1. Trang chủ
  2. » Giáo Dục - Đào Tạo

Giáo trình Tiếng Anh chuyên ngành (Ngành Kỹ thuật lắp ráp, sửa chữa máy tính)

105 20 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 105
Dung lượng 1,54 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Unit 1: Computers today WARM UP: COMPUTER APPLICATIONS A.. Information in the form of data and programs in known as software, and the electronic and mechanical parts that make up a com

Trang 1

UBND TỈNH HẢI PHÒNG TRƯỜNG CAO ĐẲNG CÔNG NGHIỆP HẢI PHÒNG

GIÁO TRÌNH TIẾNG ANH CHUYÊN NGÀNH

(Lưu hành nội bộ)

HẢI PHÒNG

Trang 2

Nội dung môn học

Nội dung tổng quát và phân phối thời gian:

- Computer applications

Unit 1 Computers today - Reading: What is a computer?

- Speaking: Your ideal computer system

- Grammar focus: Relative clauses

- Reading: Point and click!

Revision 1 + - Review Unit 1 & 2

Progress 1 - Progress test 1

Trang 3

- Reading: Computer graphics

- Writing: Creating a home page with a Web page editor

- Grammar focus: Conditional clauses

- Reading: Programming languages

- Writing: Describing C language

- Grammar focus: Infinitive constructions

Revision 2 +- Review Unit 3 & 4 Progress 2 - Progress test 2

Computers

- Reading: Security and privacy on the net

tomorrow - Mini project: designing a cybercafe

- Grammar focus: making predictions

Final Revision - Final Review

MỤC LỤ

Trang 4

C

Unit 1: Computers today 5

WARM UP: COMPUTER APPLICATIONS 5

READING 7

GRAMMAR FOCUS: RELATIVE CLAUSES 10

SPEAKING: YOUR IDEA COMPUTER SYSTEM 11

Unit 2: Input/ output devices 12

WARM UP 12

READING 14

WRITING 15

Unit 3: Software 16

WARM UP 16

READING 17

GRAMMAR FOCUS: CONDITIONAL CLAUSES 19

READING 20

WRITING 22

Unit 4: Programming 23

WARM UP 23

READING 24

GRAMMAR FOCUS: INFINITIVE CONSTRUCTIONS 26

Unit 5: Computers tomorrow 27

WARM UP 27

READING 28

GRAMMAR FOCUS: MAKING PREDICTIONS 30

4

Trang 5

Tài liệu này thuộc loại sách giáo trình nên các nguồn thông tin có thể được phép dùng nguyên bản hoặc trích dùng cho các mục đích về đào tạo và tham khảo

Mọi mục đích khác mang tính lệch lạc hoặc sử dụng với mục đích kinh doanh thiếu lành mạnh sẽ bị nghiêm cấm

Trang 6

Unit 1: Computers today

WARM UP: COMPUTER APPLICATIONS

A Computers have many applications in a many fields Look at these pictures of different situations and match them with text

1 to 4 below

d

c

1 A computer has high speed of calculation, diligence, accuracy, reliability, or

versatility which made it an integrated part in all business organizations Computer

is used in business organizations for:

Payroll calculations

Budgeting

Sales analysis

Financial forecasting

Managing employees database

2 The computer has provided a lot of facilities in the education system

The computer provides a tool in the education system known as CBE

(Computer Based Education)

CBE involves control, delivery, and evaluation of learning

Trang 7

The computer education is rapidly increasing the graph of number of

computer students

There are number of methods in which educational institutions can use

computer to educate the students

It is used to prepare a database about performance of a student and analysis

is carried out on this basis

3 Computers are widely used in Engineering purpose

One of major areas is CAD (Computer aided design) That provides creation and modification of images Some fields are:

Structural Engineering - Requires stress and strain analysis for design of

Ships, Buildings, Budgets, Airplanes etc

Industrial Engineering - Computers deal with design, implementation and

improvement of integrated systems of people, materials and equipments

Architectural Engineering - Computers help in planning towns, designing

buildings, determining a range of buildings on a site using both 2D and 3D drawings

4 Computers are largely used in defense Modern tanks, missiles, weapons etc

Military also employs computerized control systems Some military areas where a computer has been used are:

Missile Control

Military Communication

Military Operation and

Planning Smart Weapons

B Match these captions with pictures above:

Learning with computers is very interesting

Trang 8

Entertainment: game, music, animated image, multimedia, encyclopedia

Factories: machinery, robot, production line, computer-aided manufacturing

software

Hospitals: medical personnel, database program, records, scanner, diagnose,

surgery

Useful constructions

Computers are used to …

A PC can also be used for …

Computers can help …/ make …/ control …/ store …/ keep … / provide … manage

… / give … / perform … / measure … / test … / provide access to …

READING

A In group of four, finish the word puzzle of computer parts below

Trang 9

B Read the text and study the diagram below

What is a computer?

Trang 10

Computers are electronic machines which can accept data in certain form, process the data and give the results of the processing in a specific format as information Three basic steps are involved in the process First, data is fed into the computer’s memory Then, when the program is run, the computer performs a set of instructions and processes the data Finally, we can see the results (the output) on the screen or in printed form

Information in the form of data and programs in known as software, and the electronic and mechanical parts that

make up a computer system are called

hardware A standard computer system

consists of three main sections: the

central processing unit (CPU), the main

memory, and the peripherals

Perhaps the most influential component

is the central processing unit Its function

is to execute program instructions and

coordinate the activities of all the other

units In a way, it is the “brain” of the

computer The main memory holds the

instructions and data which are currently

being processed by the CPU The

peripherals are the physical units

attached to the computer They include

storage devices and input/output devices

Storage devices (floppy, hard or optical disks) provide a permanent storage of both data and programs Disk devices are used to handle one or more floppy disks Input devices enable data to go into the computer’s memory The most common input devices are the mouse and the keyboard Output devices enable us to extract the finished product from the system For example, the computer shows the output on the monitor or prints the results onto paper by means of a printer

On the rear panel of the computer, there are several ports into which we can plug a wide range of peripherals – modems, fax machine, optical drives, and scanners These are the main physical units of a computer system, generally known as the configuration

C Use the information in the text and the diagram to help you match the terms in the box with the appropriate explanation or definition below

Trang 11

a software b peripheral devices c monitor d USB

1 The brain of the computer

2 Physical parts that make up a computer system

3 Programs which can be used on a particular computer system

4 The information which is presented to the computer

5 Results produced by a computer

6 Hardware equipment attached to the CPU

7 Visual display unit

8 Small device used to store information

9 Any socket or channel in a computer system into which

an input/output device may be connected

GRAMMAR FOCUS: RELATIVE CLAUSES

A Study these sentences:

1 The microprocessor is a chip

2 The chip processes the information provided by software

Both sentences refer to chip We can link them by making sentences 2 a relative clause:

The microprocessor is a chip which processes the information provided by

software

The relative clause is in italics Note that the chip in sentences 2 becomes which

Study these other pairs of sentences and note how they are linked

3 The teacher has just arrived

4 The teacher is responsible for the computer centre

3+4: The teacher who is responsible for the computer centre has just arrived

B Now link these sentences Make the second sentences in each pair a

relative clause

1 Virus is a destructive software

This software causes damage to the data, the information or the hardware of the computer

………

2 A USB port is a gateway

The gateway is used to connect all kinds of external devices to your

computer

Trang 12

………

3 A co-processor is a silicon chip The chip carries out mathematical operation at a very high speed ………

4 The megahertz is a unit of frequency The unit is used to measure processor speed ………

5 A password is a secret word The word must be entered before access is given to a computer system ………

6 The gateway is a device The device is used to interconnect different types of networks ………

SPEAKING: YOUR IDEA COMPUTER SYSTEM A Make notes about the features of the computer that you would like to have CPU: ………

Speed: ………

Minimum/maximum RAM: ………

Hard disk: ………

Monitor: ………

Software: ………

B Now describe it to your

partner Useful expressions

It has got …

It’s very fast It runs at …

The standard RAM memory … and it is expandable

… The hard disk can hold …

I need a SuperVGA monitor because

… As for the Internet …

Trang 13

Unit 2: Input/ output

devices

WARM UP

A Interacting with your computer

Input devices are the pieces of hardware which allow us to enter information into the computer, the most common are the keyboard and the mouse We can also interact with a computer by using one of these: a lightpen, a scanner, a trackball, a graphics tablet, a joystick or a voice recognition device

Look at the illustration and see if you can name them

3………

1………

2………

5……… 6………

4………

B About the keyboard

Look at the picture of PC-compatible keyboard below and identify these groups of keys

1 Alphanumeric keys: arranged in the same order as a typewriter

Trang 14

2 Function keys: used by various programs to instruct the PC to perform

specific tasks such as Save, Copy, Paste, Help, etc

3 Numeric keypad: set of numeric or editing keys The Num Kock key is used

to switch from numbers to editing functions

4 Editing keys: cursor and other keys usually used within word processors to

page up and down in a long document or to edit text (using Insert or Delete keys)

Match these descriptions with the names of keys on the right Then find them

on the keyboard

1 A long key at the bottom of the keyboard Each time it is

pressed, it produces a blank space

2 It moves the cursor to the beginning of a new line It is also

used to confirm commands

3 It stops a program without losing the information from the

main memory Sometimes, its use depends on the applications

4 It works in combination with other keys to produce special

characters or specific actions

5 It removes the character on the left of the cursor or any selected

text

6 It produces UPPER-CASE character

7 It produces upper-case letters, but it does not affect numbers

Trang 15

READING

Point and click!

A computer mouse is an input device that is most often used with a personal computer Moving a mouse along a flat surface can move the on-screen cursor to different items on the screen Items can be moved or selected by pressing the mouse buttons (called clicking)

It is called a computer mouse because of the wire that connects the mouse to the computer The people who designed the first computer mice thought that it looked like the tail on a mouse Today, many computer mice use wireless technology and have no wire

In 1964 Douglas Engelbart (1925-2013), a researcher at Stanford Research Institute, wanted to find a way to make using computers easier In those days, computers were large and expensive Using them was very hard because everything had to be typed in by hand, and there was no way to alter things if you made a mistake

After studying and designing for a long time, Engelbart succeeded in inventing an input device which he named 'XY index'

At first, it needed two hands to use, but it was changed so that only one hand was needed to use it This model was more like the mouse that we use today Xerox Palo Alto Research introduced a GUI in 1981, using a mouse

The mouse was used with Macintosh of Apple Inc when it came out in 1984 Microsoft Windows also used the mouse when it came out, so over time computer mice became used with many computers Modern mice have three buttons: left button, right button, scroll button

On most computers, the user can move the mouse to move the cursor in the same direction To choose something that is on the screen, the user can move the cursor

to it and "click" the left mouse button The right mouse button is used to open menus that are different depending on where the cursor is The other mouse buttons can do different things, depending on the software Most mice have two buttons to click

Most mice also have a "scroll wheel" —a small wheel found between the two main mouse buttons The user can move the wheel back and forth to "scroll" through things like a website or folder "Scrolling" means moving the words or pictures up

Trang 16

or down on the screen, so another part of the page comes into view The wheel can also be pressed, to click it like another button

Try to answer these questions:

1 Why it is called a computer mouse?

Trang 17

Unit 3: Software

WARM UP

A Look at the diagram What are the functions of the operating system?

B Read the text below and complete it with the phrases in the box

An operating sys tem is a group of computer ……… that coordinates all the activities among computer hardware devices It is the first program loaded into the computer by a boot program and remains in memory at all times The basic functions of an operating system are:

Provides file ……… which refers to the way that the operating system manipulates, stores, retrieves and saves data

Trang 18

systems for personal computers are Microsoft Windows, Apple Mac OS X, and Linux

or GUI (pronounced gooey) A GUI lets you use your mouse to click icons, buttons, and menus, and everything is clearly displayed on the screen using a combination of graphics and text Each operating system's GUI has a different look and feel, so if you switch to a different operating system it may seem unfamiliar at first However, modern operating systems are designed to be easy to use, and most

of the basic principles are the same

Microsoft Windows

Microsoft created the Windows operating system in the mid- 1980s Over the years, there have been many different versions of Windows, but the most recent ones are Windows 8 (released in 2012), Windows 7 (2009), and Windows Vista (2007) Windows comes preloaded on most new PCs, which helps to make it the most popular operating system in the world

If you're buying a new computer or are upgrading to a newer version of Windows, you can choose from several different editions of Windows, such as Home Premium, Professional, and Ultimate You may need to do some research to decide which edition is right for you

Mac OS X

Mac OS is a line of operating systems created by Apple It comes preloaded on all new Macintosh computers, or Macs All of the recent versions are known as OS X (pronounced O-S Ten), and the specific versions include Yosemite (released in 2014), Mavericks (2013), Mountain Lion (2012), Lion (2011), and Snow Leopard (2009) Apple also offers a version called Mac OS X Server, which is designed to

be run on servers

According to StatCounter Global Stats, Mac OS X users account for 9.5% of the operating systems market as of September 2014 - much lower than the percentage

Trang 19

of Windows users (almost 90%) One reason for this is that Apple computers tend

to be more expensive However, many people prefer the look and feel of Mac OS

X

Linux

Linux (pronounced LINN-ux) is a family of open-source operating systems, which means they can be modified and distributed by anyone around the world This is different from proprietary software like Windows, which can only be modified by the company that owns it (Microsoft) The advantages of Linux are that it is free, and there are many different distributions —or versions—you can choose from Each distribution has a different look and feel, and the most popular ones include Ubuntu, Mint, and Fedora

Linux is named after Linus Torvalds, who created the Linux kernel in 1991

The kernel is the computer code that is the central part of an operating system

1 What does GUI mean?

GRAMMAR FOCUS: CONDITIONAL CLAUSES

A Two types of conditional clauses

When you want to talk about a possible situation and its consequences, you use a conditional sentence Here, we examine two types of conditionals

Trang 20

First conditional (possible situation)

If A happens, B will happen

(present simple), (will + verb)

E.g If you click on the speaker ico n, you’ll get a piece of dialogue from the movie

In the main clause, we can also have modal (can, be able to), an imperative, or a present tense verb

Second conditional (unlikely situation)

If A happened, B would happen

(past simple), (would + verb)

E.g If I had money, I would invest in a multimedia upgrade kid

Other modals (could, should, might, be able to) may appear in the main clause

B Read these sentences, then identify the tenses used in the if-clause and in the main clause

1 If you upgrade your PC, you’ll be able to run multimedia applications

2 If the marketing manager had a multimedia system, she could make more effective presentations

C Put the verbs in the brackets into the correct form

1 If I (get) ……… a sound card, I’ll be able to create my own music with a MIDI

2 If the system (have) ……… a SuperVGA card, we would obtain a better resolution

3 You won’t be able to play CD-ROM disks if you (not have) ………

Trang 21

D Match the sentences in Column A with appropriate sentences from

Column B Then join each action and effect using an if-sentence

1 you press Print Screen a you drag it across the screen

2 you press Ctrl+Alt+Del in Windows 7 b it would speed up the computer

5 you used a better search engine desk

6 you forget to save regularly e you would be able to connect to a

7 you hold down the mouse button over telephone line

8 you used an LCD display g you would find more relevant

results

h it displays a list of active programs

E Describe the consequences of these actions using an if-sentence

1 you don’t virus-check USB

2 there was a power cut while you were using your computer

3 you install a faster processor

4 you forgot your password

5 you press the delete key

6 you use search engine

7 you double-click on an icon

8 you use power-saving options

READING

A Read the text below

Computer graphics

Computer graphics are visual representations of data displayed on a monitor made

on a computer Computer graphics can be a series of images (most often called video) or a single image

Computer graphics are very useful Computer-generated imagery is used for movie making, video game and computer program development, scientific

Trang 22

modeling, and design for catalogs and other commercial art Some people even make computer graphics as art

Computer graphics can be 2D or 3D They are made differently and used differently People use different computer programs to make different types of graphics

2D computer graphics are usually split into two categories: vector graphics and raster graphics

Vector graphics use lines, shapes, and text to create a more complex image If a vector graphic image is made very big on the monitor, it will still be as good as its regular size This is one of the reasons vector graphics are liked so much Vector graphics are made with programs like Adobe Illustrator and Inkscape, and were used for some older computer games Today, they are often used for when computer graphics have to be printed out

Raster graphics use pixels to make up a larger image This does not mean the artist has to change a single pixel at a time - raster programs often have tools like paintbrushes, paint buckets, and erasers to make a picture Programs used to make these include Adobe Photoshop and Corel Paint Shop Pro These are often used as part of what the user sees when she uses a computer program

Sometimes people do use only pixels to make an image This is called pixel art and

it has a very unique style

3D graphics are graphics that look like objects because they are three- dimensional This means the computer thinks it has a height, a length, and a depth, and displays them as this Some programs used to make 3D graphics are Bryce, 3D Studio Max, Maya and Blender, and 3D graphics are used many times in movies and TV shows and video games

Computer graphics may be used in the following areas:

o Infographics

Trang 23

B More about graphics

Graphics programs have several options that work in conjunction with the tools menu to enable the user to manipulate and change pictures

Look at the facilities on the left and match them with the definitions on the right

1 Patterns menu a Turning an image round

2 Scaling b A tool which lets you scale the ‘view’ of a picture and edit

a small potion of it as if you were working under a

magnifying glass It is very useful for doing detailed work as

3 Rotating c Making the object larger or smaller in any of the horizontal,

4 Inverting d A shading technique where two different colors are placed

next to each other; the human eye blends the colors to form a

third one It is also used to show shading in black and white

5 Zoom e A palette from which you choose a design to fill in shapes

6 Slanting f Reversing the color of the dots in the selected part of a

picture, so that white dots become black and black dots

Trang 24

Unit 4: Programming

WARM UP

A In pairs, try to think of an answer for the question

What is programming?

B Complete the following definitions with the words and phrases in the box

the various parts of the program may occur in programs language

Trang 25

binary numbers a given problem

The basic instructions understood by computers The processor operates

on codes which consist of

called machine code This consists of the 1s and 0s (binary codes) that are

processed by the CPU

However, machine code as a means of communication is very difficult to write For this reason, we use symbolic languages that are easier to understand Then, by using a special program, these languages can be

translated into machine code For example, the so-called assembly languages use abbreviations such as ADD, SUB, MPY to represent

instructions These mnemonic codes are like labels easily associated with the items to which they refer

Basic languages, where the program is similar to the machine code version,

are known as low-level languages In these languages, each instruction is

equivalent to a single machine code instruction, and the program is

Trang 26

converted into machine code by a special program called an assembler

These languages are still quite complex and restricted to particular machines

To make the programs easier to write and to overcome the problem of intercommunication between different types of machines, higher-level languages were designed such as BASIC, COBOL, FORTRAN or Pascal These are all problem-oriented rather than machine-oriented Programs

written in one of these languages (known as source programs) are

converted into low-level language by means of a compiler (generating the

object program) On compilation, each statement in a high-level language

is generally translated into many machine code instructions

People communicate instructions to the computer in symbolic languages and the easier this communication can be made, the wider the application of computers will be Scientists are already working on Artificial Intelligence and the next generation of computers may be able to understand human languages

Instructions are written in a high-level language (e.g Pascal, BASIC, COBOL, Ada, C, Lisp)

This is known as the source program

Compiler Compilers translate the original code into a lower-level language

or machine code so that the CPU can understand it

Instructions are compiled and packaged into a program

The software is ready to run on the computer

1 Do computer understand human languages?

Trang 27

5 What do you understand by the terms source program and object program?

………

6 In the future, could computers be programmed in Spanish, French, or

Japanese?

………

GRAMMAR FOCUS: INFINITIVE CONSTRUCTIONS

A The infinitive is used:

after adjectives

It is difficult to use machine code

after modal verbs with to: ought to, used

to I ought to make a back-up copy

Using a computer is much easier than it used to be

after modal and auxiliary verbs without to: can, could, may, might,

shall, will, should, would, would rather

Unfortunately, computers can’t understand

English I’d rather buy a game than a spreadsheet

B Make sentences as in the example

E.g: Not easy/write instructions in Pascal

 It is not easy to write instructions in Pascal.

Trang 28

C Now look again at the reading passage Underline the infinitive

constructions after modal verbs

E.g: Unfortunately, computers cannot understand ordinary spoken English

D Look at these pairs of examples and decide where there is an

important change in meaning

1 a I remember shutting down the computer before I left the room

b Please, remember to buy the new program

2 a They stopped to look at the flowchart

b They stopped looking at the flowchart

3 a I like studying C language

b I like to study C language in the evenings

4 a It has started to rain

b It has started raining

5 a He needs to work harder

b This hard disk needs repairing

Unit 5: Computers

tomorrow

WARM UP

A Try to answer these questions

1 Is it technically possible for computer criminals to infiltrate into the Internet and steal sensitive information?

2 What is a hacker?

3 Can virus enter your PC from the Internet?

B Match these texts with the correct pictures

Trang 29

1 Web browsers warn you if the connection is not secure; they display a

message when you try to send personal information to a server

2 Private networks use software and hardware mechanism, called a ‘firewall’,

to block unauthorized traffic from the Internet

3 You have to type your user name and password to access a locked computer system or network

4 An open padlock in Netscape Communicator indicates the page is not secure;

a closed padlock indicates the page is encrypted

Privacy and Security on the

Internet: 5 Tips to Stay Safe

As the Internet becomes an increasingly integral part of daily life, questions about privacy and security on the Internet are on the rise Keeping your personal

information, private data and finances safe can be difficult, but

by following a few tips, you can avoid the vast majority of scams,

Trang 30

The best tool to avoid spyware and stay safe on the Internet is your own brain Free software with no potential upgrades or strings attached, websites that are covered in flashy ads, and free Wi-Fi in an unexpected place are all signs that something may be wrong, and ignoring that intuition can get you in trouble By staying aware of what you are doing, and thinking about your security while you live your online life, you stand a better chance of avoiding potentially dangerous situations

Tip 2: Check for website safety

The Internet can be dangerous because so many websites require your personal information to either log in to your account or to complete a transaction Hackers, thieves and spyware programmers realize this and often try to intercept your information during these transactions, so make sure you are always dealing with secure websites and companies First, only provide your information to reputable businesses, then ensure that the company's website uses a Web address that starts with "https" and has a padlock symbol either in the address bar or at the bottom of the browser This means that the site encrypts your information, making the data nearly useless to any thieves or hackers who may intercept the transmission

Tip 3: Choose strong and varied passwords

For most people, a password is the strongest protection to ward off hackers and thieves, and yet

so many choose passwords that are barely worth the time it takes to enter them When creating

a password, always use a mix of letters and numbers, and include a symbol if the website allows

it While more difficult to remember, this will make your password almost impossible to guess More importantly, you have to use different passwords for different websites Think about how often you use the same username and password for many online accounts Hackers specifically target low-security sites to gain access to large lists of usernames and corresponding passwords, knowing that many people use the same combination of credentials for things like online banking

Additionally, take advantage of any two- factor authentication offered by these sites This requires not only a password to log in, but a code that's sent to a dedicated device or to your smartphone as an SMS message This makes it very difficult for a third party to hack into your account

Tip 4: What is spyware? How do I stop it?

Spyware probably poses the biggest threat to privacy and security on the Internet, yet so few people really know what it is or how it works Put simply, spyware is any piece of software that records your actions or information without your knowledge Some spyware is fairly benign, tracking browsing history and keeping the data it receives anonymous, while other spyware is specifically designed to get your online banking credentials so thieves can clean out your accounts

Because it's almost impossible to avoid spyware on your own, having anti-spware and antivirus programs running on your computer is a must These programs will automatically scan any piece of incoming software for malicious signatures and block the installation if the program looks suspect They'll also scan existing files and monitor Internet traffic to ensure that spyware isn't hiding somewhere on the machine and sending your information to some hacker's terminal There are free anti-spyware programs out there, but you have to be careful when trying to save

a buck or two — quite a few of these programs are really Trojan horses in disguise, looking to infect your machine instead of protect it Instead, your best option is to go with an industry leader These companies have no interest in scamming you, and are big enough to ensure that their databases are constantly updated as new threats emerge The best options also offer a free trial, so you can see the anti-spyware program in action before paying some of your hard- earned cash

Tip 5: It's not all about spyware and scams

With all this talk about spyware, hackers and Internet security, it's important to remember that most people with privacy issues on the Internet put themselves in that position Think about

Trang 31

social networking sites and just how much personal information you have posted there If someone were trying to steal your identity and needed your father's middle name or where you went to elementary school — two commonly used security questions — you need to think about how a thief could locate those facts If you're concerned about Internet privacy, you have to consider staying away from social networking sites, minimizing the information you put out there,

or maximizing privacy settings on these sites

Complete privacy and security on the Internet is a tough goal to reach, these tips will help you

go a long way toward keeping yourself safe Millions of people use the Internet, and thieves will inevitably go for easy targets People who give even the smallest amount of thought to security and privacy, and take steps in that regard, will find themselves passed over as thieves search out greener pastures

(From http://usa.kaspersky.com/ )

GRAMMAR FOCUS: MAKING PREDICTIONS

A prediction is a statement about a particular subject in which we say what we think will happen in the future Predictions are not always absolute, but can be expressed with the different levels of certainly, according to the context in which they are made

Certainly can be expressed by:

will (definitely, certainly)

certain, sure

without a doubt, without question

Probability can be expressed

by: probable, probably, likely

most/highly probable, most probably, most/highly likely

Possibility can be expressed by:

may (not), might (not), can, could, possible, possibly, perhaps

These expressions are used in sentences in different ways For examples:

1 Notebook computers will definitely be cheaper next year

2 It is highly probable/ likely that notebook computers will be cheaper next year

3 Notebook computers may/ might be cheaper next year

4 Perhaps notebook computers will be cheaper next year

5 It is unlikely/ doubtful that notebook computers will be cheaper next year

6 Notebook computers will most probably not be cheaper next year

7 Notebook computers will definitely not be cheaper next year

8 It is impossible that notebook computers will be cheaper next year

A Match the if-clauses to the main clauses to make complete sentences

Trang 32

1 If you never read computer magazine,

2 If you back up your hard disk,

3 If you had a modem,

4 If you don’t copy pirated software,

5 If I knew more

programming languages,

6 If we bought a better printer,

a you would be able to access our bulletin board

b it is unlikely that you will have a problem with computer virus

c we should have a bigger range of typefaces and fonts to choose from

d you will miss important new products

e I would get a better job

f you will probably lose some important files

B Now make up three first conditional and three second conditional

sentences of your own

Glossary of ICT terminology

A

Absolute Link: A term used by Web authors In an HTML document a Relative Link indicates

the location of a file relative to the document, whereas an absolute link specifies the full URL

For example, the relative link of this Glossary to the ICT4LT homepage is /en/en_glossary.htm

whereas it's absolute link is http://www.ict4lt.org/en/en_glossary.htm It's generally better for Web authors to link to files within the same website using relative links rather than absolute links,

as this makes site and file maintenance easier See Section 5.4, Module 3.3, headed Shared

Acceptable Use Policy (AUP): An AUP is a set of rules that define the ways in which ICT

facilities can and cannot be used in a business or educational institution, including a description

of the possible sanctions that can be applied if a user breaks the rules Two of the most important

topics covered by an AUP are (i) e-safety and (ii) awareness of and compliance with

copyright See Section 12.6, Module 1.5, headed E-safety, and General guidelines on copyright

forfurther information about these topics

Trang 33

Access: The name of a Database program forming part of the Microsoft Office suite of programs

Accessibility: The fundamental issue regarding accessibility is that everyone should have access

to the services provided by ICT, e.g computer programs, Email and the World Wide Web, regardless of any visual, auditory, or other physical impairment they might have Assistive

screen readers, screen magnifiers, speech recognition systems, hearing assistance devices, etc Designers of computer programs and websites need to take account of accessibility when choosing colours, fonts and font sizes, etc: see Font See Section 4, Module 3.5 regarding speech technologies and how they may help unsighted and partially sighted computer users and people with hearing impairments See SENDA See Section 6.3.1, Module 3.3, headed HTML

Action Maze: A type of computer program used in Computer Assisted Language Learning

See Maze for a more detailed explanation

Active Matrix: A term used to describe the newer type of computer Display Screen that makes

use of Thin Film Transistor (TFT) technology: see TFT Active matrix screens have excellent colour resolution and can display motion accurately and rapidly See Resolution

Additive Colour: A term used mainly by graphic designers Additive colour is produced by the

addition of light from a luminescent primary source A light bulb appears white because it emits light in all colours of the visible spectrum, which combine to produce white light All the colours

in the light spectrum add up to make white light Computer monitors use three additive colours, Red, Green and Blue (RGB), which are combined in different ways to produce millions of other colours See CMY, RGB, Subtractive Colour

Address Book: Usually supplied as part of your Email software An address book in this sense is

used to keep a record of all the email addresses of people whom you may wish to contact by email

ADSL: Abbreviation for Asymmetric Digital Subscriber Line A high-speed digital telephone

connection that operates over an existing copper telephone line, allowing the same line to be used for voice calls ADSL lines offer transmission speed that are usually in the range 2Mbps to 8Mbps, and are used mainly for Internet access The term asymmetric is used because the data

flows more quickly from the telephone exchange to the user than from the user to the exchange - because most Web users are more interested in receiving data quickly from websites rather than

uploading it to websites The term symmetric is used for connections where the data flows at the

same speed in both directions, which is essential for accessing websites where there is a high degree of interactivity See Broadband, ISDN, Kbps, Leased Line, Mbps

Adventure Game: Adventure games date back to the early days of mainframe computing The

early adventure games consisted entirely of written text, but modern adventure games incorporate elaborate graphics, sound and video sequences The dividing line between an adventure game and

overcome, and the player has to indulge in mind-stretching lateral thinking in order to overcome

them Adventure games are often set in a fantasy world, e.g Myst or Riven, but some are more down-to-earth and can play an important role in language teaching and learning, e.g Who is

Trang 34

Oscar Lake? See Section 3.4.9, Module 2.2 , headed A simulation on CD-ROM See Maze, MOO, MUD, MUVE

Adware is software that may have been installed on your computer by a remote computer, i.e

via the Web Many free utilities that you download from the Internet will install hidden software

that sends details of the websites you visit and other information from your computer (which can include your email address) to advertisers so they can target you with popup ads and spam

are described See Spam, Spyware

AI: Abbreviation for Artificial Intelligence

AJAX: Acronym for Asynchronous JavaScript and XML AJAX is a Web programming tool (or

rather a set of tools) that makes it possible to create interactive Web applications that work in much the same way as computer applications on your computer's hard disc, i.e more responsive, more spontaneous, so that when you click on something on the Web page there is very little time delay - as in your word-processor, for example While you are browsing a Web page AJAX is working behind the scenes AJAX allows your browser to fetch data from the Web and use it to update a fragment of the page without refreshing the whole page so that you don't have to wait for the whole Web page to refresh or reload each time you click on a button or initiate an action

in some other way This increases the Web page's interactivity, speed, functionality, and usability Google Maps is a typical example of a Web application incorporating AJAX Scroll around the map and watch it update itself with relatively little time delay AJAX is a programming tool that is used extensively in what are known as Web 2.0 applications See

ALTE: Abbreviation for Association of Language Testers in Europe

Alt Key: The Alt keys can be found on either side of the space bar on a computer keyboard They

are commonly used in conjunction with a set of numbers to enable foreign characters to be typed

Analogue: The basic meaning of analogue is "something that corresponds to something else"

For example, in the context of equipment used for recording and playing back sound, analogue refers to the way in which the sound is recorded and reproduced If you look closely at the groove

of a 33 rpm vinyl gramophone record you will see that it is essentially a continuous wave, an undulating series of "hills" These "hills" correspond to the nature and volume of the sound that has been recorded As the stylus of the record player moves along the wave it produces vibrations that are amplified and converted into sound A parallel can be drawn with radio transmissions, where the sound signals are transmitted in the form of invisible waves Early mobile phones worked in a similar way Older tape recorders and videocassette recorders are based on the same principle, except that the signals representing the sound and moving images are imprinted onto a plastic tape coated with a magnetic powder All analogue recordings suffer from background noise, and the quality of reproduction gradually degrades as the record or tape wears out If the recording is copied, the copy will not be as good as the original, regardless of the quality of the equipment used to copy it See the contrasting term Digital

Trang 35

Anchor: A term used in connection with HTML, the coding system used for creating Web pages

An anchor is the target of a Hyperlink, i.e a point in a Web document to which you jump when you click on a hyperlink

Animation: The display of a sequence of images in a computer program or on a Web page to

give the impression of movement

ANSI: Abbreviation for American National Standards Institute This is a system that specifies

code numbers for all the characters that appear on a computer Keyboard, plus the extended

character set used in Microsoft Windows It includes all the ASCII codes plus many others Each character on the keyboard of a computer is assigned a unique ANSI code number, e.g A = ANSI

65 Characters that don't appear on the keyboard can be typed by holding down the Alt key, pressing a series of digits on the number pad, e.g ALT + 0233, and then releasing the Alt key

0233 is the ANSI code for é See also Unicode See Alt Key See Section 5, Module 1.3, headed

Anonymous FTP: An anonymous FTP is a convention whereby users are not required to identify

themselves with an account number, user name or password when they access a website from which they wish to download publicly available programs or files Users may, however, be required to enter their email address before accessing certain websites The vast majority of publicly available Freeware and Shareware archives on the Web permit anonymous FTP See

Anorak: A colloquial term that is often used to describe someone who is fascinated by the

technology of computers but not particularly interested in their applications A synonym is

different connotations

Anti-virus Software: See Virus

Apache: The most popular Web Server software on the World Wide Web Apache runs mainly

on Unix systems, although there is also a Microsoft Windows version The Apache Project website is at http://www.apache.org

API: Abbreviation for Application Programming Interface API is a so-called protocol of

communication that enables different computer programs to communicate with one another A good API makes it easier to develop a program by providing all the building blocks that the programmer needs Although APIs are designed for programmers, they are also good for program users insofar as they guarantee that all programs using a common API will have similar interfaces This makes it easier for users to learn new programs

App: Abbreviation for Application

Applet: A small program written in the Java programming language and embedded in a Web

page When you use your Browser to access a Web page, an applet may run "inside" the Web page, as it were, to perform an interactive animation, make a calculation or carry out another simple task

Trang 36

Application: A computer program or a suite of computer programs that performs a particular

function for the user, such as a word-processor, e.g Microsoft Word, or a range of functions, such

as Microsoft Windows or Microsoft Office Commonly abbreviated to app, especially in the

context of Web 2.0 and Mobile Assisted Learning (MALL) apps See Computer Program,

Archive: Used to describe documents or files that are not immediately needed but which should

not be completely discarded An archive may be stored on an external Hard Disc , CD-ROM,

DVD orother Storage Device.Also used to describe stored messages that have beencontributed

to discussion lists or blogs Also used as a verb See Blog, Discussion List

Artificial Intelligence (AI): The ability of a computer to mimic human attributes in finding a

solution to a problem Artificial Intelligence techniques are applied in various ways in computer

applications in the language world, e.g in Machine Translation (MT) programs and in grammar and style checkers See Module 3.5, Human Language Technologies (HLT), especially Section 6,

headed Human Language Technologies and CALL, and Section 8 on Parser-based CALL See

ASCII: Abbreviation for American Standard Code for Information Interchange This is a system

that specifies code numbers for all the characters that appear on a computer Keyboard, plus other specialised characters Each character on the keyboard of a computer is assigned a unique ASCII code number, e.g A = ASCII 65 Characters that don't appear on the keyboard can be typed by

holding down the Alt key, pressing a series of digits on the number pad, e.g ALT + 130, and then releasing the Alt key 130 is the ASCII code for é The ANSI character set (as used in Microsoft

standard coding system See Unicode See Alt Key See Section 5, Module 1.3, headed Typing

ASF: Abbreviation for Advanced Streaming Format This is Microsoft's own file format that

stores both audio and video information and is specially designed to run over the Internet ASF

enables content to be delivered as a continuous stream of streaming audio or streaming video data.with little wait time before playback begins This means that you no longer have to wait for

your audio and video files to fully download before starting to view them See Streaming See

ASR: Abbreviation for Automatic Speech Recognition

Assistive Technology: This term describes computer software or devices used by people with

special needs to enable them to access the services provided by ICT, e.g computer programs,

screen readers for the unsighted or partially sighted, alternative keyboards and mice for people who have problems in hand-eye coordination, head-pointing devices, speech recognition software, and screen magnification software See Accessibility, PointingDevice, SENDA

Association of Language Testers in Europe (ALTE): An association of providers of foreign

language examinations: http://www.alte.org

Trang 37

Asynchronous: "Not at the same time" Often used to refer to communication by Email or via a

to be present at the same time and can respond at their own convenience A feature of

computers at the same time See Synchronous See Section 14, Module 1.5, headed Computer

Attachment: A term used in connection with Email An attachment can be a File of almost any

kind - a document file, an image file, a sound file or a video clip - that you can add, i.e attach, to

an email

Attribute: A term used by Web authors An attribute of an HTML tag controls how that tag

operates For example, in the HTML fragment <img src=" /images/home01.gif" alt="English

home page">, the required attribute src defines the image file to be displayed, and the optional

attribute alt defines the text to be displayed when the Mouse moves over the image Attributes can only exist within tags See HTML, Tag

Audio Card: See Sound Card

Audioconferencing or Audio Conferencing: A computer-based communications system that

allows a group of computer users at different locations to conduct a "virtual conference" in which the participants can hear one another as if they were in the same room participating in a real conference Unlike Videoconferencing, audioconferencing systems do not allow the participants

to see one another See Conferencing See Section 14.1.2, Module 1.5, headed

AUP: Abbreviation for Acceptable Use Policy

Authoring Package / Authoring Program / Authoring Tool: These terms describe free software packages that allow the teacher to develop interactive learning and teaching

content-materials without having to have a detailed knowledge of a computer Programming Language

These terms may also be applied to software packages used for creating Web pages, e.g Front

Page or Dreamweaver See Module 2.5, Introduction to CALL authoring programs See Module

site See Content-Free

Authorship Analysis Software: Authorship Analysis Software can help to identify authorship of

texts Such software has been used by literary and linguistic researchers for many years and is now widely used by security services in counter-terrorism activities

Automatic Speech Recognition (ASR): A branch of Human Language Technologies devoted to

the automatic processing of human speech See Speech Recognition See Section 4, Module 3.5,

headed Speech technologies

Avatar: A graphical representation of a real person, such as used in a MUVE or MMORPG, a

kind of "virtual world" Participants in a MUVE or MMORPG choose a name and a visual representation of the character that they wish to adopt as an inhabitant of the MUVE or player in the MMORPG See Section 14.2, Module 1.5, headed Chat rooms, MUDs, MOOs and MUVEs

Trang 38

AVI: Abbreviation for Audio Video Interleave (or Interleaved) A file format for storing video

recordings on a computer See ASF, MOV, MPEG, RM, which are alternative video file formats

Top

B

Backup or Back Up: Used as a verb, to back up means to copy a File or Folder from your

computer to another Storage Device, e.g a CD-ROM, as a precaution in case your Hard Drive

fails or is infected by a Virus.A backup, used as a noun, or abackup copy describes a copythat you have made in this way It is essential to back up new files and folders at regular intervals

Bandwidth: The amount of data that can be sent from one computer to another through a

particular connection in a certain amount of time, e.g via a computer to the Internet and vice versa The more bandwidth available, the faster you are able to access information Bandwidth is

usually measured in kilobits per second (Kbps) or megabits per second (Mbps) See ADSL,

Baud: A unit of measurement at which data can be transferred (i.e the baud rate), for example

over a telephone line via a Modem or from a computer to an external device such as a Printer Rarely used nowadays, as transfer transfer rates are normally expressed in kilobits per second (Kbbs) or megabits per second (Mbps)

BBS: Abbreviation for Bulletin Board System See Bulletin Board

BECTA: British Educational Communications and Technology Agency, formerly known as

NCET (National Council for Educational Technology), MESU (Microelectronics Education Support Unit) and the CET (Council for Educational Technology) BECTA is due to close down under the recently elected UK government (May 2010)

Binary: A number system using base 2 instead of the usual (human) base 10, which is normally

referred to as the decimal system Computers use base 2 because they can only recognise two values, 1 or 0 This is simulated electronically by using a device, such as a switch, which is either

on (1) or off (0) All numbers are represented by combinations of ones and zeroes, thus the number 9 is represented as 1001, the right-most column being the units column and the other columns, moving from right to left, being 2, 4, 8 See Hexadecimal

Binary File: Strictly speaking all computer files are Binary, consisting of a string of ones and

zeroes, but the term binary file is often used to differentiate program files and data files from text

Trang 39

BIOS: Acronym for Basic Input/Output System This is a built-in ROM Chip on the

loaded into memory during the boot process See Boot,ROM

Bit: Contraction of binary digit A bit is the smallest measurement unit of computer memory or

data transmission speed, e.g via a Modem See the entry on Measurement Units See Byte,

Bitmap: A computer graphic or image composed of thousands of individual dots or pixels , each

pixel being stored as a number The image is displayed by specifying the colour of each pixel Bit-mapped graphics can be imported into other applications, e.g a word-processor, but they cannot be edited within these applications When bit-mapped graphics are resized they usually

suffer a loss of sharpness, whereas vector graphics can be resized without such loss See BMP,

Blackboard: A commercial Virtual Learning Environment (VLE) package, i.e a software

package that integrates online communications software with content software enabling teachers

to create courses that are delivered partially or entirely via the Web Courses using Blackboard

might be mainly text-based, but can be enhanced with images, audio and video See:

October 2005

Blended Learning: This term normally refers to combining Internet-based distance learning

with face-to-face tuition but it may also be used to describe combining offline ICT-based materials with more traditional materials, such as books, audiocassettes and videocassettes See

Blog: Contraction of the term Weblog A blog is essentially a website that contains discrete

pieces of information posted by different users New items of information are usually entered by contributors via a simple form, following the introduction of each new theme by a person who initiates the blog, and then submitted to the site, where they may be filtered by an administrator before being posted A blog can contain news items, short essays, annotated links, documents, graphics, and multimedia These posts are usually in reverse chronological order and often take the form of a journal or diary A blog is normally accessible to any Internet user, but closed blogs may also be created, e.g to document the thoughts and experiences of a group of students or to provide a means of communication between teachers and students following a particular course

The word blog is also used as a verb, and Blogger is used as a noun to describe someone who blogs (see next entry) A blog is usually distinguished from an Internet Discussion List (also known as a Forum), but the latter can function in a similar way insofar as it typically allows any user to post messages to it that can be viewed via the Web See Moblog, RSS, Splog, Wiki See

website blog is at: http://ictforlanguageteachers.blogspot.com

Blogger: Normally used to refer to someone who blogs , i.e who regularly writes blogs Also

used to describe a service that provides Web-based tools used by individuals to create a Blog or

Trang 40

Bluetooth: Bluetooth is a technical industry standard for radio technology which facilitates the

transmission of signals over short distances (up to around 10 metres) between telephones, computers and other devices without the use of wires For example, a Bluetooth-enabled mobile phone can communicate with a Desktop Computer or Laptop Computer for the purpose of synchronising data, such as an appointments diary

BMP: Abbreviation for Bitmap , a file format for storing images This is the standard format

used, for example, by Windows Paint BMP image files occupy quite a lot of space compared to

other formats See EPS, GIF, JPEG/JPG, TIFF See also Section 2.2.3.1, Module 2.2, headed

Bookmark: A bookmark is a facility within a Browser that enables you to keep a record of Web

pages that you have visited and may wish to visit again Bookmarks are stored in a subdirectory

of the Windows directory on your computer In Internet Explorer bookmarks are known as

are stored Bookmarks are also used to mark positions in a Word document, i.e positions to

which you can jump from other points in the document by clicking on them with the Mouse

Boot: (verb) To start up a computer by loading the operating system into memory The computer

is regarded as bootstrapping itself into operation, i.e picking itself up by its own bootstraps The adjective bootable is often used to describe a backup disc that can be used to start a computer,

e.g when the hard disc fails or becomes corrupted for some reason See Operating System

Bot: Short for Robot See Crawler

bps: Abbreviation for bits per second, the smallest measurement of data transmission speed, e.g

via a Modem Computer people normally measure data transmission speeds in Kbps, meaning

(which is slow by today's standards) it means that your modem can transmit at speeds up to 56,000 bits of information per second See Bit, Kilobit, Megabit

Branching: The process of interrupting a sequence of instructions in a computer program in

order to go to a different point For example, in a CALL exercise the program might branch to one point if the learner is right but to another if the learner is wrong This is a technique that is also used frequently in adventure games, mazes and simulations See Adventure Game, Maze,

Broadband: A general term used to describe a high-speed connection to the Internet Connection

speed is usually measured in Kbps (kilobits per second) and Mbps (megabits per second) Typically, a home user will have a broadband connection using an ADSL telephone line running

at 2Mbps to 8Mbps Educational institutions ideally need a symmetric connection of at least 8Mbps to ensure smooth trouble-free connections to the Internet when large numbers of students are accessing the Internet all at once See ADSL, Bandwidth, ISDN, Kilobit, Leased Line,

Browser: A software package installed on the hard disc of your computer that enables you to

access and to navigate the World Wide Web - to "surf the Web" in colloquial terms See Section

Ngày đăng: 28/12/2021, 19:25

HÌNH ẢNH LIÊN QUAN

- Tính chất: Môn học này nhằm hình thành và phát triển các kỹ năng: nghe, nói, đọc, viết tiếng Anh chuyên ngành công nghệ thông tin giúp cho sinh  viên phát triển năng lực sử dụng tiếng Anh chuyên ngành để đáp ứng yêu cầu  đòi hỏi của thị trường lao động  - Giáo trình Tiếng Anh chuyên ngành (Ngành Kỹ thuật lắp ráp, sửa chữa máy tính)
nh chất: Môn học này nhằm hình thành và phát triển các kỹ năng: nghe, nói, đọc, viết tiếng Anh chuyên ngành công nghệ thông tin giúp cho sinh viên phát triển năng lực sử dụng tiếng Anh chuyên ngành để đáp ứng yêu cầu đòi hỏi của thị trường lao động (Trang 2)

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

🧩 Sản phẩm bạn có thể quan tâm

w