: a protected, limited area in computer memory where applications (generally Java-based) are allowed to "play" without risking d to the system. 9. An open standard for compression and decompression used widely for PC download archives, ZIP was developed by Phil Katz for his DOS-b program PKZip, and it is is now w used on Windows-based programs. 10. Spyware also called adware. Spy ware is any s that covertly gathers user information through the user's Internet c without his or her knowledge, usually for advertising purposes. 2. 1. A bright, usually blinking, movable i on a d marking the position at which a character can be entered, corrected, or deleted. Cursor 2. Capable of orderly, efficient integration and o with other elements in a system with no modification or c i:-c, Compatible 3. A (jii.aie telephone circuit p connecting two points, normally p on a lease by a local PTT. Leased line 4. A small w receiver that, when triggered (generally via phone), will beep or vibrate. The wearer will have been trained to r to this signal. Pager 5. A s of instructions that repeats either a specified number of times or until a particular condition is met. Loop 6. Tooltip: a label that appears on the screen when the user h the mouse pointer over an i in a Microsoft Windows system. 7. WAP: acronym for wireless application p 8. A plastic card with a magnetic strip containing e data that is read by passing the card through a usually slotted electronic d Swipe card 9. The main board of a computer, usually containing the c..-. for the central processing unit, keyboard, and monitor and often having s for accepting additional circuitry. Motherboard. 10. A hub is used to connect several computers together. In a message h service, a number of local computers might e messages solely with a hub computer. The hub would be responsible for exchanging messages with other hubs. 3. 1. Highlighting means that c or symbols are treated to make them stand out from the rest of the t , often by using bold type. 2. Cursor pad is the group of four a cursor control k , used to move the cursor up and down or to the right or left. 3. Pop-up window is a window that can be d on the screen at any time on top of anything. When the window is r , the original screen display is restored. 4. Scroll bar is a bar d along the side of a window with a marker which i how far you have scrolled. 5. A hand-held scanner is a d that is held in your hand and contains a r of photoelectric cells which, when moved over an image, c it into data which can be m by a computer.
(> Scrvicc provider is a company that oilers users a c to the Internet. It litis a computer that acts as a d name server and has a high-s link to the Internet. 7. Patch is a t correction made to a program. It can be a small correction made to software by the u 011 the i of the software publisher. X Disk mirroring is a data p system in which all or part of a hard disk is d onto another disk drive. Any changes made to the data on the original drive are duplicated on the m drive. 9. Data compression means reducing the size of blocks of data by r spaces, empty sections and unused m 10. Critical path analysis is the definition of tasks or jobs and the time each r 1 1 order to 1 achieve certain g 4. 1. A transistor is a s component with three e , the emitter, the base and the c It is used for switching or amplifying an electronic s 2. Radiopaging is a communications service using radio pager d which beep to let the user know that someone is trying to get in c with them. 3. Microprocessor is an IC chip at the centre of a computer for c the system and p the data. 4. Decoding means converting ad coded s back to its original form. 5. An integrated circuit is an e circuit containing many components 011 a single s chip. 6. A modem is an electronic device used by computers for converting 0 signals from digital to a form and i signals vice versa. 7. Semiconductor is a component made from a m which changes from being an i to being a conductor when certain impurities are added to it. 8. SMS is the abbreviation for Short Message Service. Am of sending t messages that are 160 characters in 1 or shorter over a mobile phone. 9. Upstream is the signal p for receiving communications from a c computer to a server in a n 10. Extensible mark-up language is a meta-language that allows developers to c their own set of customised t that identify the meaning and s of data. 5. 1. Bandwidth is the range of f that can be transmitted over a communications c 2. Buffering is the process of temporarily s data from a fast s so that it can be f at a steady rate to a slower system. 3. ADSL is the abbreviation for an a digital s line. A form of DSL that has a different b for the u and the downstream. 4. Wap is the acronym for w application p A set of standards for allowing users to send emails and a information including video t from the Internet on a mobile phone. 5. Packet-switching is a method of transferring data across a network by d it into packets and transferring the packets individually from n then putting the packets together again when they arrive at the d 6. Mirroring is a technique used in RAID 1 systems where at least two hard disks are p in such a way that the hard disk c writes each byte of data to both disks. It ensures that a b exists in case the p disk drive fail. 7. Batch program is a program that r without any terminal or user i Typically such programs p large scale updates, produce reports or handle housekeeping functions. A high priority batch job may be run in f 8. Keyboard lock is a security method where the screen is c and the keyboard is locked after a pre-s period of inactivity to prevent u use. 9. Low-level language, such as assembly, is a programming language in which each i has one c instruction in machine code. 10. An icon is a visual symbol or picture used in a menu to r a program or a file. The program is usually i by using a mouse and clicking its button when the c is over the icon.
50
c. As the compositions are assessed according to the so-called language accuracy too, here are some very simple rules: - be consistent with the verb tenses - avoid structures which you are not sure about - try to use passive voice as often as possible. - the application of relative pronouns is always a problem - you should read over the basic rules before the written exam (you will probably need them) - remember the difference between present and past participle and the rules related to them (these two structures will improve the quality of your work greatly) - don't use very simple and short sentences but resist the temptation of very long and complex ones as well - linking or 'transition' words are tricky and important, but you should remember correctly how to use them (unless, although, until etc.) - indirect or reported speech is a tricky part of the English language - remember the rules of word order and verb tenses, or simply avoid using it - spelling issues: don't mix up American and British spelling rules (traveling/travelling, economize/economise etc.). Try to choose one and be consistent throughout the composition. The English use capital letters in headlines. d. In case you don't remember a much needed technical word, you can give its definition - just remember how to make a definition (if you have prepared for the technical vocabulary test, you will have acquired the skill). Instead of repeating a word you can refer to it (the one, the latter and the former etc.) e. You must always leave time for reading your work at least once more before submitting it. Always leave a margin or use double-spaced lines, this way you will have somewhere to make corrections. f. The layout of your piece of work, the overall impression is very important. Try to use medium-sized characters, don't cross wrong words out, just put them in brackets, use clear paragraphs and leave margins for the teacher's remarks as well.
4. Entertainment and the Internet - How does the Internet replace going out? - What kinds of entertainment activities can we find on the Internet without leaving our home? - What are the dangers? - What are the positive aspects? - Why is the Internet more 'democratic'? (access to information) (Sec Sample Composition in Key) 5. Sport and the Internet - What sport activities can be played over the Internet? - Simulation games - What skills can be developed with the help of these games? - How does the Internet influence real sport? (See Sample Composition in Key) 6. What is Your Opinion about Unwanted Emails? Spammers and filters Meatloaf Online advertising - banners Slower service, full mailboxes (See Sample Composition in Key) 7. Smart Devices and Their Influence on the Quality of Life Use the following words/expressions: Embedded computer, chip, interactivity, home-networking, security issues. More free time - less hard physical work ... (See Sample Composition in Key) 8. Robot Technology - Are Robots a Blessing or Curse? - What are robots good for? - What are the limitations of robots? - Could robots become more intelligent than humans? - Can you give examples of films/novels/short stories that deal with the topic? - Are writers/scientists optimistic or pessimistic about this issue? 9. File-sharing and Copyright Well-known file-sharing sites - free/paying The music industry and its main target group Solutions (See Sample Composition in Key) 10. Electronic Books and Magazines Compare electronic reading materials with the traditional printed books and other information sources. Electronic paper and downloading text Professional forums and sources of specific information Monitor-resolution (dpi): the human eye ...
11. Desktop Publishing and Other Supporting Software - How do you prepare text for publication? What can we import and how can we arrange text? - What supporting software can you use? What are they for? 12. Data Protection on the Home PC and in General Security measures Passwords and encryption Biometric means against hackers Hacking and industrial spying Weak points of a network - the individual Firewalls, mirroring, storage of back copies, etc. 13. Chatting and its Dangers Chat groups - virtual clubs without real contact Young people and their imagination/fantasies Psychological control Pornography 14. The Importance of Student Mobility in Academic Studies New opportunities - European grants Long practice in the Western countries (the world is opening up for the Hungarians) Credit systems and transferability (See Sample Composition in Key) 15. Technology without Limitations - Life in the Future What do you think our life will be like in a hundred years' time? Home robots/transportation/space research/virtual reality Will humans be happier/lonelier/more satisfied/physically fitter/mentally stronger, etc? Does technology offer us a higher quality of life?
16. The Different Stages of Photography The beginnings - black and white still pictures Colour photos - art or skills? Digital photography - its benefits and drawbacks The digital camera - its applications 17. How Can Modern Technology Improve Quality of Life for the Disabled? Internet - information accessible from home Telework - making money and being useful in society Online learning - distance learning - better chances in life Smart equipment to help people with physical disabilities - mobile technology Telecommunication systems, speaking computers for the blind, wheelchairs with all conveniences, online medical advice, etc. 18. Teleconferencing and Power Point Presentations What is teleconferencing and what hardware technology is needed for it? What does it replace and what are its limits? What is a good PowerPoint presentation like? The proportion of speaking and reading, the issue of length, background decorations, number of imported tables, images, logos, layout, etc.
54
19. What Do You Think of Hackers? What can be downloaded? Technical tricks Quality issues Losses for the copyright holder (See Sample Composition in Key) 20. What Does the Average Computer User Know/Have to Know? Baste skills and competences (Word, emailing, storage devices, basic hardware skills) ECDL Common problems (security, backup copies, peripheries, viruses and other infections, etc.) How does the average user update/expand memory/buy new software? 21. What Do the Different Professionals Use Computer Technology for? Choose two or three jobs and describe the role of computers in them. E.g. What does a teacher use the computer for? Is it important for a tradesperson to know what a computer is good for? Does an artist need the computer for his/her work? In what jobs is information flow offered by emailing and the Internet vital? "e-society" 22. E-Commerce and Electronic Signatures Online trading, professional home sites, e-banking and its problems, logos/banners and online advertisement, Electronic wallets and safety issues, Virtual shops and reduced costs ... 23. Science Fiction and the Potentials for our Future Life Do you think quality of life increases or decreases with the advances of modem technology? Are humans becoming happier in a world full of technical devices? Is humanity becoming more vulnerable or more able to deal with the hardships of life? Are you optimistic or pessimistic about life for future generations? 24. Computer-Controlled Safety Tools (health, sports, hardships of space/climate etc.) Types of dangers and the answers of technology The limits of smart products Our responsibility (See Sample Composition in Key)
a. By overall language skills we mean the range of vocabulary you have, grammar and language accuracy, dictionary skills, general logical skills like guessing, analogy etc. b. Do you remember what marks you had in literature lessons when you had to write an essay about a given topic? Was it easy for you to find the proper words to express your thoughts? Could you express yourself in a complex way? Was your style positively appreciated by your teacher? If your answers are in the positive, you can relax. You will probably pass this part of the written exam with relative ease. c. If you know what to expect of the passage, you know the technical words and their Hungarian equivalent without looking them up in the dictionary, you are really and genuinely interested in what you have to translate, your task will be easy. You can be sure you understand what the text is about. d. There are basic rules about what dictionaiy to use and how to use it. If your dictionary is too small, you won't find the words you most need, if it is too big, it will take too long to look up the unknown words. Try to use the same dictionary every time and in the beginning spend some time reading the introduction about the meanings of the abbreviations and finding out what extra information can be accessed at the end of the volume. You can save a lot of time in the exam if you practice looking up the words in a traditional dictionary. Although an online dictionary is much faster, it will not be at your disposal when most needed, at the exam. Another issue may be the question of edition time. With information technology words are born and become obsolete very fast. Not even the updated editions of dictionaries will contain the most recent high tech inventions, which - in certain cases - don't even have a Hungarian equivalent. In such cases - among others - does your prior knowledge come into the picture. e. Considering all the previous points we should say that everybody, even those who regularly read professional literature or possess excellent essay writing skills in their mother tongue, needs a lot of practice. Remember that reading comprehension skills cannot substitute translation skills. Understanding something is different from expressing it in your mother tongue and, formulating something in writing is still different from oral expression.
5 ft
2. How (o practice depends on several considerations: a. How much time do you have? li. Who will help you? c Will somebody correct you and explain the reason for your mistakes? a. The minimum time required for this task is the time set by the examination itself multiplied by minimum 10-15 and the time needed for assessment and correction. (10-15 is the minimum number (/passages to he translated before the exam). It doesn't matter whether you do some translation work over a longer period or decide on a shorter intensive preparation phase. What does matter is that you should never replace translation with reading comprehension. b. Of course the best thing is that you have regular classes with a professional teacher who will correct your mistakes and explain to you the basic rules. The second best thing is that you work on your own and you collect all your questions and problems and discuss them with a teacher during a consultation lesson. If you can't have any professional feedback, rely on your own resources. Ask a friend or relative - preferably someone with some IT knowledge - to read your translation and tell you whether it sounds all right and makes sense. In most cases even you can decide whether you have translated the passage correctly - perhaps you have to read the translated text over again after a while. c. If you have a teachcr to help you, don't hesitate to ask as many questions as you need in order to improve your style or avoid your mistakes. If you have to rely on yourself, the most often asked question is: Do I have to translate word by word? How freely should I translate? Can I use English words in the Hungarian text? Should I translate proper names into Hungarian too? There are several theoretical books dealing with the skill of translation, which will probably give you the answers. In this short book we have selected several passages for translation practice for you to find them out yourself. 3. What to practice? a. Dictionary skills and lexis issues b. Guessing skills c. Skimming d. Hungarian style a. By dictionary skills we don't only mean increasing the speed of finding words in a dictionary but rather practicing and improving the following skills: Guessing the stem of a word and its meaning without looking it up (e.g. efficiency comes from efficient, redesign comes from design and "re", and it means designing again, speedy must mean something with speed etc.) Considering the structure of the sentence in order to decide on vocabulary and meaning. Guessing the meaning of unknown words in case they cannot be found in the dictionary but we know more or less what they must mean from the context. b. Guessing the meaning of whole sentences and headlines when we are not sure what they exactly mean. c. Reading the whole passage or paragraph in order to have an overall idea of what the message of the text is, what kind of a text it is (essay, short story, interview, report etc.) the dominant style (register, lexis etc., whether it is serious or funny, realistic or fictivc, political or artistic etc.) the meaning of the title or headline d. After considering the points mentioned in paragraph c. we can try to improve our Hungarian version. In our case (mostly professional and technical passages) we can limit our efforts to a smaller number of possible variations: the passages arc mostly:
short articles short stories technical perhaps economic or scientific and never political or artistic passages usually with a serious tone. Wc must consider certain characteristics of the two languages (comparative linguistics) (e.g. where th I nglish passage contains abbreviations - participles, gerunds etc., the Hungarian translation will probably offer shorter sentences etc.)
One Small Step in Uphill Fight as Linux Adds a Media Player (1)
By STEVE L O U R G N U Linux, the free c o m p u t e r operating s y s t e m , has had far m o r e s u c c e s s in w i n n i n g c o n v e r t s 111 corporate data centers than on d e s k t o p personal c o m p u t e r s . (2) But as m o r e u s e r - f r i e n d l y s o f t w a r e m a k e s its w a y onto the Linux desktop, the free operating system is s t a r t i n g to m a k e p r o g r e s s in its D a v i d - v s . - G o l i a t h c o m p e t i t i o n against Microsoft, the d o m i n a n t p o w e r in PC s o f t w a r e . (3) Another step in the p r o g r e s s of Linux m personal c o m p u t e r s will c o m e today, w h e n t w o large Linux distributors, Red I Iat and Novell, are expected to a n n o u n c e that they will ship the media-playing s o f t w a r e of RealNetworks in their Linux desktop products. (4) R e a l N e t w o r k s , f o u n d e d by R o b Glaser, w a s the early leader in s o f t w a r e f o r p l a y i n g digital music and video files sent o v e r the Internet. Its m e d i a - p l a y i n g s o f t w a r e c o m p e t e s with M i c r o s o f t ' s W i n d o w s M e d i a Player. (5) T h a t rivalry has b e c o m e an antitrust issue, and the European C o m m i s s i o n ruled in M a r c h that M i c r o s o f t was illegally using its W i n d o w s m o n o p o l y in PC o p e r a t i n g s y s t e m s to try to c o n t r o l the m a r k e t f o r m e d i a - p l a y i n g s o f t w a r e . (6) T h e commission ordered M i c r o s o f t to offer a version of W i n d o w s without a media player - a ruling Microsoft is appealing. (7) Yesterday, the E u r o p e a n C o m m i s s i o n a g r e e d not to e n f o r c e a d e a d l i n e of t o d a y that w o u l d have f o r c e d M i c r o s o f t to sell the u n b u n d l e d version in E u r o p e , while a court in L u x e m b o u r g c o n s i d e r s the matter. (8) R e a l N e t w o r k s had p r e v i o u s l y reached distribution a g r e e m e n t s with T u r b o L i n u x , w h i c h is strong in Asian markets, and Sun M i c r o s y s t e m s , w h o s e J a v a desktop s o f t w a r e runs on Linux. (9) " L i n u x is m a k i n g rapid p r o g r e s s on the d e s k t o p , and this m a k e s o u r technology t h e de facto standard for m e d i a - p l a y i n g s o f t w a r e on L i n u x , " said D a n S h e e r a n , a senior vice president at R e a l N e t w o r k s . (10)
(280 words)
6.
2.
8.
9.
Despite an Act of Leniency, China lias Its Eye on the Web (I)
IU H O W A R D W. F R E N C H A Chinese court recently a n n o u n c e d that an Internet d e m o c r a c y advocate chaiged with subversion would gel a suspended s e n t e n c e instead of a long prison t e r m , (2) with the c a s e d r a w i n g criticism from h u m a n rights g r o u p s and serving as a cry loi this country's g r o w i n g n u m b e r of online c o m m e n t a t o r s . (3) Both in C h i n a and a b r o a d , s o m e c o m m e n t a t o r s q u i c k l y a p p l a u d e d w h a t s e e m e d like an official s h o w of leniency lowaul the accused m a n . Du D a o b i n , (4) a prolific a u t h o r of o n l i n e essays on issues of d e m o c r a c y a n d free s p e e c h . (5) But many a m o n g China's rapidly g r o w i n g group of Internet commentators are warning that what appears to be government m a g n a n i m i t y in this high-profile case conceals a quiet but concerted push to tighten controls of the Internet and surveillance of its users. (6) Internet c a f e users in C h i n a h a v e long been s u b j e c t to an e x t r a o r d i n a r y range of controls. T h e y i n c l u d e c a m e r a s placed discreetly throughout the e s t a b l i s h m e n t s to m o n i t o r and identify users (7) and W e b masters. Internet c a f e m a n a g e r s keep an e y e on user activity, w h e t h e r electronically or by patrolling the p r e m i s e s . (S) T h e a v e r a g e Internet user, m e a n w h i l e , neither sees nor, in m a n y cases, suspects the activities of a force w i d e l y estimated to n u m b e r as m a n y as 3 0 , 0 0 0 Internet p o l i c e o f f i c e r s . (9) T h e C h i n e s e g o v e r n m e n t has a l s o established a W e b site w h e r e p e o p l e are able to report f e l l o w W e b users for suspicious or provocative behavior. (10)
(242 words)
10.
T h e n u m b e r of s o n g s sold via E u r o p e ' s biggest m u s i c d o w n l o a d sites has increased tenfold o v e r the past year. ( ! ) M o r e than a million d o w n l o a d s h a v e b e e n s o l d via sites s u c h as F r e e s e r v e , M S N and M y c o k e m u s i c f r o m J a n u a r y - M a r c h - 10 times up on the s a m e period in 2 0 0 3 . (2) O D 2 . the firm that p r o v i d e s the d o w n l o a d s , said Outkast's Hey Ya! w a s the most p o p u l a r s o n g in the U K . (3) It said it proved there w a s d e m a n d f o r a " d e c e n t , legal alternative to p o o r quality illegal peer-to-peer n e t w o r k s " . (4) M u s i c f a n s are d o w n l o a d i n g a w i d e r a n g e o f s o n g s , with t h e top 100 d o w n l o a d s a c c o u n t i n g f o r j u s t 11% o f s a l e s , t h e c o m p a n y said. (5) T h i s contrasts with CD single sales, w h e r e the top 100 CD singles account for 7 7 % of total CD singles sales. (6) " T h i s indicates that O D 2 ' s legal d o w n l o a d sites are i n t r o d u c i n g m u s i c - l o v e r s to all k i n d s of n e w types of m u s i c , " said O D 2 chief e x e c u t i v e C h a r l e s G r i m s d a l e . (7) M e a n w h i l e , a report by r e s e a r c h e r s at H a r v a r d and North Carolina Universities has s u g g e s t e d that s w a p p i n g songs online has had no n e g a t i v e e f f e c t on m u s i c sales. (8) T h e report said high levels of file-swapping had an effect on CD sales that was " i n d i s t i n g u i s h a b l e f r o m zero". (9) It also suggests that a l b u m p u r c h a s e s e x p e r i e n c e d a peak in the 1990s as music fans r e p l a c e d their vinyl collections with CDs (10)
C h i n a is tightening controls on o n l i n e v i d e o g a m e s . (J) It has set up a c e n s o r s h i p c o m m i t t e e to m o n i t o r g a m e s f o l l o w i n g the banning of a S w e d i s h g a m e called H e a r t s of Iron, which portrayed M a n c h u r i a , Tibet and X i n j i a n g as i n d e p e n d e n t nations. (2) A p r e v i o u s N o r w e g i a n g a m e , P r o j e c t IG12: C o v e r t Strike, incensed o f f i c i a l s for its portrayal of the C h i n e s e army. (3) T h e c o m m i t t e e is c h a r g e d with b a n n i n g content that " c o u l d threaten national unity", said the state press. (4) Future imports " O n l i n e g a m e s with c o n t e n t threatening state security, d a m a g i n g the nation's glory, d i s t u r b i n g social order and infringing on other's legitimate rights will also be prohibited," said a C h i n e s e Ministry of Culture s t a t e m e n t carried by the official X i n h u a n e w s agency. (5) In f u t u r e only the d i s k s of o n l i n e g a m e s that are a u t h o r i s e d by the Ministry of Culture can be imported. (6) G a m e s c u r r e n t l y i n C h i n a m u s t b e e x a m i n e d b y the c o m m i t t e e b e f o r e 1 S e p t e m b e r o r t h e g a m e o p e r a t o r s will face p u n i s h m e n t the s t a t e m e n t said. (7) M e m b e r s of the s c r e e n i n g c o m m i t t e e i n c l u d e teachers, university scholars, foreign a f f a i r s o f f i c i a l s , information industry e n g i n e e r s and m e m b e r s of the N a t i o n a l C o m m i t t e e of the C h i n e s e People's Political C o n s u l t a t i v e C o n f e r e n c e . (8) Sex a n d v i o l e n c e T h e r e are in e x c e s s of 140 o n l i n e g a m e s in C h i n e s e m a r k e t s at the current time, with m o r e than 8 0 % of those foreign. (9) " T h e Ministry o f C u l t u r e will i m p o r t s o m e foreign online g a m e s w h o s e contents a c c o r d with C h i n e s e national conditions and bring positive e f f e c t s to y o u n g p e o p l e ' s mentality." (10)
A pesky computer virus is taking advantage of the excitement surrounding the latest H a m Potter film. (I)
The N e t s k y . P w o r m is e n j o y i n g a resurgence by disguising itself as a Potter g a m e , say anti-virus experts. (2) T h e virus, w h i c h first a p p e a r e d t o w a r d s the end of M a r c h , s p r e a d s by e - m a i l and via file-sharing services. (3i T h e third film about the a d v e n t u r e s of the b o y wizard, Harry Potter and the P r i s o n e r of A z k a b a n . w a s released on M o n d a y , m a k i n g 5 m in o n e day. (4) Celebrity tricks A c c o r d i n g to anti-virus firm S o p h o s , Netsky.P w a s the s e c o n d most c o m m o n virus in May, topped only by the i n f a m o u s S a s s e r w o r m . (5) It n o w s e e m s to be p i c k i n g up s t e a m again, w i t h S o p h o s s a y i n g it had spotted t h o u s a n d s of c o p i e s of it in the last fewdays. (6) Netsky.P, which only affects Microsoft W i n d o w s PCs, relies on tricking a c o m p u t e r user into clicking on an infected file. (?) Virus w r i t e r s h a v e i n c r e a s i n g l y used the n a m e s of c e l e b r i t i e s to try to m a k e p e o p l e o p e n an e - m a i l and u n l e a s h its m a l i c i o u s p a y l o a d . (S) Past c o p i e s o f N e t s k y . P h a v e m a s q u e r a d e d a s n u d e p h o t o s o f B r i t n e y S p e a r s , E m i n e m M P 3 m u s i c files and illegal s o f t w a r e . (9) " E c h o i n g a t e c h n i q u e u s e d in 2 0 0 0 by the P i k a c h u w o r m , N e t s k y . P targets y o u n g c o m p u t e r users by s o m e t i m e s p o s i n g as content c o n n e c t e d with t h e H a r r y Potter b o o k s a n d m o v i e f r a n c h i s e , " said G r a h a m Cluley, senior technology consultant at S o p h o s . (10)
UK music fans have legally downloaded more than 500,000 songs so far this year, industry figures show. (I)
T h e biggest-selling d o w n l o a d of the year to d a t e is C o l d p l a y ' s 2 , 0 0 0 Miles, j u s t a h e a d of O u t K a s t ' s Hey Ya!. (2) The h a l f - a - m i l l i o n b a r r i e r w a s b r o k e n j u s t a w e e k a f t e r t h e U K l a u n c h o f N a p s t e r , w h o s e s a l e s a r e not i n c l u d e d i n the figures. (3) The British P h o n o g r a p h i c I n d u s t r y ' s (BPI) figures also reveal that the cassette s i n g l e has died as a format. (4) In the first quarter of 2003, 4 1 8 , 0 0 0 w o r t h of cassette singles w e r e sold - b u t there w e r e no s h i p m e n t s in the first three m o n t h s of this year. (5) The lack of s h i p m e n t s " e f f e c t i v e l y m a r k e d t h e d e m i s e of the f o r m a t " , said the BPI. But the UK m u s i c industry will be b u o y e d by the growth in legal d o w n l o a d s . T h a t market was practically non-existent this l i m e last year. (6) B P I c h a i r m a n Peter J a m i e s o n s a i d : " W i t h 5 0 0 , 0 0 0 legal d o w n l o a d s s o l d a l r e a d y this year, w e h a v e hit yet a n o t h e r m i l e s t o n e in the d e v e l o p m e n t of this exciting n e w m a r k e t for m u s i c . " (7) "This is s h a p i n g up to be a b r e a k t h r o u g h y e a r f o r the m u s i c i n d u s t r y . " The first quarter of 2 0 0 4 also s a w a 4 7 . 8 % rise in the sales of vinyl 7-inch singles. (8) But C D s i n g l e s a l e s d r o p p e d b y a l m o s t a third o n the s a m e p e r i o d last y e a r , w h i l e C D a l b u m s a l e s w e r e d o w n a l m o s t 3 % . (9) The B P I said the small d e c l i n e in CD a l b u m s a l e s w o u l d " c o m e as a relief in an industry w h i c h has seen double digit declines in s o m e m a j o r m a r k e t s " . (10/
I he smoke alarm has beaten the digital camera, mobile phone and the microwave oven (I)
in <i s u r v e y lo find out t h e British p u b l i c ' s lop 10 innovations I'he s a f e t y detector n o w fitted in all n e w buildings in the UK w a s c o n s i d e r e d the top gadget by 70" of those asked (2) I'he poll was c o n d u c t e d by r e s e a r c h e r s at Brunei University in west L o n d o n lor the o n l i n e bank C a h o o t . (>) T h e first b a t t e r y - o p e r a t e d h o m e s m o k e d e t e c t o r w a s p a t e n t e d i n the U S i n 1 % 9 b y R a n d o l p h S m i t h a n d K e n n e t h House (4i
Almost two-thirds of r e s p o n d e n t s put the m o b i l e p h o n e m then lop 10 innovations. T h e c o n v e n i e n c e of the m i c r o w a v e o v e n a p p e a l e d to many, w i n n i n g o v e r half the votes (5) A n d the h u g e g r o w t h in digital p h o t o g r a p h y in recent years has clearly p l a y e d well for the c a m e r a w h i c h c a m e fourth in the list (6) Scientific and t e c h n o l o g i c a l b r e a k t h r o u g h s in the s h a p e of D N A testing and laser e y e - s u r g e r y c a m e m fifth and sixth. (~< G a d g e t s such as M P 3 players, w h i c h in other lech polls h a v e proved popular, c a m e n o w h e r e in the vote. (S) " B y f a v o u r i n g the s m o k e a l a r m , Brits h a v e opted for an innov ation that f u l f i l s o n e of o u r most basic a n d primal needs s a f e t y in the h o m e , " c o m m e n t e d P r o f e s s o r Harrison, the report a u t h o r a n d chair of d e s i g n at Brunei University. (9) C o n v e n i e n c e was a l s o a f a c t o r in the nation's c h o i c e T h e m i c r o w a v e o v e n , cash and debit c a r d s and long-life light bulb.-, w e r e all l a b o u r - s a v i n g d e v i c e s that m a d e it into t h e top 10. (10)
http://news.bbc.co.Uk/l/hi/technology/3767267.stm
7.
til.
9.
10.
3. rsz - SZBELI
I. FELADAT - Szakmai beszlgets
The questions listed here are identical to those included in Book One (Basic Level). In that book we have provided ideas and vocabulary related to the first ten questions. In this publication wc give you further ideas related to the second ten questions. The requirements of the intermediate level arc different in the following ways: The examiner will ask the questions faster and applying a more elaborate lexis The examinee is expected to answer at a faster speed and at a higher level with fewer grammatical inaccuracies The examinee has to use a more elevated style, applying longer sentences and more complex grammatical structures The examiner wants to get not only the facts but the examinee's opinion, including in certain cases his or her agreement or disagreement on the professional issues. 1. Tell us something about your studies. 2. When and how did you first come across IT and computers? 3. What do you use a computer for? 4. If you could choose an IT job, what would you choose and why? 5. Would you like to work abroad? Why or why not? 6. Do Hungarian IT experts make less money than people abroad? Why or why not? 7. Tell us something about word processing software. S. Why do you think the Windows Operation System has become the most popular OS in the world? What is a 'Window' in this sense? 9. What does a system administrator/programmer/helpdesk person/.. .do? 10. Why do you think data protection and safety are so very important? 11. How do you protect your data on your home computer? 12. What passwords do most people use and why? 13. What more does a computer 'know' if you compare it to a traditional typewriter? 14. What do you usually use the Internet for and why? 15. How can we learn with the help of the Internet? 16. What are the properties of a 'nice and successful' URL?(well chosen domain name, well designed website) 17. If you want to find a good job, where will you look for the job advertisements? Why? 18. What are databases used for? Have you ever used a database? 19. What is a good presentation like? What are presentations used for? 20. What is an 'applet' and how can you make one? 21. If you had a lot of money and you wanted to spend it on electronic gadgets, what would you buy and why? 22. Is there any electronic gadget you would love to have? What is it and why? 23. With how many people do you exchange emails and how do you manage your mails? 24. What do you do if you get an email from an unknown sender? Why? Do you always do the same? 25. If you could take a laptop and nothing else on a long holiday, what software would you install and why? 26. How do you get hold of new software? (For hints and sample questions see KEY)
6S
1.
A t i n y p r o t o t y p e f u e l cell t h e s i z e o f a t h u m b h a s b e e n d e v e l o p e d b y T o s h i b a . T h e J a p a n e s e electronics giant said the m e t h a n o l f u e l cell c o u l d p o w e r g a d g e t s s u c h as a digital m u s i c player for 20 hours. Fuel cells g e n e r a t e electrical p o w e r by c a t a l y s i n g s u b s t a n c e s ' such as h y d r o g e n and m e t h a n o l . Toshiba h o p e s that b y 2 0 0 5 , t h e f u e l cells c o u l d b e u s e d i n h a n d h e l d e l e c t r o n i c d e v i c e s instead o f l i t h i u m - i o n batteries. Size m a t t e r s Fuel cells h a v e been t o u t e d 1 as a g r e e n p o w e r s o u r c e for t h e f u t u r e as they p r o d u c e electricity by c o n v e r t i n g h y d r o g e n and o x y g e n into water. M a n y c o m p a n i e s a r e w o r k i n g o n d e v e l o p i n g the t e c h n o l o g y that c o u l d r e p l a c e c o n v e n t i o n a l batteries. The main obstacle has been m a k i n g the cells small and inexpensive. T h e prototype developed by Toshiba measures 22 millimetres by 45 millimetres (0.88 inches by 1.80 i n c h e s ) and w e i g h s 8.5 g r a m s ( 0 . 2 9 o u n c e s ) .
http://news.bbc.eo.Uk/2/hi/technology/3837585.stm Questions: 1. How big is this fuel cell and how long can gadgets be powered by one? 2. What will these cells replace? 3. What kind of gadgets will they be used in? 4. How do these cells produce electricity? FURTHER Questions to talk about; 1. Can you think of high tech methods or new ways of producing electric power without further polluting our environment or using up our limited resources? 2. There is a tendency for manufacturers to produce smaller and smaller gadgets and electronic devices. Have you heard about nanotechnology? What do you know about it?
H o t m a i l i s b o o s t i n g t h e a m o u n t o f s t o r a y e s p a c e f o r u s e r s o f b o t h its f r e e a n d p a i d e - m a i l s e r v i c e . F r o m J u l y the basic H o t m a i l a l l o w a n c e will b e b o o s t e d t o 2 5 0 M B and p a v i n g c u s t o m e r s will pet t w o gigabytes. T h e m o v e is w i d e l y seen as a r e s p o n s e to G o o g l e ' s G M a i l service w h i c h g i v e s all u s e r s a g i g a b y t e of s t o r a g e to k e e p all their m e s s a g e s . With the a n n o u n c e m e n t , H o t m a i l b e c o m e s o n e o f a g r o w i n g pool o f e - m a i l f i r m s o f f e r i n g users h u g e a m o u n t s o f storage. Size m a t t e r s Currently, p a y i n g c u s t o m e r s of M i c r o s o f t ' s H o t m a i l get at least 10 MB of s t o r a g e s p a c e a n d t h o s e w h o use it for free h a v e 2 MB for their old m e s s a g e s . B o o s t i n g s t o r a g e limits m e a n s H o t m a i l m u s t r e v a m p ' its c h a r g i n g system w h i c h is based around a " p a y m o r e to store m o r e " s y s t e m .
http://news.bbc.co.Uk/2/hi/technoIogy/3835495.stm
3
Questions: 1. Why is Hotmail boosting its email service? 2. What does Google oiler to its customers and what is the name of the service'.' .1. I low much storage space do Hotmail customers gel? 4 Why docs I lotmail have to change its charging system? FURTHER Questions to talk about: 1. Can you name some Hungarian email providers and compare their services? 2. What are the pros and cons of emailing?
The service f r o m the N o r w e g i a n B r o a d c a s t i n g Corporation allows p e o p l e to watch television on their m o b i l e s 24 liouis a day. A l o n g s i d e the live s t r e a m i n g ' , p e o p l e can pick more specialized content such as a n e w s bulletin e v e r y h o u r and a Top G e a r style m o t o r i n g s h o w . Increasing popularity l or the m o m e n t it is s i m p l y testing w h e t h e r c o n s u m e r s will want and use TV on their phones. So far the f e e d b a c k has been e n c o u r a g i n g . " I n the first eight h o u r s of l a u n c h i n g . 2 , 0 0 0 clips w e r e d o w n l o a d e d , " said Bjarne A n d r e M y k l e b u s t . a s p o k e s m a n for NRK.. H e e x p e c t s the service t o b e c o m e more p o p u l a r a s video p h o n e s b e c o m e m o r e c o m m o n . " U s a g e will go up and up. M o b i l e n e t w o r k s are getting faster and better and by next year 8 0 % of handsets will h a v e a media player," h e told B B C N e w s O n l i n e .
http://nevvs.bbc.co.Uk/2/hi/technology/3829343.stm Questions: 1. What is NRK.? 2. What service does it provide? 3. What programs will make up the 24 hour program? 4. Why does the spokesman sound optimistic? FURTHER Questions to talk about: 1. Services on your mobile phone: is it a small computer? 2. What further services do you expect your mobile phone to provide in the future? 4.
U K p o l i c e a r e l o o k i n g i n t o c o m p l a i n t s a b o u t excessive p h o n e bills a l l e g e d l y c a u s e d b y P C s o f t w a r e t h a t s e c r e t l y dials up p r e m i u m rate numbers6. T h e National Hi-Tech C r i m e U n i t w a s a p p r o a c h e d by the p r e m i u m rate w a t c h d o g , Icstis, following a rise in complaints o f net-related p h o n e f r a u d . " W e are i n discussions with t h e m , " a n lestis s p o k e s m a n told B B C N e w s O n l i n e . P r o g r a m s called diallers c a n secretly install t h e m s e l v e s a n d automatically c o n n e c t to p r e m i u m rate lines. P a y p e r view Diallers are c o m m o n l y used by pornographic or gambling sites as a w a y of charging people, without the need for a credit card. But it s e e m s that m a n y p e o p l e are not a w a r e that thev h a v e d o w n l o a d e d a p r o g r a m that will dial a p r e m i u m rate number. A c c o r d i n g to Icstis. the n u m b e r of c o m p l a i m s about high telephone bills related to w e b - b a s e d p r e m i u m tate services has soared 1 .
http://nevvs.bbc.co.Uk/2/hi/teclmology/3836203.stm Questions: 1. What is Icstis? 2. What is a "dialler"? 3. What is a premium rate line? 4. What does lestis say about high telephone bill related complaints?
"ingyenesen 5 egylolytban lolyo egyenes kzvetts kedvezmnyes tarilj teleionszmok 'egekbe szokni 70
I URTIIFR Questions (o talk about: I Do you sometimes dial up premium rale numbers'.' What services do tliey offer? 2. I lave you ever tried to complain about something like a high phone bill? 1 low do you do it?
W h a t is s p y w a r e ? S n v w a r e is s o f t w a r e that hides itself s o m e w h e r e on y o u r c o n m u t e i collectinL' i n f o r m a t i o n about you and what you dn on the Internet.Spvware can invade y o u r p r i v a c y by p a s s i n g on your p e r s o n a l details without you even k n o w i n g thai this is what it is d o i n g . l f y o u shop on the internet u s i n g y o u r credit or debil c a r d s s o m e s p y w a r e can record y o u r credit card details, so b e w a r e ! Basic spyware S p y w a r e is often d o w n l o a d e d 01110 y o u r PC w h e n vou d o w n l o a d other free s o f t w a r e . W h e n y o u see a license agreement for any s o f t w a r e y o u d o w n l o a d f r o m t h e internet read it c a r e f u l l y . O f t e n b u r i e d in t h e l i c e n c e a g r e e m e n t will be a disclaimer* saying thai i n f o r m a t i o n a b o u t y o u and y o u r b r o w s i n g h a b i t s will be sent to the c o m p a n y ' s website.
http://www.bbc.co.uk/webwise/askb ruce/articles/security/spyware_l.shtml Questions: 1. What is spyware? 2. How does it work? 3. When might you come across a license agreement and what should you do then? 4. What will the license agreement often include? FURTHER Questions to talk about: I For whom do you think spyware is useful? 2. Have you ever downloaded free software? What software can you access free?
A g r o u p o f I r a q i c o m p u t e r e n t h u s i a s t s a r e a d v o c a t i n g " t h e use o f t h e o p e r a t i n g s y s t e m L i n u x t o r e b u i l d t h e i r country. A s h r a f Hasson a n d H a s a n e n N a w f a l are both natives o f B a g h d a d . Like m a n y 2 0 - s o m e t h i n g s , H a s s o n and N a w f a l g r e w up nurturing'" passions for c o m p u t e r s a n d for p r o g r a m m i n g . Both of t h e m a r e f i r m b e l i e v e r s in o p e n source s o f t w a r e Unlike expensive s o f t w a r e , o p e n - s o u r c e s o f t w a r e can be freely distributed a n d m o d i f i e d , as l o n p as the modifications are shared with other users. T h e s e t w o L i n u x enthusiasts, t h o u g h , did not e v e n k n o w o n e a n o t h e r b e f o r e the ousting of S a d d a m Hussein. But t h e y found e a c h other online, in a L i n u x f o r u m hosted by Iraqi e x p a t r i a t e s , s o o n after S a d d a m fell and started thinking a b o u t w h a t they c o u l d do. " E v e r y c o u n t r y has a Linux users g r o u p e x c e p t Iraq, so I thought, m a y b e Iraq deserves to have a L i n u x users g r o u p , " said A s h r a f H a s s o n .
http://news.bbc.co.Uk/2/hi/technology/3830545.stm Questions: 1. What do you know about these two native Iraqis? 2. What is open source software? 3. How did these two youngsters get to know each other? 4. What did the two of them propose? FURTHER Questions to talk about: 1. What do you know about the Linux Operating System? 2. What do you know about a users group or special interest group?
a 9 ,0
S p a m o v e r l o a d i s m a k i n g c o m p u t e r s sick a n d driv ing u s e r s m a d . R e s e a r c h c o m m i s s i o n e d by Yahoo funis thai the a v e r a g e British PC lias nine 'sick days' pei year, t w o m o r e than the a v e r a g e I'oi w o t k e r s Six o l ' t h e s c are w a s t e d h a u l i n g with s p a m and three m o r e d a v s are lost d u e to virti.se> Neailv h :l nl British c o m p u l e r users find dealing with | u n k e-m.uls m o r e stressful lhan Irallic jams a n d llie m a j o r i t y wanl serw."'.' p u n iticis lo act. Q \ c i hall of Ihe 2.300 people Questioned by Yahoo as p a n ol'ils anti-snam c a m p a i g n had asked ihcir provider in dp s o m e t h i n g to stop the d e l u g e " o f i u n k e - m a i l s tlicv were receiving A r o u n d a third of p e o p l e w o u l d be p r e p a r e d lo m a k e a drastic lifestyle c h a n g e , s u c h as e x e r c i s i n g five times a w e e k , if it meant an e n d to s p a m . M a r t i n o Corbelli, marketing director of e - m a i l filtering firm S u r f C o n t r o l , thinks internet and e-mail providers are not f u l f i l l i n g their obligations lo c o n s u m e r s . " T h e y never h a v e d o n e m u c h about s p a m and all the indications arc (hat they are lethargic about fighting Ihe p r o b l e m . " he told B B C N e w s Online.
http://nevvs.bbc.co.Uk/2/hi/tcchnology/3S32305.stni Questions: !. What did Yahoo's research reveal? 2. What do many British computer users say about dealing with span:" 3. On what condition would many people make a drastic lifestyle change? 4. What does Martino Corbelli think about the email providers? FURTHER Questions to talk about: I. What can you do if your computer is Hooded with spam? 2 What obligations do you think internet providers have to their customers?
S.
Millions of w e b p a g e s c o v e r i n g all aspects of life m the UK. are to be archived in a trial proiect led by the British Library T h e two-vear proiect will archive s o m e 6.000 w e b s i t e s m an attempt to capture a flavour of British life online. T h e organisers said that a l t h o u g h the w e b had b e c o m e the i n f o r m a t i o n tool of c h o i c e for m a n y , little thought had b e e n given to preserving websites. T h e w e b a r c h i v e is due to go live in January 2005. ' U n i q u e insight' A c c o r d i n g to the b a c k e r s of the project, there is a real d a n g e r that valuable e d u c a t i o n a l , cultural and s c i e n t i f i c resource.-, on the w e b could be lost in the future. To c o u n t e r ' ; this, six leading UK institutions h a v e got t o g e t h e r to work out h o w ;o best p r e s e r v e British w e b s i t e s . T h e UK W e b Archiv ing C o n s o r t i u m includes the British Library, as well as the national libraries of Wales and Scotland. T h e other m e m b e r s are the National A r c h i v e s , the W e l l c o m e Trust and the lomt I n f o r m a t i o n S y s t e m s C o m m i t t e e of the Higher and Further Education C o u n c i l s .
http://news.bbc.co.Uk/2/hi/technology/3S27227.stm Questions: 1 What is this two year project about? 2. What do they want to archive and why? 3. Who are backing the project_ 4. When will the project start? FURTHER Questions to talk about: 1. What Hungarian websites would you archive in order to keep it for posterity? 2. What Hungarian institutions can you think of that would back a similar Hungarian project?
M a c h i n e s hnill b y c o m p u t e r giant I B M helped the Nazi regime c o m m i t m a s s m u r d e r m o r e efficiently. G \ p s \ group; h a v e a l l e g e d " . A S w i s s court lias eleared the w a y f o r a lawsuit against the firm, asking for c o m p e n s a t i o n for its w a r t i m e rote. IBM had an o l l i c c n ( i c n e v a d u r i n g the war. w h i c h the lawsuit a l l e g e s was used for trading with the N a z i s . T h e firm mst.sis thai n had no role in the 1 lolocaust. and thai ils G e r m a n unit w a s taken over b e f o r e the war. T h i s was h o w IBM p u n c h - c a r d m a c h i n e s c a m e to be used bv the H o l o c a u s t b u r e a u c r a c y , the c o m p a n y says Call for compensation T h e case is one of m a n y l a w s u i t s " l a u n c h e d by g r o u p s representing J e w i s h . G y p s y and o t h e r victims of the Holocaust Most actions so far have been based in the U S . a n d have targeted G e r m a n c o m p a n i e s s u c h as D a i m l e t C h r v s l e r . Volkswagen and S i e m e n s , which can he s h o w n 10 h a v e p r o f i t e d from Nazi-era slave labour. S o m e G e r m a n c o m p a n i e s h a v e contributed to f u n d s created to c o m p e n s a t e victims and their families.
http://nows.hbc. co. uk/2/hi/business/3832141. stm Questions: 1 What IBM product is alleged to have been used during the Second World War according to the passage? 2. Who arc accusing IBM of helping the Nazi regime? 3. What and who arc the groups launching the lawsuits representing? 4 What other companies have been accuscd of having profited from the Nazi era? FURTHER Questions to talk about: 1. What do you know about the punch card machines and what were punchcards themselves'.' 2. What do you think about the role of big industrial companies in political issues or wars?
10.
Indian Railways is to offer internet access to passengers from 30 June, according to t h e Times of India. T h e service will be launched on the D e l h i - A m r i t s a r and Delhi-Bhopal routes, the report said. A kiosk with t w o computers will be set up on l u x u r y c o a c h e s w h i l e " h o t s p o t s " will a l l o w p a s s e n g e r s with w i r e l e s s - e q u i p p e d d e v i c e s to c o n n e c t to the web. Indian R a i l w a y s has e x t e n s i v e l y c o m p u t e r i s e d its o p e r a t i o n s to deal with a d m i n i s t r a t i o n and ticketing. T h e service is being run by RailTel, a t e l e c o m s i n f r a s t r u c t u r e a g e n c y of the Ministry of R a i l w a y s , w h i c h p r o v i d e s intemei kiosks at train stations. T h e service will initially be free with eventual chargcs e x p e c t e d to be s i m i l a r to the fees at RailTel's stahon k i o s k s .
http://news.bbc.co.nk/2/hi7business/3835525.stm Questions: 1. Where will Indian Railways offer Internet access to passengers starting from 30th June? 2. In what ways will passengers be able to access the internet while travelling by train? 3. What do the internet kiosks at train stations provide? 4. What will they charge for the service? FURTHER Questions to talk about: 1. What do you know about hotspots? 2. How do wireless devices communicate with each other or connect to the web? 3 What is the future for w ireless connections?
"aim
I! I l c w i l d e r e d f e s t i v a l - g o e r s al G l a s t o n b u r y 2 0 0 4 h a v e h a d a h e l p i n g h a n d findinj' t h e i r w a y " h o m e " 1 will) n lent t h a t lights n n b y text m e s s a g e . O v e r 100.000 anisic lovers have m a d e the a n n u a l trek to Ihe Vale o f ' A v a l o n which means t h o u s a n d s of identical tents O r a n g e has designed a Text Me H o m e Tent with a receiver a n d a n t e n n a in it with a unique n u m b e r to text. T h e limited edition tent is lo show how m o b i l e technology can m a k e festival life a bit easier, says Orange. With a lightweight antenna a n d receiver box. as well as special luminous'* ribbing"' e m b e d d e d on the tent's edge, the w h o l e contraption is not overly c u m b e r s o m e . T h e a n t e n n a simply slots into the d o m e of the tent, and a wire feeds through the fabric of the tent lo the receiver box.
http://news.bbc.co.Uk/2/hi/teclinology/3841819.stm Questions: 1. How do festival goers find their tent among thousands of identical ones'.' 2. How docs mobile technology help life quality in this example? 3. How does this technical invention work?
FURTHER Questions to talk about: 1. Can you describe some high tech gadgets that improve quality of life? 2. Do you think these digital devices are indispensable or just trendy?
12.
Microsoft Open to Open Source E v e n as Microsoft begins to m a k e small c o n t r i b u t i o n s to o p e n - s o u r c e c o m m u n i t i e s , it's trying hard to keep the opensource Linux operating s y s t e m from taking market s h a r e f r o m W i n d o w s around the world. In o n e h i g h - p r o f i l e case, the city of Munich, G e n n a n y , last w e e k said it w o u l d switch f r o m W i n d o w s to Linux for its 14.000 p e r s o n a l c o m p u t e r s Microsoft Corp. says it is l o o k i n g to turn o v e r m o r e of its p r o g r a m s to open-source s o f t w a r e d e v e l o p e r s , p l a y i n g a greater role in a process that the R e d m o n d c o m p a n y has criticized strongly at limes in the past. The company has so far released two s o f t w a r e - d e v e l o p m e n t tools to the open-source community, and it wants to continue the practice, a M i c r o s o f t m a n a g e r told an industry g r o u p this w e e k . "There's more of that on the w a y , " said M i c r o s o f t ' s S t e p h e n Walli, w h o oversaw ihe process of releasing those tools under open-source licenses. " A n d it's not j u s t about d e v e l o p e r tools. There are other things that we can be looking al when you actually look at the b r e a d t h of s o u r c e c o d e that we h a v e " . . .
http://www.techncwsworld.com/story/34726.html Questions: 1. Why is Microsoft opening up to Open Source? 2. How does the passage illustrate that Microsoft is losing market share? 3. How is Microsoft trying to participate in the open source business too? 4. What does Stephen Walli say about the firm's endeavours in order to release new tools? FURTHER Questions to talk about: 1. What is your opinion about the Microsoft products? 2. What are the advantages of open source software? Are there any disadvantages?
( assini I ' r o l i e will K v p l u r e P l a n e t ' s I t i u g s t assim is the lasl of N A S A ' s big-budgel missions, started tiefore the era of smaller, c h e a p e r ventures, such as the highly publicized M a i s rovers'", "t he liuropean S p a c e A g e n c y a n d the Italian space a g e n c y p a r t n e r e d with N A S A on this trip. The m v s i c i v of Saturn's l i n e s will net the Sherlock H o l m e s treatment with a high-tech iwist w h e n the international C'assint-I l u v e e n s mission a r r i v e s at the sixth planet from Ihe sun next week A s t r o n o m e r s h a v e b e e n i n t r i g u e d " b y S a t u r n ' s r i n g s for c e n t u r i e s . T h e r e are s e v e n m a i n r i n g s ; t h e m o s t r e c e n t w a s discovered in 19X0 by Voyager 1. What they k n o w is that the rings are m a d e of ice crystals, r a n g i n g f r o m m i c r o s c o p i c lo s t a d i u m - s i z e . W h a t they don't k n o w is w h e r e t h o s e materials c a m e from and h o w long t h e y ' v e b e e n there. T h e d e t c c t i v c w o r k begins at 9:12 p.m. ET W e d n e s d a y w h e n the S3.27 billion p r o b e is set to fire its r o c k e t and settle into orbit a r o u n d Saturn six y e a r s and eight m o n t h s after il left Earth. From N A S A ' s Jet P r o p u l s i o n L a b o r a t o r y in Pasadena, C a l i f , controllers plan to k n i f e " the s p a c e c r a f t through a space b e t w e e n the planet's rings. " T h e health of the s p a c e c r a f t is excellent, and all indications arc perfect for the m a n o e u v r e . "
It ttp://ww\v. tech news world, eoni/sto rv/34731 .html Questions: 1. What is Cassim? 2. Who participated in this project? 3. What do we know about Saturn's rings? 4. What do we know about the probe itself.' FURTHER Questions to talk about: 1. How docs technology help space research? 2. What gadgets essential lo spacc exploration can you think of? 14.
I n d i a , tJS M o v e C l o s e i n S p a c c T e c h n o l o g y "Together, ihe United Stales and India have the potential to transform the future into a safer, m o r e prosperous tomorrow. Together, our countries can hamess : l > civil s p a c c c o o p e r a t i o n for the lasting benefit of all h u m a n k i n d , " U . S . U n d e r s e c r e t a r y for C o m m e r c e K e n n e l h Juster said a t the c o n f e r e n c e , adding, " T h e s e e d s o f that c o o p e r a t i v e effort have already b e e n p l a n t e d . " India a n d the United States h a v e b e g u n c o o p e r a t i o n in the s p a c e technology with W a s h i n g t o n s o f t e n i n g its stance on the sanctions i m p o s e d on N e w Delhi following the 1998 n u c l e a r tests. The United Slates has licensed B o e i n g ' s satellite s y s t e m s division to explore a tie-up w i t h the Indian S p a c e Research O r g a n i z a t i o n to build a c o m m u n i c a t i o n satellite. India's s p a c e a g e n c y , the Indian S p a c e R e s e a r c h O r g a n i z a t i o n , said it plans to build a c o m m e r c i a l c o m m u n i c a t i o n s satellite by m i d - 2 0 0 6 . Scientists, g o v e r n m e n t o f f i c i a l s and business leaders f r o m India and the United States are c u r r e n t l y p a r t i c i p a t i n g in a live-day I n d i a - U . S . C o n f e r e n c e o n S p a c e S c i e n c e , A p p l i c a t i o n s and C o m m e r c e i n B a n g a l o r e . U.S. U n d e r s e c r e t a r y for C o m m e r c e K e n n e t h Juster said Washington is keen lo s e e s t r o n g e r c o m m e r c i a l links with India on space t e c h n o l o g y .
http://www.tech ncwsworld.com/story/34744.html Questions: 1. What did the US Undersecretary declare about the potentials of the cooperation between US and India? 2. When were sanctions imposed on India and what kind of sanctions are they? 3. What are the plans of the Indian Research Organization? 4. What kind of commercial links should be strengthened according to the undersecretary? FURTHER Questions: 1. Can you think of other international relationships or organizations that serve the objective to transform the future into a safer tomorrow? 2. What do you know about communication satellites?
MarSiaro izgat. erdekol '^alszorit, atszel hasznosil. megzabolaz
,8 ,7
?0
15. .SpaeeShipOne - History or f u t u r e ? Paul Allen, askeil by o n e of tile 5 5 0 j o u r n a l i s t s attending the S p a e e S h i p O n e event yesterday h o w he sees this effort dovetailing-' with his s u p p o r t for SF.TI. the Search for Extraterrestrial Intelligence, j o k i n g l y r e s p o n d e d ; "If they're not g o i n g to c o m e here, we'll go t h e r e . " T h e m e r e fact'that Paul Allen lias paid lo shoot s o m e o n e in a rocket into space is. by itself, no big deal. N A S A , a m o n g others, has b e e n there. What will ultimately m a k e t o d a y ' s ellbrt m o r e important than just a c h i e v i n g one for the history b o o k s - the first privately orchestrated and p i l o t e d m a n n e d s p a c e flight - will be if it actually leads t o w a r d a f u t u r e in which such space trips will be as routine and a f f o r d a b l e as a cruise ship vacation. "We're h e a d i n g into orbit s o o n e r than you t h i n k , " predicted Burt R u t a n , the r e n o w n e d aviation p i o n e e r Allen recruited to plan, build and launch S p a e e S h i p O n e . " T h e next 25 years will be a wild ride." Allen a g r e e d , s p e a k i n g at an o v e r f l o w i n g n e w s c o n f e r e n c e y e s t e r d a y b e f o r e today's launch at the M o j a v e Airport, saying he w a s m o t i v a t e d to s p e n d m o r e than S20 million on this p r o j e c t to p r o m o t e d e v e l o p m e n t of the c o m m e r c i a l space industry.
http://www.technewsworld.com/story/34620.html Questions: 1. What is SpaeeShipOne? 2. What makes this event so important? 3. Who are Burt Rutan and Paul Allen? 4. What was the purpose of Paul Allen when he decided to spend so much money on this project'.' FURTHER Questions: 1 What do you think of Extraterrestrial Intelligence? 2. Can you remember some films, novels or short stories that deal with this topic?
16. Encrypted File S h a r i n g : P 2 P Fights Back M a s k i n g ihe user's IP a d d r e s s is the main issue today. With a h i d d e n IP address. W e b surfers can visit W e b sites, post m e s s a g e s a n d s e n d e - m a i l w i t h o u t leaving a traditional trail that can link the c o m m u n i c a t i o n with a particular Internet c o n n e c t i o n to a c o m p u t e r ' s p h y s i c a l location. Is it p o s s i b l e to end the i n v e s t i g a t i o n s and p r o s e c u t i o n s that the R I A A , the music d o w n l o a d p o l i c e and similar entities 1 ' use to prosecute users of file-sharing networks'? The answer depends, say online security experts, on which next-generation technology p r o v e s to be m o r e s u c c e s s f u l . "Everybody n o w k n o w s you can't download stuff for f r e e / ' said M a r k Ishikavva. C E O and founder of BayTSP, a leading security firm f o r the record industry. P e o p l e w h o participate in tile s h a r i n g through n e t w o r k s , he said, s o o n e r or later will get caught. "It's like p l a y i n g Russian R o u l e t t e " But that could c h a n g e s o o n An innovative s o f t w a r e product recently released by S y n c o d e a could e l i m i n a t e c o n c e r n s about getting c a u g h t and s u e d f o r sharing music and data files. " T h i s will end a n y t e c h n o l o g y that tries to m o n i t o r or duplicate tiles flowing in the P 2 P n e t w o r k s , " Lee said.
http://www.technewsworld.com/story/34052.html Questions: 1. What are the advantages of a hidden IP address? 2. What is RIAA and why is it needed? 3. How is Russian Roulette similar to free downloading? 4. What could the new software product released by Syncodea eliminate? FURTHER Questions: 1. What do you know about file-sharing software? 2. What are the moral and legal issues of free downloading?
?,
f>
15. N a p s t e r A r r i v e s i n B r i t a i n , But S u c c e s s I s n ' t C e r t a i n Britons don't k n o w N a p s t e r 2 is a s h a l l o w attempt to cash in M on w h a t was. T h e y haven't b e e n e x p o s e d to Napster 2 in the s a m e w a y North A m e r i c a n s have. T h e y still r e m e m b e r the old Napster, the P 2 P file-sharing application that first lived music lovers I'rom t h e iron grip of the c o r p o r a t e m u s i c industry, and they think there's a similarity. There's an article in Britain's prestigious T i m e s O n l i n e today called " Q & A : N a p s t e r a n d the M u s i c Industry." which s e e m s - at least on the s u r f a c e - to explain what N a p s t e r 2 will m e a n to Britons n o w that its o w n e r , R o x i o . has s u c c e e d e d in s n a k i n g " it into the United K i n g d o m . "Easy, s a f e a n d l e g a l " N a p s t e r r e l a u n c h e d , said the Financial T i m e s yesterday. Does that m e a n O D 2 or iTunes, for e x a m p l e , or L i m e W i r e , Blubster, B e a r S h a r e , M o r p h e u s , G r o k s t e r or any of the other c o m m e r c i a l P2P a p p l i c a t i o n s is hard to use, u n s a f e a n d illegal? N o , a l t h o u g h the implication is there. It's a r e f e r e n c e to S h a w n Fanning's Napster, the application that fired the first, r e s o u n d i n g shots in what h a v e since b e c o m e the file-sharing w a r s .
http://www.technewsworld.com/story/33938.htnil Questions: 1. Where did Napster arrive to Britain from? 2. Is Napster 2 similar to the old Napster? 3. Who is Roxio? 4. Which are the other commercial file sharing applications? FURTHER Questions: 1. Do you use any file-sharing software? Do you download music or videos from the net? 2 What do you mostly use the Internet for?
T h e B o y o f 1 4 W h o A r r a n g e d His O w n M u r d e r i n a n I n t e r n e t C h a t R o o m Chilling Story of H o w a Suicidal G r a m m a r S c h o o l Pupil P o s e d As a S p y O n l i n e to T r i c k His F r i e n d Into Stabbing 2 6 H i m T h e 'dark side' of the Internet w a s b l a m e d yesterday for a g r a m m a r s c h o o l b o v ' s a s t o n i s h i n g plot to arrange his o w n murder. The hoy, w h o was 14 at the time, h o o d w i n k e d a n o t h e r t e e n a g e r into s t a b b i n g h i m after u s i n g an Internet chat room to pose as a spy. With his a d o l e s c e n t i m a g i n a t i o n f u e l l e d " by the plots of J a m e s B o n d films, the s c h o o l b o y , i d e n t i f i e d only as 'John', used a series of alter e g o s to c o n v i n c e his 16-year-old a c c o m p l i c e that his o w n s t a b b i n g had b e e n o r d e r e d by 'the Government'. T h e gullible 3 " older boy, 'Mark', w a s so t a k e n in by the f a n t a s y that he b e l i e v e d he w o u l d be paid P o u n d s 5 0 0 . 0 0 0 and would be given a j o b as a secret agent as a r e w a r d . J o h n s u r v i v e d the stabbing.
http://www.technewsworld.com/story/34122.html Questions: !. How did the boy persuade his friend to kill him? 2. How did the boy want his friend to kill him? 3. Why did the friend believe him? 4. Did the boy die? FURTHER Questions: 1. What are the "dark sides" of the Internet? 2. What do you know about chat groups? Are you a member of any?
''behalt, penzre vlt ' becsempeszm (itt1 '-leszur
1'). Software Experts Find 'First' Mobile Virus Cabir infecls the S y m b i a n o p e r a t i n g system that is used in several m a k e s of mobiles, notably the N o k i a brand, and propagates-'* t h r o u g h t h e n e w Bluetooth w i r e l e s s technology that is in several n e w m o b i l e phones. If the v i m s s u c c e e d s in penetrating the p h o n e , it writes the inscription 'Caribe' on the screen and is then activated e v e r y t i m e that the p h o n e is turned on. What is b e i n g d e s c r i b e d as the first ever c o m p u t e r virus that can infect m o b i l e p h o n e s has b e e n d i s c o v e r e d , anti-virus s o f t w a r e d e v e l o p e r s said on T u e s d a y , adding that up until n o w it has had no h a r m f u l effect. The F r e n c h unit of the R u s s i a n security s o f t w a r e d e v e l o p e r K a s p e r s k y L a b s said that that virus - called C a b i r - a p p e a r s to have b e e n d e v e l o p e d by an international g r o u p specializing in creating viruses w h i c h try to s h o w "that no t e c h n o l o g y is reliable and s a f e from their a t t a c k s . " Bluetooth'" T r a n s m i s s i o n It is able to scan for p h o n e s that are also using the Bluetooth t e c h n o l o g y and is able to s e n d a copy of itself to the first handset that it finds.
http://www. techncwsworld.com/story/34513. html Questions: 1. What is Cabir? 2. How does this virus 'work'? 3. Through what technology does the virus 'sneak in"? 4. Why does an international group create new viruses? FURTHER questions: 1. What do you know about viruses? 2. Why do programmers create viruses?
20.
A First in Space, with S o m e S c a r y M o m e n t s " T h e flight t o d a y o p e n s a n e w c h a p t e r in history, m a k i n g s p a c e a c c e s s within the reach of o r d i n a r y c i t i z e n s , " said Patti G r a c e S m i t h , t h e a s s o c i a t e a d m i n i s t r a t o r f o r c o m m e r c i a l s p a c e transportation f o r t h e Federal Aviation A d m i n i s t r a t i o n . Smith p r e s e n t e d M e l v i l l w i t h a s t r o n a u t w i n g s a f t e r the f l i g h t . A veteran civilian test pilot h a s b e c o m e the first h u m a n to reach s p a c e in a privately d e v e l o p e d m i s s i o n , guiding a tiny rocket ship m o r e than 60 m i l e s a b o v e California in a flight w i t h several w h i t e - k n u c k l e " m o m e n t s . In f r o n t of t h o u s a n d s of s p e c t a t o r s a n d a t e e m i n g " press c o r p s , t h e s q u i d - s h a p e d " craft, S p a c e S h i p O n e , w a s lifted into the a t m o s p h e r e shortly a f t e r 6 : 3 0 a.m. on M o n d a y attached to the belly of a sleek p l a n e called the W h i t e K n i g h t W h e n the p l a n e r e a c h e d an altitude of 5 0 , 0 0 0 feet, it d r o p p e d the s m a l l e r craft, and its pilot, M i c h a e l Melvill, started the rocket that took h i m up n e a r l y 3 0 0 , 0 0 0 feet m o r e , to the b e g i n n i n g s of space. He then b r o u g h t S p a c e S h i p O n e back to earth as a g l i d e r " , t o u c h i n g d o w n at 8:15.
http://www.technewsworld.com/story/34709.htmi Questions: 1. What did Grace Smith say about the first commercial flight? 2. What do we know about this space flight? 3. Who was the pilot in this venture? 4. How did the spacecraft return to earth? FURTHER Questions: 1. What do you think is the role of civilians in modem technology and trends? 2. There have been several "white-knuckle" moments in the history of space exploration. Can you think of some?
hirdet fe|lett technologiaju ideglepo 32 hemzsego 33 tintahal-alaku 34 siklorepul6
30 31 29
78
4. Supporting ideas a. A good PowerPoint Presentation should suggest that the presenter is an expert in his/her chosen topic. knows much more about it than what is contained in the presentation. is quite enthusiastic about the topic and has some personal explanation why he has chosen it. b. If we accept the statement in point a., we can expect the presenter - to possess much more information about the topic than he/she tells us. - to be able to answer our further questions. - to give (further) literature or resources which support his viewpoints/thesis. - to use up-to-date and well-founded information. 5. Supporting skills Making a successful PPP requires the application of very different skills, including: a. design skills b. scientific research skills (collecting data, using resources, structuring the ideas, giving examples, and giving the theoretical background) c. linguistic skills (language accuracy and the application of appropriate vocabulary, style and register, etc.) d. technical know-how (familiarity with the software, its rules, advantages and limits) (compatibility issues, data protection questions, hardware application skills, lighting effects and sizes of assembly halls etc.) e. communication skills - register and pronunciation - audibility and the ability to handle any technical problems that may arise - showing a relaxed but not complacent attitude - the proportion of reading and speaking - the correct proportion of personal and professional elements - eye contact and other forms of contact with the audience - reading versus memorising - remembering the time limits - self-assurance in handling further questions or remarks - the skill to handle awkward situations like lengthy questions. Probably the most important aspect to consider is how much the presenter can rely on the text of the slides and how much he must remember. 6. a. Preparation and b. Performance a. There are two things to remember: - Preparation is not over when the slides are ready - try to rehearse, make notes, decide how much and in what way to use them etc. - The slides saved on a floppy or CD should be submitted to the Language Centre several workdays before the appointed oral examination date. (Remember to consult the Centre and find out the technical specifications) b. Besides remembering the points enlisted in point 5. and 6/a., when preparing your PPP make sure that - you can be heard - you can see the monitor - you don't stand with your back to the examination board - you have your notes at hand - you know how to use the hardware (you have tested it before the exam) - you don't read but talk - you keep eye contact with the examination board - you try to show your listeners that you could go into further details if you had more time - you are an experienced presenter (smiling, relaxed etc.) If you need further help or tips, use Google search, where you can find a lot of tutorials and "How to..." sites. They will not only give you assistance but show you samples.
80
1 2 3 4 5
1 2 3 4 5 6 7 8 9 10
II. FELADAT
VOCABULARY TEST I.
1 (bar c o d e ) l 2 3 4 5 vertical transmits linking tracking identify 2(cache) reuse accessed improves downloaded retrieved 3 (chip) provide developed manufacturers special p u r p o s e integrated 4 (cookies) browse stored access contain identity 5 (home networking) construction enables share variety appliances 6 ( g h o s t site) maintained outdated difference statement updated 7 (mail b o m b ) binary crash recipient cancellation account 8 (meat loaf) unsolicited circulated via term messages 9 (mouse potato) online surfing thumb remote site 10 (multi link) provides bandwidth speed running designed
II. 1 1 2 3 4 5 6 7 8 9 10 Wire jam Telematics Silicon Mip Lurker Annotations Digital watermark COM port Biometrics Patch 2 Anonymous FTP Customize Default Alphanumeric Screen saver Router Protocol Nerd Dirty connection Answerbot 3 Mirror Multitasking Redirect Web rating Zine Newsgroup Authorization Beta bugs Switch Smiley 4 Dial up Flowchart Thumbnail Configuration Menu Refresh Erase Retrieval Virtual Demon 5 Digit Icon Feasibility study Indent Connector Invert Node Shrink Virus Word wrap 6 Wizard Piggyback entry Shareware Latency Justify File Magnetic disk Robot Memory Maintenance
III.
1 2 3 4 5 6 7 8 9 10
1 Margin Groupware Hacker Document Scrolling Highway Draft copy Row Trapdoor Punch card
2 Hard copy Flash memory Data flow Binary tree Banner Duplicate Joystick Landscape Mouse Scratch pad
3 Simultaneous Telework/telecommute Benchmark Command Abort Bubble jet printer Mailbot Compile Newsgroup Patch
4 Biometrics Context sensitive menu Default Dirty connection Compatibility Buffer Backup Bus Cascading menu Ghost site
IV. 1 1 instruction 2 designed 3 interactive 4 abbreviation 5 purpose 2 required range divided purposes wideband 3 procedure processing disconnects authenticate dial 4 component stream regulating measuring device 5 measure distinguish values bits binary 6 remove peripheral interrupted supported Serial 7 message attached server harrassment account 8 domain popular spread set international 9 online screen surfing remote surf 10 execution runs simultaneously expanded same
v.
1 1 2 3 4 5 6 7 8 9 10 replicates, storage performing execution opposed available information sentence damage based, widely software, connection 2 indicator, display operation, conversion permanently, provided wireless, respond sequence holds, icon protocol encoded, device circuitry, slots handling, exchange, local 3 characters, text arrows, keys displayed, removed displayed, indicates device, row, convert, manipulated connection, domain, speed temporary, user, instructions protection, duplicated, mirrored removing, material requires, goals 4 semiconductor, electrodes, collector, signal devices, contact controlling, processing digitally, signal electronic, silicon outgoing, analogue, incoming material, insulator method, text, length path, client, network create, tags, structure 5 frequencies, channel storing, source, fed asymmetric, subscriber, bandwidth wireless, protocol, access, transmissions dividing, node, destination paired, controller, backup, primary runs, interaction, perform, foreground cleared, set, unauthorized instruction, corresponding represent, initiated, cursor
III. KKLADAT
SAMIM.K Kssavs 1. What Do You Think about File-Sharing Software and its Use?
I think as long as people use this w a y of a c c e s s i n g and d o w n l o a d i n g music for their o w n p u r p o s e it is an a c c e p t a b l e practice and not a violation of the law. S w a p p i n g music in the traditional w a y has been g o i n g on since technology provided us the m e a n s , s u c h as cassetteplayers and CD burners. In the b e g i n n i n g , y o u n g p e o p l e s w a p p e d m u s i c within their close circles, at the c l u b s thev regularly went, colleges and s c h o o l s they visited or w o r k places w h e r e they met other m u s i c fans. Willi new technology a virtual society of y o u n g p e o p l e started to c o m e into existence: the youth of the Internet chat groups, the readers of bulletin b o a r d s , t h e b r o w s e r s of search engines, the g e e k s s p e n d i n g long h o u r s in f r o n t of their monitors. T h e s e b o y s and girls m e t m a n y m o r e virtual people, people w h o shared their interests, not only in search engines and c o m p u t e r g a m e s b u t in m u s i c too. T h e d e m a n d was there - the solution w a s s o o n to arrive. T h e a n s w e r w a s File-sharing s o f t w a r e and its application on a big scale. T h e w e l l - k n o w n sites like N a p s t e r , Gnutella, and later K a Z a a , w e r e b o m . People w e r e o v e r j o y e d - m u s i c files w e r e virtually flying across c y b e r s p a c e . T h e music industry started to w o r r y w h e n sales figures began falling. W h a t was h a p p e n i n g ? T h e a n s w e r w a s clear: an illegal c o m m e r c i a l activity w a s b o o m i n g - h u g e quantities of illegal C D s a p p e a r e d on the m a r k e t . This meant considerable financial loss for the record m a n u f a c t u r e r s , their financial interests greatly j e o p a r d i z e d . Legal cases e m e r g e d , police actions w e r e introduced, and e x e m p l a r y s e n t e n c e s w e r e m a d e . N o t h i n g really h e l p e d . A different line of action was needed. The m e s s a g e was clear: f i l e - s h a r i n g cannot be s t o p p e d . T h e n it must be t a m e d and restricted. T h e legal file-sharing sites were bom. This short history s h o w s us h o w the Internet, thus m o d e r n technology, influences the e v e r y d a y p r a c t i c e s of both the individual and the e c o n o m y .
(350 words)
86
(230 words)
(250 words)
(260 words)
(29 H words)
90
A Linux Media Player kis lpst jelent abban a felfel tr harcban, amit a Linux folytat
A G N U n e v L i n u x - a l a p i n g y e n e s s z m t g p e s o p e r c i s r e n d s z e r j v a l n a g y o b b e r e d m n n y e l hdtja m e g a nagy ipari s z m t g p e s a d a t k z p o n t o k a t , mint az asztali s z e m l y i s z m t g p e k p i a c t . A z o n b a n azzal, hogy l e l h a s z n l - b a r t a b b s z o f t v e r t lehet futtatni a L i n u x a l a p g p e k e n , ez az i n g y e n e s o p e r c i s r e n d s z e r e g y r e n a g y o b b s i k e r e k e t r el a jelenleg u r a l k o d P C - s z o f t v e r h a t a l o m , a Microsoft elleni Dvid-Glit k / t i \ ei s e n y b e n is. Ebben a Linux llal vvott h a r c b a n a mai n a p o n j a b b lps trtnik, a m i k o r kt n a g y Linux terjeszt, a Red Mat s a Novell vrhatan bejelenti, h o g y a R e a l N e t w o r k s nev m e d i a - l e j t s z s z o f t v e r t felteleptik a Linux alapon m k d asztali s z m t g p p e l irnytott t e r m k e k r e . A Rob G l a s e r ltal alaptott R e a l N e t w o r k s n e v c g volt a k e z d e t e k b e n az a v e z e t szoftvergyrt, a m e l y n e k s z o f t v e r e i az Interneten keresztli digitlis z e n e s v i d e o f j l o k lejtszst teszik lehetv. A c g ltal ellltott m d i a - l e j t s z s z o f t v e r v e r s e n y r e tud kelni a z M S W i n d o w s M e d i a Player-rel. A kt c g kztti rivalizls m o s t anti-trszt k r d s s vlt. Az E u r p a T a n c s ltal hozott tlet azt llaptotta m e g mrciusban, hogy az M i c r o s o f t trvnytelenl h a s z n l j a fel a W i n d o w s ltal biztostott m o n o p l i u m t a szemlyi s z m t g p opercis r e n d s z e r e k terletn arra, hogy s e g t s g v e l m e g s z e r e z z e a m d i a - p l a y e r " p i a c o n a vezet helyzetet. Az E u r p a Tancs elrendelte, h o g y a M i c r o s o f t kteles a W i n d o w s m d i a - p l a y e r nlkli vltozatt is piacra dobni. A d n t s ellen a M i c r o s o f t fellebezst nyjtott be. Tegnap az Eurpa Tancs b e l e e g y e z e t t abba, h o g y n e m r a g a s z k o d i k a mai h a t r i d h z . E szerint a M i c r o s o f t arra knyszerlt volna, h o g y E u r p b a n f o r g a l o m b a h o z z a a s z o f t v e r sztbontott vltozatt. Ekzben a l u x e m b u r g i brsg m g trgyalja az gyet. A R e a l N e t w o r k s k o r b b a n m r disztribcis m e g l l a p o d s o k a t kttt a T u r b o L i n u x - s z a l , a m e l y igen ers az zsiai piacon, valamint a Sun M i c r o s y s t e m s - s z e l , a m e l y J a v a - a l a p asztali s z m t g p e L i n u x szoftver alatt fut. A Linux igen gyorsan t e r j e d a s z e m l y i s z m t g p e s p i a c o n , ezrt a L i n u x - t e c h n i k a vlt a m d i a - p l a y e r s z o f t v e r tenvleges s z a b v n y v .
92
7.
9.
94
SZBELI I. FELADAT
Introductory conversations (Sample questions, helping ideas related to the second 10 topics) II. How do you protect your data on your home computer? Questions to think about: a. Do you make backup copies? b. Have you got a CD burner? c. What passwords do you use? d. Do you often download free software at home? e. How often do you run antivirus software on your PC? f. Do you sometimes update your antivirus software?
12. What passwords do most people use and why? Ideas: encryption, coding, mixture of characters and digits, changing passwords every so often, easy to remember etc. 13. What more does a computer 'know' if you compare it to a traditional typewriter? Features to compare: - keyboard - spell check (languages), grammar check - editing (styles etc.) - memory for storage - printing - no limit to copies - soft copy (to be transferred) - desktop publishing 14. What do you usually use the Internet for and why? Words for consideration: File-sharing software, video and sound files, common interest groups and chat-rooms, online games and magazines, search engines and other information sources, electronic trading and online banking services, online libraries and electronic learning materials etc. 15. How can we learn with the help of the Internet? 1. Search engines for seeking specific information 2. Online libraries, museums and exhibitions 3. Distant learning, virtual universities and online courses 4. Online dictionaries and databases 5. Collection of images (Google's Image Search) 6. Interactive Web sites
16. What are the properties of a 'nice and successful' URL? (well chosen domain name, well-designed site)
17. If you want to find a good job where will you look for the job advertisements? Why? - Hungarian/international sites like jobonline, jobinfo etc. - databases of vacant positions and work conditions. - Besides the databases with particular job offers, one can find useful information regarding required personal skills like 'How to write a good CV', etc. - Extra information is sometimes provided (an insight into issues like financial conditions, extra offers, most wanted positions, the situation on the international job market, etc.) - Easy way to contact potential employers. 18. What are databases for? Have you ever used a database? Search facility, columns, rows and cells, wildcard characters, symbols etc. 19. What is a good presentation like? What are presentations used for? (see the chapter on PowerPoint Presentations) Video conferencing, marketing and selling 'tricks of the trade', influencing people 20. What is an "applet" and how can you make one? (see two definitions from online dictionaries) Applet Definition 1: a Java program which runs within a web browser or on a computer within the Java runtime interpreter. An applet does not run on its own without running inside of something, a program which converts the Java program code into instructions for the computer. Definition 2: a program designed to be executed from within another application. Unlike an application, applets cannot be executed directly from the operating system. With the growing popularity of OLE (object linking and embedding), applets are becoming more prevalent. A well-designed applet can be invoked from many different applications. Web browsers, which are often equipped with Java virtual machines, can interpret applets from Web servers. Because applets are small in files size, cross-platform compatible, and highly secure (can't be used to access users' hard drives), they are ideal for small Internet applications accessible from a browser.
II. FELADAT
Reading comprehension
1.
SAMPLE Answers: 1. It is as small as a thumb/finger. It can work for 20 hours. 2. They will replace the lithium-ion batteries used in handheld electronic devices. 3. In handheld electronic devices. 4. They convert hydrogen and oxygen into water and this process produces electricity. Translation: Sok cg dolgozik azon, hogy kidolgozzon egy olyan technolgit, amellyel be lehet helyettesteni a hagyomnyos elemeket. Eddig a f akadly az volt, hogy hogyan lltsanak el kicsi s olcs elemeket. Sample Summary: The tiny fuel cell developed by Toshiba will generate electricity and power for gadgets like a digital music player for 20 hours. It is the size of a thumb and produces electricity by converting hydrogen and oxygen into water. Now the only problem is to find the technology to produce it cheaply. 2. Sample Answers: 1. It is a response to Google starting its Gmail service. 2. The name is Gmail Service and it offers a gigabyte of storage to all customers. 3. They currently get 10MB if they pay, and 2MB for free. 4. Because if it doesn't, its rival, Google, will win over most of its clients.
%
Translation: Hotmail nagyobb trolkapacitst szolgltat mind az ingyenes, mind a fizets email-gyfeleinek. Jliustl a Hotmail alapszolgltatsa 250 megabyte lesz, mig a fizet szoltltatst ignybe vevk 2 gigabyte trolhelyet vehetnek ignybe. Sample Summary: In response to Goggle's Gmail, Hotmail is offering a bigger amount of storage space for both its free and paid email services. Up from the present 10 MB for paying customers and 2 MB for free customers, the former will get 2 gigabytes and the latter will be entitled to 250 MB of space. 3. Sample Answers: 1. NRK is the public broadcaster's name in Norway. 2. It provides a service for people to watch its program 24 hours a day on their mobiles. 3. They are mostly news bulletins, motor shows and live streaming TV. 4. As the number of video phone owners increases, the demand for the service will grow as well. Translation: A norvg mobiltelefon tulajdonosok, az NRK (Norwegian Broadcasting Corporation) nev kzszolgltatnak ksznheten mr a mobiljukrl is nzhetnek tv-t. A norvg TV-trsasg szolgltatsa lehetv teszi, hogy az emberek a mobiljukrl akr napi 24 rban nzhessk a msort. Sample S u m m a r y : The Norwegian Broadcasting Corporation is offering TV to its viewers via mobile phone. Besides the live streaming, people can choose from more specialized programs such as news bulletins, motor shows etc. The service is expected to become more popular as the number of handsets with a media player is increasing. 4. Sample Answers: 1. Icstis is a company that follows the activities of premium rate services and related complaints. 2. Diallers are short programs activated without the client's agreement. They install themselves and automatically connect to premium rate lines. 3. They are numbers to connect to pornographic or gambling sites. 4. Icstis has found that the number of complaints related to web-based services is very high. Translation: Sokan nem is tudjk, hogy ppen egy olyan programot tltttek le az Internetrl, amely egy emelt djas szmot fog a szmtgpkrl trcszni a tudtuk nlkl. Az Icstis szerint az emelt djazs intemetszolgltatsokkal kapcsolatos magas telefonszmlk miatti panaszok a kzelmltban megsokszorozdtak. Sample S u m m a r y : Icstis, the premium rate watchdog explains the rise in complaints of high telephone bills related to web based premium rate services by the fact that the so called diallers, that is programs can secretly install themselves and automatically connect to premium rate lines. These lines mostly access pornographic or gambling sites. 5. Sample Answers: 1. It is a secret program that collects information about the user without his or her prior consent. 2. It can hide itself on your computer by entering with the help of your Internet activities such as shopping, paying with credit card or just downloading files. 3. When downloading free software the user usually has to agree to the conditions. It is best if we read the wording of these conditions very carefully. 4. It will often include a disclaimer informing you that personal information may be processed and used.
Translation: Spywarenek hvjk azt a szoftvert, amelyik azrt bjik meg a szmtgpen, hogy informcikat gyjtsn a gp gazdjrl, illetve arrl, hogy mire hasznlja az Internetet. A Spyware gyakran akkor kcriil fel a szmtgpre, amikor a felhasznl ingyenes szoftvert tlt le a webrl. Sample Summary: The software called spyware invades your privacy by passing on your personal data without you knowing it is happening. It will install itself on your PC when you download certain free software. Everybody must be careful and read all parts of the license agreement including any disclaimer warning the users about their privacy rights.
6.
Translation: Nem gy, mint a drga szoftverek, a nylt-forrs szoftverek szabadon terjeszthetk s vltoztathatk azzal a felttellel, hogy a vltoztatsokhoz a tbbi felhasznl is hozzfr. Sample Summary: Some young computer geeks in Iraqi are great fans of open source software. This software can freely be distributed and modified, as long as the modifications are shared with other users too. These young people communicate online and are quite enthusiastic about serving their country. The Iraqi youngsters met at an online Linux forum hosted by Iraqi expatriates. 7. Translation: Annak a 2500 ember tbb mint a fele, akiket Yahoo a levlszemt ellen indtott kampnya rszeknt krdezett meg, azt lltotta, hogy mr korbban felkrte intemetszolgltatjt, hogy tegyen valamit annak az rdekben, hogy meglltsa az elektronikus levlszekrnyt elraszt szemt radatt. Sample Summary: Research commissioned by Yahoo has found that most British Internet users find dealing with junk emails more stressful than traffic jams and have asked their providers to do something to stop it. An email filtering firm marketing director thinks that email providers are not fulfilling their obligations to consumers.
8.
Translation: A brit letet mindenfle aspektusbl ler web oldalak milliit fogjk archivlni egy olyan projekt keretben, amelyet a Brit Knyvtr irnyt majd. A kt vig tart projekt sorn mintegy 6000 honlapot fognak archivlni azzal a cllal, hogy megprbljk a jvnek megmutatni a jelen brit valsgot a weben. Sample Summary: A two year project will archive some 60.00 websites to preserve British life online. The backers of the project, among others the National Archive's, the British Library etc, thinks that with their unique insight they can avoid the loss of valuable educational, cultural and scientific resources on the web. 9. Translation: A legtbb lpst mostanig az Egyeslt llamokban tettk, s ezek clpontjai olyan nmet cgek voltak, mint pldul a Daimler, Volkswagen s a Siemens, amelyekrl kimutathat, hogy hasznot hznak a ncik ltal szervezett rabszolgamunkbl. Sample Summary: Many lawsuits have been launched against big German firms which allegedly made profit from slave labour during the Nazi era in Germany. Now the American giant IBM is accused of helping the Nazis by providing punch card machines produced in its German unit.
98
10. Translation: K.ct szmtgppel felszerelt kioszkot fognak fellltani az els osztly kocsikban, mg azok az utasok, akik drtnlkli kszlkkel kpesek az Internetet elemi, gynevezett forr helyek" segtsgvel tehetik majd azt meg. A szolgltats kezdetben ingyenes lesz, de esetenknt felszmthatnak a Rail Tel llomsi bdkhoz hasonl kltsgeket. Sample Summary: From 30th June Indian Railways is offering wireless Internet access on its trains on two of its lines. Passengers can access the web either on their wireless devices or on one of the two computers set up on luxury coaches. Indian Railways has already started computerizing its operations like ticketing and administration. The service will initially be free.
11.
Translation: A 2004-cs Glastonbury fesztivl meglepdtt vendgei segtsget kaptak abban, hogy megtalljk a sajt strukat. A stor a megfelel szveges zenetre kivilgosodott. Sample Summary: Festival goers can now find their tent among the thousands of identical ones with the help of the new high tech gadget which consists of a lightweight antenna and receiver box as well as some special luminous ribbing embedded in the tent's material. 12. Translation: A cg mostanig mr kt szoftverfejleszt eszkzt bocstott ki az n. nyitott kdot hasznl kzssg szmra, s kszen ll arra, hogy folytassa ezt a gyakorlatot - jelentette ki a Microsoft menedzsere egy ipari csoportnak tartott beszdben ezen a hten. Sample Summary: As Microsoft is losing market share due to the expansion of the open source Linux operation system, it is doing its best to release its own software development tools to the open source community. 13. Translation: A Szaturnusz gyrinek rejtlyt Sherlock Holmes s a modem technika egyttes alkalmazsval prbljk majd megoldani, amikor jv hten a nemzetkzi misszi megrkezik a nap hatodik bolygjra. Sample Summary: An international mission costing 3.27 million dollars will explore the sixth planet after a voyage of six years and eight months. The main objective of the mission is to get accurate information about Saturn's rings. 14. Translation: Az USA s India kzsen rendelkezik azzal az programmal, amelynek segtsgvel a jvt egy biztonsgosabb s gyarapodst biztost holnapp tudjuk alaktani. Az Egyeslt llamok felhasznlsra tadott Indinak egy Boeing mhold alrendszert azzal a cllal, hogy kzs egyttmkds keretben az Indiai rkutatsi Szervezettel egy kommunikcis mholdat fejlesszen ki. Sample Summary: According to the American Undersecretary for Commerce the US and India have the potential to transform the future into a safer tomorrow. The first step on this route is an American satellite systems division to cooperate with the Indian Space Research Organization to build a communications satellite by mid 2006. 15. Translation: Ami vglis a mostanban zajl erprbt fontosabb teszi, mint csupn egy kalandot, amelyik majd emltsre kerl a trtnelemknyvekben, az az, hogy egy oyan jvt kszt el, amelyikben az rutazsok annyira mindennapos esemnyek lesznek, mint jelenleg egy nyri tengeri hajkzs.
Sample Summary: SpaceSlupOne, a 20 million dollar project which is the first privately orchestrated and piloted manned space flight, will hopefully lead to a future in which space trips will be as routine and affordable as a cruise ship vacation today. 16. Translation: A jelen f krdse az, hogyan lehet az internetfelhasznl szolgltati cimt titokban tartani. Ha ez sikerl, a webez gy tud honlapokba belpni, zeneteket kldeni vagy emailezni, hogy nem hagyja maga mgtt azt a nyomot, ami segtsgvel le lehet nyomozni szmtgpe fizikai holltt. Sample Summary: As long as a particular Internet connection to a physical computer location can be traced, Web surfers downloading anything free can be easily caught. Now, with new software released by Syncodea, computer, fans sharing music and data files can forget about their worries. 17. Translation: k mg emlkeznek a rgi Napsterre, arra a P2P alkalmazsra, amelyik elszr szabadtotta ki a zenerajongkat a nagyipari zenegyrts aclklbl. Azt hiszik, hogy a jelenlegi hasonlt r. Sample Summary: Although Napster 2 is only a shallow copy of the old Napster, Britons still think it is the easy, safe and legal tool for downloading music from the net. The Financial Times and other online sources try to imply that Napster is safer and more legal than the many commercial P2P applications on the British market. 18. Translation: Tegnap az Internet stt oldalt okoltk azrt a megdbbent esetrt, amelyben egy kzpiskols fi megtervezte a sajt meggyilkolst. Az akkor 14 ves fi rvett egy msik tizenvest, hogy szrja t le azutn, hogy egy internetes chat szobban kmnek adta ki magt. Sample Summary: The dark side of the Internet is blamed for the stabbing of a fourteen year old secondary school boy, who - with the help of an Internet chat room and a series of alter egos - convinced his friend to kill him. He promised his friend he would get 500,000 pounds and a job as a secret agent. 19. Translation: Kedden anti-virus szoftver fejlesztk bejelentettk, hogy megjelent az els olyan szmtgp vrus, amely mobiltelefonokat fertz meg. Azt is hozztettk, hogy mostanig a vrusnak nem volt semmilyen kros hatsa. Sample Summary: Cabir, the first mobile phone virus has appeared. It propagates through the new Bluetooth wireless technology. Although it has no harmful effects, it writes Caribe on the screen and becomes activated every time the phone is turned on. It was created by an international group specializing in creating viruses.
20.
Translation: Egy vetern civil tesztpilta az els olyan ember, aki egy magn kezdemnyezs ltal megszervezett rreplsen rszt vehetett. A Kalifornia felett tbb mint 60 mrfld magassgban vezrelt apr rrakta tbb llegzetellltan izgalmas pillanattal szolglt. Sample Summary: A flight guided by a civilian test pilot and developed privately has become the first to reach space. The tiny space rocket, lifted part of the way on the belly of an airplane, went up to an altitude of 350,000 feet then returned as a glider guided by Melvill, its veteran pilot.
100