Learning objectives
In this lesson, you will learn how to:
Extract relevant information form texts about system software
Recognize the characteristics of a typical graphical user interface or GUI
Make a summary of a written text
Talk about word processors
Identify the function of different word-processing capabilities: search and
replace, cut and paste, spell checkers, etc.
Understand the basic features of spreadsheets and databases
Acquire specific vocabulary related to Internet utilities.
89 trang |
Chia sẻ: phuongt97 | Lượt xem: 511 | Lượt tải: 0
Bạn đang xem trước 20 trang nội dung tài liệu Giáo trình Anh văn chuyên ngành - Thạc Bình Cường (Phần 2), để xem tài liệu hoàn chỉnh bạn click vào nút DOWNLOAD ở trên
neer of
Since 2006, I’ve been a computer Intelligent Software
operator for PromoPrint Past actions that continue to the
Past actions that continue to the present, where we put an emphasis on
present, where we put an emphasis duration (how long)
on quantity (how many) She’s been working all morning
I have designed four programs in Contrast with the past simple
COBOL We use the past simple to talk about
Personal experiences, especially with events that happened at a specific time
ever and never. in the past that are now finished
Have you ever worked with I graduated in May 2007
database? Not: I have graduated in
I’ve never worked with databases. I stay in this job until March 2009
Two years ago, I spent three months
in Spain
B. Make questions using these prompts. In pairs, ask and answer the
questions
1) Ever/live or work in another country?
2) Ever/ have a bad job interview?
3) Ever/do a job you hated?
4) How long/study English?
5) How long / use computers?
6) How many emails / receive today?
7) How many jobs / apply for this year?
MODULE 8. COMPUTERS TOMORROW
Learning objectives
In this module, you will learn how to:
Talk about different kinds of data communication systems: teletext, fax, local
bulletin boards and the Internet
Describe the components and functions of a computer network, in oral and
written form
Understand and discuss basic ideas about security and privacy on the Internet
Talk and write about new technologies
Understand predictions about the impact of computers on our lifestyle.
Lesson 1. Electronic communications
I. Before you read
Try to answer these questions.
1) How can a PC be connected to another computer?
2) What data communication systems can you think of? Make a list.
II. Reading
A. Match the data communication services on the left with the requirements
on the right. Then read the passage and check your answers.
1. fax a. To send a personal message to a friend who is
at a different workstation.
2. electronic mail (e-mail)
b. To send a copy of a paper document – for
3. teletext
instance, a scientific article – from Trento
4. local bulletin board University to Cambridge University.
system (BBS)
c. To access massive databases containing all
5. commercial online kinds of information, or to be connected with
service an airline reservations service.
d. To receive shareware and public domain
programs from a user group.
e. To find out weather forecasts and sports
information from the television.
Channels of communication
What are ‘telecommunications’? a bridge between digital and analogue
This term refers to the transmission signals. The word ‘modem’ is an
of information over long distances abbreviation of
using the telephone system, radio, TV, Odulator/DEModulator. When a
satellite, or computer links. Examples modem modulates, it sends very rapid
are two people speaking on the phone, on/off pulses. The computer on the
a sales department sending a fax to a other end translates (demodulates)
client, or someone reading the teletext those signals into intelligible text or
pages on TV. But in the modern graphics. Modem transmission speeds
world, telecommunications mainly are measured in kilobits per second.
means transferring information from Typical speeds are 28.8, 33.6 and 56
one PC to another via modem and kbps.
phone lines (or fibre-optic cables) Today, a lot of companies find it
What can you do with a modem? more efficient to have some
A modem is your computer’s link employees doing their work at home.
to the external world. With a modem, Using a modem, they transfer their
you can exchange email and files with work into the office where it is printed
friends and colleagues; you can access and distributed. The list of
the Web and search for information applications is endless.
about the stock market, current affairs, What do you need to
entertainment, etc.; you can telecommunicate?
participate in newsgroups and live You just need a PC (or a terminal),
conversations; you can make bank a modem connected to the computer
transactions and buy things from the and the telephone line, and
comfort of your home. You can also communication software. Once you
access your office from your have installed and configured your
computer at home or your laptop in a modem, you can communicate with
hotel room. people through bulletin boards and
online services.
Local bulletin boards
Bulletin board systems (BBS) are
Modems frequently free because they are run
Your PC is a digital device. by enthusiasts and sponsored by user
However, the telephone system is an groups or small businesses. The first
analogue device, designed to transmit time you make a BBS connection you
the sounds and tones of the human are required to register your name,
voice. That’s why we need a modem –
address, phone number, and other program to download files from
information such as the kind of FTP sites, and IRC software so that
computer and modem you are using. you can have live chats with other
The person who administers the BBS users. Most ISPs charge a flat
is called sysop (system operator). You monthly or annually fee that gives
can use a BBS to download artwork, you unlimited access to the
games, and programs, or you can Internet.
participate in ongoing discussions. The main commercial online
You can also upload (send) programs, services are America Online,
but make sure they are shareware or CompuServe, Prodigy, and the
public domain programs. Microsoft Network. They differ from
Online service providers dedicated ISPs in two ways: (1) they
To gain access to the Internet, you use a smooth, easy-to-use interface,
must first open an account with an and (2) they have extra services for
Internet service provider (ISP) or a members only (but they charge higher
commercial online service provider. prices). For example, they offer airline
Both offer Internet access, but the reservations, professional forums,
latter provides exclusive services. online shopping, and stories for
Internet service providers usually children. They also let you search
offer access to the Web and their online encyclopedias and special
newsgroups, an email address, a database.
B. Complete the sentences by using a term from the list. Then write the
words in the crossword.
modem network online download
newsgroups services account telephone
1. When you are connected to the
Internet, you are described as being
2. To communicate via the Internet,
you need a PC, modem, and a
3. To have access to the Internet, you must first open an
4. You need a to convert computer data into a form that can be
transmitted over the phone lines.
5. The public discussion areas on the Internet are called
6. You can use a BBS to clip-art, games, and shareware to your
PC.
7. CompuServe and America Online offer exclusive to their
customers.
8. The Internet is a global of computer networks.
III. Language work: Making predictions
A prediction is a statement about a particular subject in which we say what
we think will happen in the future. Predictions are not always absolute, but can be
expressed with different levels of certainty, according to the context in which they
are made.
a. Certainty can be expressed by:
will (definitely, certainly)
certain, sure
without a doubt, without
question
b. Probability can be expressed by:
probable, probably, likely
most/highly probable, most
probably
most/ highly likely
c. Possibility can be expressed by:
may (not), might (not), can, could
possible, possibly, perhaps
d. Improbability can be expressed by:
improbable, unlikely
doubtful, questionable
probably not
most/ highly improbable/ unlikely
most/ highly doubtful/
questionable
most probably not
e. Impossibility can be expressed by:
past
present or
future
cannot, could
could not
not
not possible,
not possible,
impossible
impossible
A. These expressions are used in sentences in different ways. For
examples:
1) Notebook computers will definitely be cheaper next year.
2) It is (highly) probable/ likely that notebook computers will be cheaper
next year.
3) Notebook computers may/ might be cheaper next year.
4) Perhaps notebook computers will be cheaper next year.
5) It is unlikely/ doubtful that notebook computers will be cheaper next
year.
6) Notebook computers will most probably not be cheaper next year.
7) Notebook computers will definitely not be cheaper next year.
8) It is impossible that notebook computers will be cheaper next year.
B. Match the if-clauses (1 to 6) to the main clauses (a to f) to make
complete sentences.
1 If you never read computer a you would be able to access our
magazines bulletin board.
2 If you never back up your hard b it is unlikely that you will have
disk a problem with computer viruses.
3 If you had a modem c we would have a bigger range
of typefaces and fonts to choose
from.
4 If you don’t copy pirated d you will miss important new
software products.
5 If I knew more programming e I would get a better job.
languages
6 If we bought a better printer f you will probably lose some
important files.
C. Complete the sentences with the words in the box. Are the sentences
first (F) or second (S) conditionals?
would not will be look at will get
post
grows wanted leave Would
need will be reduced installed
1 If you ... your VDU in direct sunlight, it ... damaged
2 If you ... your screen for too long, you... a headache.
3 If you ... to link your PCs with a mainframe, you ... to
install a network.
4 If the market for portable computers ..., prices ... even
more next year.
5 If we ... a fax machine and email facility, we ... so many
letters each day.
D. Now make up three first conditional and three second conditional
sentences of your own
Lesson 2. Internet issues
I. Warm-up
1. Try to answer these questions.
1) Is it technically possible for computer criminals to infiltrate into the
Internet and steal sensitive information?
2) What is a hacker?
3) Can viruses enter your PC from the Internet?
2. Match these texts with the correct pictures.
1. Web browsers warn you if the 2. Private networks use a software
connection is not secure; they and hardware mechanism, called a
display a message when you try ‘firewall’, to block unauthorized
to send personal information to a traffic from the Internet.
server.
3. You have to type your user name 4. An open padlock in Netscape
and password to access a locked Communicator indicates the page
computer system or network is not secure; a closed padlock
indicates the page is encrypted.
a b
c d
II. Reading
A. Read the text on the following page and find answers to these questions.
1) Why is security so important on the Internet?
2) What security features are offered by Netscape Communicator and
Internet Explorer?
3) What security standard is used by most banks to make online
transactions secure?
4) How can we protect and keep our email private?
5) What methods are used by companies to make internal networks
secure?
6) Which ways can a virus enter a computer system?
Security and privacy on the Internet
There are a lot of benefits from an allow you to disable or delete
open system, like the Internet, but we ‘cookies’.
are also exposed to hackers who break If you use online bank services,
into computer systems just for fun, as make sure your bank uses digital
well as to steal information or certificates. A popular security
propagate viruses. So how do you go standard is SET (secure electronic
about making online transactions transactions).
secure? Email privacy
Security on the Web Similarly, as your email message
The question of security is crucial travels across the net, it is copied
when sending confidential temporarily on many computers in
information such as credit card between. This means it can be read by
numbers. For example, consider the unscrupulous people who illegally
process of buying a book on the Web. enter computer systems.
You have to type your credit card The only way to protect a message
number into an order form which is to put it in a sort of ‘envelope’, that
passes from computer to computer on is, to encode it with some form of
its way to the online bookstore. If one encryption. A system designed to send
of the intermediary computers is email privately is Pretty Good
infiltrated by hackers, your data can Privacy, a freeware program written
be copied. It is difficult to say how by Phil Zimmerman.
often this happens, but it’s technically Network security
possible. Private networks connected to the
To avoid risks, you should set all Internet can be attacked by intruders
security alerts to high on your Web who attempt to take valuable
browser, Netscape Communicator, information such as Social Security
and Internet Explorer display a lock numbers, bank accounts, or research
when the Web page is secure and and business reports.
To protect crucial data, companies care when downloading files from the
hire security consultants who analyze Web. (Plain text email alone can’t
pass a virus)
the risks and provide security
solutions. The most common methods Remember also to update your
anti-virus software as often as
of protection are passwords for access possible, since new viruses are being
control, encryption and decryption created all the time.
systems, and firewalls.
Virus protection
Viruses can enter a PC through
files from disks, the Internet, or
bulletin board systems. If you want to
protect your system, don’t open email
attachments for strangers and take
HELP box
hacker: a person who obtains unauthorized access to computer data
cookies: small files used by Web servers to know if you have visited their site
before
certificates: files that identify users and Web servers on the net, like digital
identification
encryption: the process of encoding data so that unauthorized users can’t read it
decryption: the process of decoding encrypted data transmitted to you.
B. Complete these sentences by using a term from the text. Then write the
words in the puzzle.
1. Users have to enter a p.
to gain access to a network.
2. You can download a lot of
f. or public domain
programs from the net.
3. Hundreds of h. break
into computer systems every year.
4. A computer v. can infect your files and corrupt your hard disk.
5. The process of encoding data so that unauthorized users can’t read the data
is known as e.
6. A f. is a device which allows limited access to an internal
network from the Internet.
7. You can include an a. as part of your email message.
This company uses d. techniques to decode (or decipher) secret
data.
III. Hackers!
Read the text in order to answer these questions.
1) Which hacking case inspired the film War Games?
2) Why was Nicholas Whitely arrested in 1988?
3) How old was the hacker that cracked the US defense computer in
October 1989?
4) Who was known as ‘Dark Dante’ on the networks? What was he
accused of?
5) Which computer club showed on TV a way to attack bank accounts?
Sept ‘70 John Draper, also known as Captain Crunch, discovers that the
penny whistle offered in boxes of Cap’n Crunch breakfast cereal
perfectly generates the 2,600 cycles per second (Hz) signal that
AT&T used to control its phone network at the time. He starts to
make free calls.
Aug ‘74 Kevin Mitnick, a legend among hackers, begins his career,
hacking into banking networks and destroying data, altering credit
reports of his enemies, and disconnecting the phone lines of
celebrities. His most famous exploit – hacking into the North
American Defense Command in Colorado Springs – inspired War
Games, the 1983 movie.
Jul ‘81 Ian Murphy, a 23-year-old known as Captain Zap on the networks,
gains instant notoriety when he hacks into the White House and
the Pentagon.
Dec ‘87 IBM international network is paralyzed by hacker’s Christmas
message.
Jul ‘88 Union Bank of Switzerland ‘almost’ loses 32 million to hacker-
criminals. Nicholas Whitely is arrested in connection with virus
propagation.
Oct ‘89 Fifteen-year-old hacker cracks US defense computer.
Nov ‘90 Hong Kong introduces anti-hacking legislation.
Aug ‘91 Israelis arrest 18-year-old for hacking foreign banking and credit
card networks.
Jul ‘92 In New York, five teenagers are charged with breaking into
computer systems at several regional phone companies, large
firms and universities.
Kevin Paulson, known as ‘Dark Dante’ on the networks, is
Dec ‘92 charged with stealing tasking orders relating to an Air Force
military exercise. He is accused of theft of US national secrets and
faces up to 10 years in jail.
Feb ‘97 German Chaos Computer Club shows on TV the way to
electronically obtain money from bank accounts using a special
program on the Web.
May ‘98 Computer criminals propagate a lot of viruses through the
Internet.
IV. Language work: The past simple (revision)
Look at the text in Task 3 again and put the verbs into the past.
Example
In September 1970, John Draper discovered that the penny whistle
generated
He started to make free calls.
Lesson 3. Networks
I. Small networks
In pairs, discuss these questions
1) What is a computer network?
2) What are the benefits of using networks?
II. Networking FAQs
A. Look at the FAQs (i - vi) without reading the whole text. In pairs, try to
answer as many of the questions as you can
B. Read the whole text and answer these questions.
1) What does PAN stand for?
2) What is a network protocol?
3) How do you log on to an Internet Service Provider?
4) WiMAX is a type of wireless network. What is it used for?
5) What equipment do you need to set up a wireless LAN?
6) What are the advantages and disadvantages of wireless networks?
Networking FAQs
i. How many types of network are capabilities – that is, share files
there? and peripherals without
Networks are classified according requiring a separate server
to different criteria: computer.
Geographical area: PANs Topology, or layout: In bus
(Personal Area Networks) network, all the computers are
typically include a laptop, a connected to a main cable, or
mobile phone and a PDA; bus. In a star network, all data
LANs cover a building; MANs flows through a central hub, a
(Metropolitan Area Networks) common connection point for
cover a campus or a city; the devices in the network. In a
WANs (Wide Area Networks) ring network, all devices are
cover a country or a continent. connected to one another in a
Architecture: In a client- continuous loop, or ring.
server network, a computer Network protocol: This is the
acts as a server and stores and language, or set of rules, that
distributes information to the computers use to communicate
other nodes, or clients. In a with each other. Networks use
peer-to-peer network, all the different protocols. For
computers have the same
instance, the Internet uses newsletters, etc. It is important that
TCP/IP you remember to log off after using
ii. How do I install a wired modem the Internet. An open line increases
router? the risk of viruses, and hackers might
A modem router is a device that break into your computer to steal
connects your computer or home LAN confidential data.
to the Internet iv. What is wireless networking?
Plug one end of the phone cord Wired networks are linked by
directly into a phone jack, and Ethernet cables, phone lines and high-
the other end into the ADSL speed fiber optic cables. Wireless
port on the router. networks, however, use
Plug one end of the Ethernet electromagnetic waves, such as radio
cable into your computer’s waves, to transmit data. These are the
network port and the other end main types of wireless networks:
into an Ethernet port on the Satellites – for long distances
router. WiMAX – for connecting Wi-
Turn on your computer. To set Fi hotspots.
up, or configure, the router, Wi-Fi – for medium-range
you’ll need to input some distances
parameters, for example your Bluetooth – for short distances
ISP’s name and phone number. GSM – for mobile phones
NOTE: A router has various v. What do I need to set up a home
Ethernet ports, so you can connect wireless LAN?
various PCs to the router via Ethernet You’ll need computers equipped
cables. If you already have a hub or with a wireless adapter or wireless
switch connecting a LAN, you only card, a wireless access point (a
need one cable to connect the hub to wireless router) and a broadband
the router. internet connection.
iii. How do I log on to the Internet vi. Which is better, a wired or
service Provider? wireless LAN?
You need to type in your username Wired LANs are more difficult to
and password. Once you are online, install, but they are cheaper, faster and
you can get email, look for more reliable. Wireless networks let
information on the Web, look up IT you move, or roam, from one access
words in dictionaries, try out new point to another, but they are less
software, and sign up for RSS feeds, secure and subject to interference.
C. In pairs, do this network quiz. See which pair can finish first.
1) This network typically consists of two or more local area networks,
covering a large geographical area.
a. LAN b. WAN c. Intranet
2) This type of network does not have a dedicated server; all the
computers are independent.
a. Peer-to-peer b. Client-server c. Metropolitan Area Network
3) On this topology, all devices are connected to the same circuit,
forming a continuous loop
a. Star b. Ring c. bus
4) The language used by computers to communicate with each other on
the Internet is called
a. Ethernet b. ADSL c. TCP/IP
5) Which cables are used to transfer information for the Internet over
long distances at high speeds?
a. Telephone lines b. Ethernet cables c. Fiber optic cables
6) Which device allows several computers on a local network to share an
internet connection?
a. An ADSL port b. A router c. Wireless adapter
7) Which device serves as a common connection point devices in a
wireless network?
a. Wireless access point b. Wire router c. Wireless adapter
8) Bluetooth is a wireless technology that uses radio waves to transmit
data over
a. Long distances b. Medium-range c. Short distances (ten
distances meters of less)
III. Language work: phrasal verbs
A. Look at the HELP box. Do you have the equivalent of phrasal verbs in
your language? How do you say the phrasal verbs in the HELP box?
HELP box
Phrasal verbs
The meaning of some verbs with particle (often called phrasal verbs) can be
easily understood form its two parts
Look at the photos
Separate network are linked over a public network, the Internet.
However, many phrasal verbs have an idiomatic meaning, not predictable from
the meaning of its parts.
carry (= transport); carry out (= execute)
Computer carry out the programs
Certain particles have similar meanings, regardless of the verb (on/off, in/out,
etc.)
Turn on / switch on
(= start the operation of something)
Turn off / switch off
(= stop the operation of something)
Other common phrasal verbs in computing include:
Plug into (= connect)
Plug one end of the phone cord into the phone jack
Set up (= establish)
What do I need to set up a wireless LAN?
Sign up (= register, enroll in a service)
Once connected, you can sign up for RSS feeds, newsletters, etc.
Try out (= test or use experimentally)
You can try out new software on their site
Find out ( = learn, discover)
Search the Web to find out more information about WiMAX
Take up ( = occupy)
Fiber optic cables take up less space than copper cables
make up ( = constitute, form)
Several LANs connected together make up a WAN
fill in (= write the necessary information)
You need to fill in this online form
When the verb has a preposition associated with it, the preposition must precede
the object:
You can look for information on the Web.
(not: look information for)
When the particle is an adverb,
Các file đính kèm theo tài liệu này:
- giao_trinh_anh_van_chuyen_nganh_thac_binh_cuong_phan_2.pdf