Giáo trình Anh văn chuyên ngành - Thạc Bình Cường (Phần 2)

Learning objectives

In this lesson, you will learn how to:

 Extract relevant information form texts about system software

 Recognize the characteristics of a typical graphical user interface or GUI

 Make a summary of a written text

 Talk about word processors

 Identify the function of different word-processing capabilities: search and

replace, cut and paste, spell checkers, etc.

 Understand the basic features of spreadsheets and databases

 Acquire specific vocabulary related to Internet utilities.

pdf89 trang | Chia sẻ: phuongt97 | Lượt xem: 494 | Lượt tải: 0download
Bạn đang xem trước 20 trang nội dung tài liệu Giáo trình Anh văn chuyên ngành - Thạc Bình Cường (Phần 2), để xem tài liệu hoàn chỉnh bạn click vào nút DOWNLOAD ở trên
neer of Since 2006, I’ve been a computer Intelligent Software operator for PromoPrint  Past actions that continue to the  Past actions that continue to the present, where we put an emphasis on present, where we put an emphasis duration (how long) on quantity (how many) She’s been working all morning I have designed four programs in Contrast with the past simple COBOL We use the past simple to talk about  Personal experiences, especially with events that happened at a specific time ever and never. in the past that are now finished Have you ever worked with I graduated in May 2007 database? Not: I have graduated in I’ve never worked with databases. I stay in this job until March 2009 Two years ago, I spent three months in Spain B. Make questions using these prompts. In pairs, ask and answer the questions 1) Ever/live or work in another country? 2) Ever/ have a bad job interview? 3) Ever/do a job you hated? 4) How long/study English? 5) How long / use computers? 6) How many emails / receive today? 7) How many jobs / apply for this year? MODULE 8. COMPUTERS TOMORROW Learning objectives In this module, you will learn how to:  Talk about different kinds of data communication systems: teletext, fax, local bulletin boards and the Internet  Describe the components and functions of a computer network, in oral and written form  Understand and discuss basic ideas about security and privacy on the Internet  Talk and write about new technologies  Understand predictions about the impact of computers on our lifestyle. Lesson 1. Electronic communications I. Before you read Try to answer these questions. 1) How can a PC be connected to another computer? 2) What data communication systems can you think of? Make a list. II. Reading A. Match the data communication services on the left with the requirements on the right. Then read the passage and check your answers. 1. fax a. To send a personal message to a friend who is at a different workstation. 2. electronic mail (e-mail) b. To send a copy of a paper document – for 3. teletext instance, a scientific article – from Trento 4. local bulletin board University to Cambridge University. system (BBS) c. To access massive databases containing all 5. commercial online kinds of information, or to be connected with service an airline reservations service. d. To receive shareware and public domain programs from a user group. e. To find out weather forecasts and sports information from the television. Channels of communication What are ‘telecommunications’? a bridge between digital and analogue This term refers to the transmission signals. The word ‘modem’ is an of information over long distances abbreviation of using the telephone system, radio, TV, Odulator/DEModulator. When a satellite, or computer links. Examples modem modulates, it sends very rapid are two people speaking on the phone, on/off pulses. The computer on the a sales department sending a fax to a other end translates (demodulates) client, or someone reading the teletext those signals into intelligible text or pages on TV. But in the modern graphics. Modem transmission speeds world, telecommunications mainly are measured in kilobits per second. means transferring information from Typical speeds are 28.8, 33.6 and 56 one PC to another via modem and kbps. phone lines (or fibre-optic cables) Today, a lot of companies find it What can you do with a modem? more efficient to have some A modem is your computer’s link employees doing their work at home. to the external world. With a modem, Using a modem, they transfer their you can exchange email and files with work into the office where it is printed friends and colleagues; you can access and distributed. The list of the Web and search for information applications is endless. about the stock market, current affairs, What do you need to entertainment, etc.; you can telecommunicate? participate in newsgroups and live You just need a PC (or a terminal), conversations; you can make bank a modem connected to the computer transactions and buy things from the and the telephone line, and comfort of your home. You can also communication software. Once you access your office from your have installed and configured your computer at home or your laptop in a modem, you can communicate with hotel room. people through bulletin boards and online services. Local bulletin boards Bulletin board systems (BBS) are Modems frequently free because they are run Your PC is a digital device. by enthusiasts and sponsored by user However, the telephone system is an groups or small businesses. The first analogue device, designed to transmit time you make a BBS connection you the sounds and tones of the human are required to register your name, voice. That’s why we need a modem – address, phone number, and other program to download files from information such as the kind of FTP sites, and IRC software so that computer and modem you are using. you can have live chats with other The person who administers the BBS users. Most ISPs charge a flat is called sysop (system operator). You monthly or annually fee that gives can use a BBS to download artwork, you unlimited access to the games, and programs, or you can Internet. participate in ongoing discussions. The main commercial online You can also upload (send) programs, services are America Online, but make sure they are shareware or CompuServe, Prodigy, and the public domain programs. Microsoft Network. They differ from Online service providers dedicated ISPs in two ways: (1) they To gain access to the Internet, you use a smooth, easy-to-use interface, must first open an account with an and (2) they have extra services for Internet service provider (ISP) or a members only (but they charge higher commercial online service provider. prices). For example, they offer airline Both offer Internet access, but the reservations, professional forums, latter provides exclusive services. online shopping, and stories for  Internet service providers usually children. They also let you search offer access to the Web and their online encyclopedias and special newsgroups, an email address, a database. B. Complete the sentences by using a term from the list. Then write the words in the crossword. modem network online download newsgroups services account telephone 1. When you are connected to the Internet, you are described as being 2. To communicate via the Internet, you need a PC, modem, and a 3. To have access to the Internet, you must first open an 4. You need a to convert computer data into a form that can be transmitted over the phone lines. 5. The public discussion areas on the Internet are called 6. You can use a BBS to clip-art, games, and shareware to your PC. 7. CompuServe and America Online offer exclusive to their customers. 8. The Internet is a global of computer networks. III. Language work: Making predictions A prediction is a statement about a particular subject in which we say what we think will happen in the future. Predictions are not always absolute, but can be expressed with different levels of certainty, according to the context in which they are made. a. Certainty can be expressed by: will (definitely, certainly) certain, sure without a doubt, without question b. Probability can be expressed by: probable, probably, likely most/highly probable, most probably most/ highly likely c. Possibility can be expressed by: may (not), might (not), can, could possible, possibly, perhaps d. Improbability can be expressed by: improbable, unlikely doubtful, questionable probably not most/ highly improbable/ unlikely most/ highly doubtful/ questionable most probably not e. Impossibility can be expressed by: past present or future cannot, could could not not not possible, not possible, impossible impossible A. These expressions are used in sentences in different ways. For examples: 1) Notebook computers will definitely be cheaper next year. 2) It is (highly) probable/ likely that notebook computers will be cheaper next year. 3) Notebook computers may/ might be cheaper next year. 4) Perhaps notebook computers will be cheaper next year. 5) It is unlikely/ doubtful that notebook computers will be cheaper next year. 6) Notebook computers will most probably not be cheaper next year. 7) Notebook computers will definitely not be cheaper next year. 8) It is impossible that notebook computers will be cheaper next year. B. Match the if-clauses (1 to 6) to the main clauses (a to f) to make complete sentences. 1 If you never read computer a you would be able to access our magazines bulletin board. 2 If you never back up your hard b it is unlikely that you will have disk a problem with computer viruses. 3 If you had a modem c we would have a bigger range of typefaces and fonts to choose from. 4 If you don’t copy pirated d you will miss important new software products. 5 If I knew more programming e I would get a better job. languages 6 If we bought a better printer f you will probably lose some important files. C. Complete the sentences with the words in the box. Are the sentences first (F) or second (S) conditionals? would not will be look at will get post grows wanted leave Would need will be reduced installed 1 If you ... your VDU in direct sunlight, it ... damaged 2 If you ... your screen for too long, you... a headache. 3 If you ... to link your PCs with a mainframe, you ... to install a network. 4 If the market for portable computers ..., prices ... even more next year. 5 If we ... a fax machine and email facility, we ... so many letters each day. D. Now make up three first conditional and three second conditional sentences of your own Lesson 2. Internet issues I. Warm-up 1. Try to answer these questions. 1) Is it technically possible for computer criminals to infiltrate into the Internet and steal sensitive information? 2) What is a hacker? 3) Can viruses enter your PC from the Internet? 2. Match these texts with the correct pictures. 1. Web browsers warn you if the 2. Private networks use a software connection is not secure; they and hardware mechanism, called a display a message when you try ‘firewall’, to block unauthorized to send personal information to a traffic from the Internet. server. 3. You have to type your user name 4. An open padlock in Netscape and password to access a locked Communicator indicates the page computer system or network is not secure; a closed padlock indicates the page is encrypted. a b c d II. Reading A. Read the text on the following page and find answers to these questions. 1) Why is security so important on the Internet? 2) What security features are offered by Netscape Communicator and Internet Explorer? 3) What security standard is used by most banks to make online transactions secure? 4) How can we protect and keep our email private? 5) What methods are used by companies to make internal networks secure? 6) Which ways can a virus enter a computer system? Security and privacy on the Internet There are a lot of benefits from an allow you to disable or delete open system, like the Internet, but we ‘cookies’. are also exposed to hackers who break If you use online bank services, into computer systems just for fun, as make sure your bank uses digital well as to steal information or certificates. A popular security propagate viruses. So how do you go standard is SET (secure electronic about making online transactions transactions). secure? Email privacy Security on the Web Similarly, as your email message The question of security is crucial travels across the net, it is copied when sending confidential temporarily on many computers in information such as credit card between. This means it can be read by numbers. For example, consider the unscrupulous people who illegally process of buying a book on the Web. enter computer systems. You have to type your credit card The only way to protect a message number into an order form which is to put it in a sort of ‘envelope’, that passes from computer to computer on is, to encode it with some form of its way to the online bookstore. If one encryption. A system designed to send of the intermediary computers is email privately is Pretty Good infiltrated by hackers, your data can Privacy, a freeware program written be copied. It is difficult to say how by Phil Zimmerman. often this happens, but it’s technically Network security possible. Private networks connected to the To avoid risks, you should set all Internet can be attacked by intruders security alerts to high on your Web who attempt to take valuable browser, Netscape Communicator, information such as Social Security and Internet Explorer display a lock numbers, bank accounts, or research when the Web page is secure and and business reports. To protect crucial data, companies care when downloading files from the hire security consultants who analyze Web. (Plain text email alone can’t pass a virus) the risks and provide security solutions. The most common methods Remember also to update your anti-virus software as often as of protection are passwords for access possible, since new viruses are being control, encryption and decryption created all the time. systems, and firewalls. Virus protection Viruses can enter a PC through files from disks, the Internet, or bulletin board systems. If you want to protect your system, don’t open email attachments for strangers and take HELP box  hacker: a person who obtains unauthorized access to computer data  cookies: small files used by Web servers to know if you have visited their site before  certificates: files that identify users and Web servers on the net, like digital identification  encryption: the process of encoding data so that unauthorized users can’t read it  decryption: the process of decoding encrypted data transmitted to you. B. Complete these sentences by using a term from the text. Then write the words in the puzzle. 1. Users have to enter a p. to gain access to a network. 2. You can download a lot of f. or public domain programs from the net. 3. Hundreds of h. break into computer systems every year. 4. A computer v. can infect your files and corrupt your hard disk. 5. The process of encoding data so that unauthorized users can’t read the data is known as e. 6. A f. is a device which allows limited access to an internal network from the Internet. 7. You can include an a. as part of your email message. This company uses d. techniques to decode (or decipher) secret data. III. Hackers! Read the text in order to answer these questions. 1) Which hacking case inspired the film War Games? 2) Why was Nicholas Whitely arrested in 1988? 3) How old was the hacker that cracked the US defense computer in October 1989? 4) Who was known as ‘Dark Dante’ on the networks? What was he accused of? 5) Which computer club showed on TV a way to attack bank accounts? Sept ‘70 John Draper, also known as Captain Crunch, discovers that the penny whistle offered in boxes of Cap’n Crunch breakfast cereal perfectly generates the 2,600 cycles per second (Hz) signal that AT&T used to control its phone network at the time. He starts to make free calls. Aug ‘74 Kevin Mitnick, a legend among hackers, begins his career, hacking into banking networks and destroying data, altering credit reports of his enemies, and disconnecting the phone lines of celebrities. His most famous exploit – hacking into the North American Defense Command in Colorado Springs – inspired War Games, the 1983 movie. Jul ‘81 Ian Murphy, a 23-year-old known as Captain Zap on the networks, gains instant notoriety when he hacks into the White House and the Pentagon. Dec ‘87 IBM international network is paralyzed by hacker’s Christmas message. Jul ‘88 Union Bank of Switzerland ‘almost’ loses 32 million to hacker- criminals. Nicholas Whitely is arrested in connection with virus propagation. Oct ‘89 Fifteen-year-old hacker cracks US defense computer. Nov ‘90 Hong Kong introduces anti-hacking legislation. Aug ‘91 Israelis arrest 18-year-old for hacking foreign banking and credit card networks. Jul ‘92 In New York, five teenagers are charged with breaking into computer systems at several regional phone companies, large firms and universities. Kevin Paulson, known as ‘Dark Dante’ on the networks, is Dec ‘92 charged with stealing tasking orders relating to an Air Force military exercise. He is accused of theft of US national secrets and faces up to 10 years in jail. Feb ‘97 German Chaos Computer Club shows on TV the way to electronically obtain money from bank accounts using a special program on the Web. May ‘98 Computer criminals propagate a lot of viruses through the Internet. IV. Language work: The past simple (revision) Look at the text in Task 3 again and put the verbs into the past. Example In September 1970, John Draper discovered that the penny whistle generated He started to make free calls. Lesson 3. Networks I. Small networks In pairs, discuss these questions 1) What is a computer network? 2) What are the benefits of using networks? II. Networking FAQs A. Look at the FAQs (i - vi) without reading the whole text. In pairs, try to answer as many of the questions as you can B. Read the whole text and answer these questions. 1) What does PAN stand for? 2) What is a network protocol? 3) How do you log on to an Internet Service Provider? 4) WiMAX is a type of wireless network. What is it used for? 5) What equipment do you need to set up a wireless LAN? 6) What are the advantages and disadvantages of wireless networks? Networking FAQs i. How many types of network are capabilities – that is, share files there? and peripherals without Networks are classified according requiring a separate server to different criteria: computer.  Geographical area: PANs  Topology, or layout: In bus (Personal Area Networks) network, all the computers are typically include a laptop, a connected to a main cable, or mobile phone and a PDA; bus. In a star network, all data LANs cover a building; MANs flows through a central hub, a (Metropolitan Area Networks) common connection point for cover a campus or a city; the devices in the network. In a WANs (Wide Area Networks) ring network, all devices are cover a country or a continent. connected to one another in a  Architecture: In a client- continuous loop, or ring. server network, a computer  Network protocol: This is the acts as a server and stores and language, or set of rules, that distributes information to the computers use to communicate other nodes, or clients. In a with each other. Networks use peer-to-peer network, all the different protocols. For computers have the same instance, the Internet uses newsletters, etc. It is important that TCP/IP you remember to log off after using ii. How do I install a wired modem the Internet. An open line increases router? the risk of viruses, and hackers might A modem router is a device that break into your computer to steal connects your computer or home LAN confidential data. to the Internet iv. What is wireless networking?  Plug one end of the phone cord Wired networks are linked by directly into a phone jack, and Ethernet cables, phone lines and high- the other end into the ADSL speed fiber optic cables. Wireless port on the router. networks, however, use  Plug one end of the Ethernet electromagnetic waves, such as radio cable into your computer’s waves, to transmit data. These are the network port and the other end main types of wireless networks: into an Ethernet port on the  Satellites – for long distances router.  WiMAX – for connecting Wi-  Turn on your computer. To set Fi hotspots. up, or configure, the router,  Wi-Fi – for medium-range you’ll need to input some distances parameters, for example your  Bluetooth – for short distances ISP’s name and phone number.  GSM – for mobile phones NOTE: A router has various v. What do I need to set up a home Ethernet ports, so you can connect wireless LAN? various PCs to the router via Ethernet You’ll need computers equipped cables. If you already have a hub or with a wireless adapter or wireless switch connecting a LAN, you only card, a wireless access point (a need one cable to connect the hub to wireless router) and a broadband the router. internet connection. iii. How do I log on to the Internet vi. Which is better, a wired or service Provider? wireless LAN? You need to type in your username Wired LANs are more difficult to and password. Once you are online, install, but they are cheaper, faster and you can get email, look for more reliable. Wireless networks let information on the Web, look up IT you move, or roam, from one access words in dictionaries, try out new point to another, but they are less software, and sign up for RSS feeds, secure and subject to interference. C. In pairs, do this network quiz. See which pair can finish first. 1) This network typically consists of two or more local area networks, covering a large geographical area. a. LAN b. WAN c. Intranet 2) This type of network does not have a dedicated server; all the computers are independent. a. Peer-to-peer b. Client-server c. Metropolitan Area Network 3) On this topology, all devices are connected to the same circuit, forming a continuous loop a. Star b. Ring c. bus 4) The language used by computers to communicate with each other on the Internet is called a. Ethernet b. ADSL c. TCP/IP 5) Which cables are used to transfer information for the Internet over long distances at high speeds? a. Telephone lines b. Ethernet cables c. Fiber optic cables 6) Which device allows several computers on a local network to share an internet connection? a. An ADSL port b. A router c. Wireless adapter 7) Which device serves as a common connection point devices in a wireless network? a. Wireless access point b. Wire router c. Wireless adapter 8) Bluetooth is a wireless technology that uses radio waves to transmit data over a. Long distances b. Medium-range c. Short distances (ten distances meters of less) III. Language work: phrasal verbs A. Look at the HELP box. Do you have the equivalent of phrasal verbs in your language? How do you say the phrasal verbs in the HELP box? HELP box Phrasal verbs  The meaning of some verbs with particle (often called phrasal verbs) can be easily understood form its two parts Look at the photos Separate network are linked over a public network, the Internet.  However, many phrasal verbs have an idiomatic meaning, not predictable from the meaning of its parts. carry (= transport); carry out (= execute) Computer carry out the programs  Certain particles have similar meanings, regardless of the verb (on/off, in/out, etc.) Turn on / switch on (= start the operation of something) Turn off / switch off (= stop the operation of something)  Other common phrasal verbs in computing include: Plug into (= connect) Plug one end of the phone cord into the phone jack Set up (= establish) What do I need to set up a wireless LAN? Sign up (= register, enroll in a service) Once connected, you can sign up for RSS feeds, newsletters, etc. Try out (= test or use experimentally) You can try out new software on their site Find out ( = learn, discover) Search the Web to find out more information about WiMAX Take up ( = occupy) Fiber optic cables take up less space than copper cables make up ( = constitute, form) Several LANs connected together make up a WAN fill in (= write the necessary information) You need to fill in this online form  When the verb has a preposition associated with it, the preposition must precede the object: You can look for information on the Web. (not: look information for) When the particle is an adverb,

Các file đính kèm theo tài liệu này:

  • pdfgiao_trinh_anh_van_chuyen_nganh_thac_binh_cuong_phan_2.pdf
Tài liệu liên quan