- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Input devices
- •Input Peripheral Output
- •Introduction
- •Improvement Reason
- •Introduction
- •Type them using a keyboard
- •Date passwd Is
- •36 Unit 6 Operating Systems
- •Introduction
- •Introduction
- •Instructions/complex instructions
- •46 Unit 8 Applications Programs
- •1 A museum
- •2 Publishers of a subscription-only magazine
- •54 Unit 10 Computing Support Officer
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •98 Unit 20 The ex-hacker
- •Introduction
- •In Computing
- •Introduction
- •108 Unit 22 People in Computing
- •Introduction
- •Introduction
- •Introduction
- •Interview: Former Student
- •I How up to date did you feel the course was?
- •I That question really relates to my next one. Is there anything that you would add to or take away from the course?
- •Very bottom. You see that little status
- •Is that right? с Yes.
- •Interview: Webpage Creator
- •In touch if there's any further
- •Interview: The ex-hacker
- •Interviewer Ralph was one of two 18-year-olds arrested in the 1990s for hacking into a large American
- •I So you're sitting in front of your computer...Somewhere, how do you set about getting into someone else's system?
- •I How can you avoid being hacked into?
- •I Did you feel terribly excited?
- •I How did they track you down?
- •I Now you're helping companies to avoid people like you.
- •I Do you hackers know each other? Is there a competitive element to all this? Is there a kind of rivalry?
- •I Movies sometimes feature hackers.
- •I a recent survey found that four out of ten uk consumers are reluctant to use credit cards for Internet purchases. How risky is it really?
- •5 Keen reader
- •Information Technology
5 Keen reader
I've tried it, it's not complicated. I paid a dollar for the first chapter of Stephen King's book and another dollar because I wanted to read the next chapter. But then I thought...there's the time on the Internet trying to get to the site, there's time taken to download it and all that time I'm paying just for being on the Internet. Then there's the printing costs because I don't like reading off a computer screen. It's not cheap. And besides I like the look and the feel of books and the fact that you can take them anywhere and who's going to steal a paperback?
And another thing. Paper lasts from 50 to 500 years. Most electronic storage media are obsolete in ten to twenty years. Magnetic tape stretches, CDs delaminate. Printed books are still the best way to preserve knowledge.
Key to Progress Tests
KEY UNITS 1-5
Taskl
-
3.5"floppy drive
-
keyboard
-
clock
-
processor
-
ROM
-
monitor
-
cache
-
RAM
Task 2
-
The computer is turned off and the case (is) opened.
-
The new motherboard is checked to ensure it fits the system case.
-
Wires and cables are disconnected and (are) labelled with tape.
-
All external peripherals are unplugged.
-
The add-in cards are taken out.
-
The screws holding the motherboard are removed.
-
The motherboard is lifted carefully from the case.
-
The CPU and memory are added to the new motherboard.
-
The new motherboard is inserted.
-
The screws are replaced.
-
Cards and cables are replaced.
-
The computer and monitor are switched on.
Task3
Not only is computing equipment getting smaller, it is getting more sophisticated. Computers are part of many machines and devices that once required continual human supervision and control. Today, computers in security systems result in safer environments, computers in cars improve energy efficiency, and computers in phones provide features such as call forwarding, call monitoring, and call answering.
Multimedia systems are known for their educational and entertainment value - which we call edutainment. Multimedia combines text with sound, video, animation, and graphics, which greatly enhances the interaction between user and machine and can make information more interesting and appealing to people. Expert systems software enables computers to'think'like experts. Medical diagnosis expert systems, for
example,car\ help doctors pinpoint a patient's illness, suggest further tests, and prescribe appropriate drugs.
KEY UNITS 6-10
Taskl |
|
1 |
checking |
2 |
to type |
3 |
to changing |
4 |
work |
5 |
to hack into |
6 |
phoning |
7 |
to scroll |
8 |
paying |
9 |
to learn |
10 |
switching off |
Task 2 |
1 After entering the selection criteria, click on the Find button.
OR After you enter the selection criteria, click on the Find button.
OR Before clicking on the Find button, enter the selection criteria.
OR Before you click on the Find button, enter the selection criteria.
OR Enter the selection criteria; then click on the Find button.
-
Each MP3 file has a tag which permits extra information to be stored.
-
If you forget to save regularly, you risk losing data.
-
Start the search by clicking on the Find button.
-
The user is aware of the effects of different applications programs but/;however, operating systems are invisible to most users.
-
Each side of a DVD has two layers, giving enormous storage capacity.
OR Each side of a DVD has two layers which gives enormous storage capacity.
-
The supervisor program remains in memory, therefore it is referred to as resident.
-
DVD drives read DVD disks (by) using blue laser light.
-
Input and output operations are invoked by applications programs but/although/;however, they are carried out by the operating system.
-
If you use a simple password, a hacker may guess it easily.
Task3
MP3 is a set of standards for compressing and storing digital audio and video. Whereas CDs and WAV files require about 11 MB for one minute of sound, MP3 files give you the same sound quality in a format which requires only about 1MB for each minute so a single track takes only three to five megabytes.
Computers store sound as digital information.They do this by sampling - taking a sample of the sound thousands of times per second. CDs store information in a format called CD-DA.This samples 44,000 times per second and is broadly similar to WAV.
MP3 files depend on the fact that our brains do not detect all sounds. An MP3 encoder removes from a WAV file all but the parts we don't hear. Sounds above 16kHz are inaudible for most people so these can be removed. Quieter sounds masked by loud sounds of a similar frequency are also removed.The result is an MP3 file which is much smaller than the WAV original.
KEY UNITS 11-15
Taskl
-
Avoid leaving the email subject line blank.
-
Never send very large attachments without asking the recipient's permission.
-
You must not use the same password all the time.
-
Don't use capital letters; it's considered shouting.
-
Before joining a new online group, you should observe for a while.
-
It's a good idea to check out the FAQ page before you ask questions.
-
Never email any information you want to keep secure.
-
You had better not leave a running machine unattended.
-
I recommend you delete flames. Don't start a flame war.
-
You should not borrow from someone's website without asking permission.
Task 2
1 Telnet is an Internet service enabling users to log on to their computers at a distance.
-
FTP is an Internet service used to download files from a server.
-
IRC is an Internet service allowing users to chat in real time.
-
The Web is an Internet service making webpages available to millions of users worldwide.
-
The Internet is a huge number of computers linked together.
-
A LAN is usually a network connecting computers over a small distance such as within a company.
-
CMC is communication using computers.
-
A search engine is an Internet search tool consisting of databases of information that can be searched using keywords or phrases.
-
Subject directories are hierarchically organised indexes categorised into subject areas.
-
A gateway is a collection of hardware and software enabling a network to communicate with a dissimilar network.
Task3
No search engine covers the entire Web.The scale is too enormous. Meta search tools may cover forty per cent at best. When you use a search engine, you are searching a database. Keyword search engines build their own database of search items.They depend on search robots which browse the Web stopping at each site to find keywords to add to their indexes. Most of them index every word they find in a document. These search engines can produce a huge number of hits for any keyword you enter but many may have no relevance to your search.
Because search engines can only find Web pages that are linked to other websites or Usenet news articles, they cannot find sites which stand alone. In addition, they cannot evaluate in any way the material they find.The result can be that you have a large amount of irrelevant and inappropriate hits and may miss the most helpful site.
Searching for phrases or a combination of key words is more effective than searching for single words. Most search engines offer advanced search facilities which can be used to combine and exclude words and phrases from your search.
KEY UNITS 16-20
Taskl
-
to find/find
-
getting
-
to locate
-
orbiting
-
built
-
to calculate
-
using
-
used
-
to be broadcast
-
flash
Task 2
-
It is possible GPRS phones will revolutionise the way we communicate.
-
GPRS phones will certainly provide faster Web access.
-
It is probable networks will support GPRS phones efficiently.
-
The next generation of mobile phones could be introduced next year.
-
The new phones might be a big disappointment.
Task3
-
Ensure the PC is disconnected before you remove the case.
-
You can widen the picture on your monitor.
-
Hackers shut down Hotmail for five hours.
-
Although it is not recommended, most people write down their passwords.
-
A gateway enables different kinds of networks to communicate.
Task 4
Your computer could be infected by many different viruses.There are probably more than 30,000 in existence but only about 200 to 300 are present in sufficient numbers to be a threat to your PC. We can divide viruses into a small number of basic types. Boot sector viruses infect a computer when you boot it. File viruses infect executable files and the system when the files are mn.These are less common now that PCs mainly run Windows.
The most common viruses now work in the Windows environment and are spread using
networks, including the Internet. Most are macro-viruses. Melissa is an example. Melissa spread using email. It operated by using the Visual Basic for Applications (VBA) macrolanguage to automate the Microsoft Outlook mail client to send itself to the first fifty addresses in the Outlook address book. In this way it infected millions of computers in a few days.
A worm is not a virus but it is a malicious program. It infiltrates your system's network software and from there infects other systems.
KEY UNITS 21-25
Taskl
-
You must be able to provide leadership to junior team members.
-
Excellent communication skills are essential.
-
You have to be able to manage a team.
-
You need to have/possess a positive and flexible attitude.
-
You must have/possess good resource planning skills.
Task 2
-
Laser light can travel faster than an electric current.
-
In future, domestic appliances will be able to report any breakdowns for repair.
-
Marconi was able to send a radio signal across the Atlantic.
-
Professor Warwick had a chip fitted into his arm which could open doors and switch on computers as he approached.
-
Imagine being able to access the Internet from a kitchen appliance.
Task3
1 It was the Intel Pentium that was introduced in 1993.
OR What was introduced in 1993 was the Intel Pentium.
-
It was in 2001 that Microsoft launched Windows XP.
-
It was the Wap phone that was the first mobile phone to make Internet access possible.
-
It was Gordon Moore that Moore's Law is named after.
OR It was Gordon Moore after whom Moore's Law is named.
Key to Progress Tests 133
5 What we need is an alternative to silicon.
OR It is an alternative to silicon that we need.
6 It was the GPRS phone that became available in 2001.
OR What became available in 2001 was the GPRS phone.
7 It is laser light that can switch faster than electric current.
OR What can switch faster than electric current is laser light,
-
What Intel did in 1971 was design the first microprocessor.
-
What Wap phone users didn't like was waiting for Internet access.
OR It was waiting for Internet access that Wap phone users didn't like.
10 What I don't like is electronic books.
OR It is electronic books that I don't like.
Task 4
A chip is basically millions of switches on a tiny piece of silicon. Each switch is a transistor. Gordon Moore, the co-founder of Intel, was the first person to predict that the number of transistors on a standard size of silicon would double every eighteen months.This prediction became known
as Moore's Law. It's not a law of physics but developments have shown it to be broadly true. With the number of transistors on a chip now approaching fifty million, even the most optimistic processor designers are beginning to realise that limits will soon be reached.
The problem is that there is a natural limit on the number of transistors which can be squeezed onto a chip before it melts or the operation of the transistors becomes unpredictable. By the 2010s, chip designers expect that processors will be built with 0.07 micron technology.That means the distance between circuits will be a 700,000th of a millimetre.To reach even that stage will cost billions of dollars.
So designers have to look at alternatives to silicon. Optical computing works on the principle that laser light is faster than an electric current. Quantum computers would permit a kind of mega-parallel computing. Computers which use superconductivity are another possibility. Finegrained multiprocessing which consists of thousands of simple processors working together, may be a cheaper alternative. Even biological computing using DNA molecules is being considered.
Progress test - Units 1 to 5
1 Identify these items.
-
It's used for reading and writing to removable magnetic disks.
-
It's used to input data through keys like a typewriter.
-
Its function is to control the timing of signals in the computer.
A It's used to control all the operations in a computer.
-
It's for holding instructions which are needed to start up the computer.
-
It displays the output from a computer on a screen.
-
It's a kind of memory which provides extremely fast access for sections of a program and its data.
-
Its function is to hold data read or written to it by the processor.
2 Convert these instructions for fitting a new motherboard into a description in the Present passive.
Example:
Access the PCs system start-up program and note the hard disk's parameters.
The PC's system start-up program is accessed and the hard disk's parameters are noted.
-
Turn off the computer and open the case.
-
Check the new motherboard to ensure it fits the system case.
-
Disconnect wires and cables and label them with tape.
-
Unplug all external peripherals.
-
Take out the add-in cards.
-
Remove the screws holding the motherboard.
-
Lift the motherboard carefully from the case.
-
Add the CPU and memory to the new motherboard.
9 Insert the new motherboard. 10 Replace the screws.
-
Replace cards and cables.
-
Switch on the computer and monitor.
3 Complete each gap in this text with a suitable word from this list.
a |
efficiency |
expert |
more |
and |
enables |
features |
multimedia |
computers |
enhances |
getting |
security |
devices |
environments |
human |
systems |
educational |
example |
machine |
video |
|
Not only is computing equipment 1
smaller, it is getting more sophisticated.
2 are part of many machines and
3 that once required continual
4 supervision and control. Today,
computers in 5 systems result in
safer 6, computers in cars improve
energy 7, and computers in phones
provide 8 such as call forwarding, call
monitoring, and call answering.
Multimedia 9 are known for their
10 and entertainment value - which
we call edutainment 11 combines
text with sound, 12, animation, and
graphics, which greatly 13 the
interaction between user and 14 and
can make information 15 interesting
and appealing to people 16 systems
software 17 computers to 'think' like
experts. Medical diagnosis expert systems, for
18, can help doctors pinpoint
19 patient's illness, suggest further
tests, 20 prescribe appropriate drugs.
Progress test - Units 6 to 10
1 Complete these sentences with the correct form of the verb in brackets.
-
Don't switch on without (check) the A drive for a floppy.
-
The Caps Lock key allows you (type) all in capitals.
-
You'll have to get used (change) your password each month.
-
Changing the motherboard lets your computer (work) faster.
-
They tried (hack into) the Pentagon's computers.
-
You can get advice by (phone) their helpline.
-
The mouse wheel enables you (scroll) up and down the document.
-
He objected to (pay) for long-distance calls to use the Internet.
9 I want (learn) how to program in XML. 10 Before (switch off), make sure you have
saved your work.
2 Link these pairs in the most appropriate way.
-
Enter the selection criteria. Click on the Find button.
-
Each MP3 file has a tag.
This permits extra information to be stored.
-
You forget to save regularly. You risk losing data.
-
Start the search.
Click on the Find button.
-
The user is aware of the effects of different application programs. Operating systems are invisible to most users.
-
Each side of a DVD has two layers. This gives enormous storage capacity.
-
The supervisor program remains in memory.
It is referred to as resident.
8 DVD drives read DVD disks. They use blue laser light.
9 Input and output operations are invoked by applications programs. They are carried out by the operating system.
10 You use a simple password. A hacker may guess it easily.
3 Complete each gap in this text with a suitable word from this list.
brains |
format |
minute |
second |
CDs |
frequency |
MP3 |
smaller |
compressing |
hear |
per |
sound |
digital |
inaudible |
removed |
sounds |
file |
megabytes |
sampling |
WAV |
|
MP3 is a set of standards for 1 and
storing 2 audio and video. Whereas
CDs and 3 files require about 11MB
for one minute of sound, 4 files give
you the same 5 quality in a
6 which requires only about 1MB for
each 7 so a single track takes only
three to five 8.
Computers store sound as digital
information. They do this by ....9 -
taking a sample of the sound thousands of
times 10 second 11 store
information in a format called CD-DA. This
samples 44,ooo times per 12 and is
broadly similar to WAV.
MP3 files depend on the fact that our
13 do not detect all 14. An
MP3 encoder removes from a WAV 15
all but the parts we don't 16. Sounds
above 16kHz are 17 for most people
so these can be 18. Quieter sounds
masked by loud sounds of a similar
19 are also removed. The result is an
MP3 file which is much 20 than the
WAV original.
Progress test - Units 11 to 15
1 Rewrite these warnings and pieces of advice on netiquette according to the prompt.
-
Don't leave the email subject line blank. Avoid...
-
You must not send very large attachments without asking the recipient's permission. Never...
-
Don't use the same password all the time. ...must not...
-
Avoid using capital letters; it's considered shouting. Don't...
-
Before joining a new online group, observe for a while. ...should...
-
Check out the FAQ page before you ask questions. ...good idea...
-
You must not email any information you want to keep secure. Never...
-
Don't leave a running machine unattended. ...had better not...
-
Delete flames. Don't start a flame war. ...recommend...
10 Don't borrow from someone's website without asking permission. ...should not...
2 Complete these definitions with the correct participle of the verb given in brackets.
-
Telnet is an Internet service (enable) users to log on to their computers at a distance.
-
FTP is an Internet service (use) to download files from a server.
-
IRC is an Internet service (allow) users to chat in real time.
-
The Web is an Internet service (make) webpages available to millions of users worldwide.
-
The Internet is a huge number of computers (link) together.
-
A LAN is usually a network (connect) computers over a small distance such as within a company.
-
ШС is communication (use) computers.
-
A search engine is an Internet search tool (consist of) databases of information that can be searched using keywords or phrases.
9 Subject directories are hierarchically organised indexes (categorise) into subject areas.
10 A gateway is a collection of hardware and software (enable) a network to communicate with a dissimilar network.
3 Complete each gap in this text with a suitable word from this list.
best |
engine |
keywords |
search |
browse |
entire |
linked |
single |
cannot |
exclude |
miss |
sites |
combination |
hits |
news |
Web |
database |
index |
on |
which |
|
No search engine covers the 1 Web.
The scale is too enormous. Meta search tools
may cover forty per cent at 2. When
you use a search 3, you are searching
a database. Keyword search engines build their
own 4 of search items. They depend
5 search robots which 6 the
Web, stopping at each site to find 7 to
add to their indexes. Most of them 8
every word they find in a document. These
9 engines can produce a huge number
of 10 for any keyword you enter but
many may have no relevance to your search.
Because search engines can only find
11 pages that are 12 to
other websites or Usenet 13 articles,
they cannot find 14 which stand
alone. In addition, they 15 evaluate in
any way the material they find. The result can be that you have a large amount of irrelevant
and inappropriate hits and may 16 the
most helpful site.
Searching for phrases or a 17 of
key words is more effective than searching for
18 words. Most search engines offer
advanced search facilities 19 can be
used to combine and 20 words and
phrases from your search.
Progress test - Units 16 to 20
1 Put the verbs in brackets in the correct form in this description of GPS
GPS helps drivers 1 (find) the
quickest route and prevents walkers
2 (get) lost. It allows mapmakers
3 (locate) a feature exactly. GPS is
made up of satellites 4 (orbit) the
earth combined with mapping software
5 (build) into receivers. The receivers
pick up signals from at least three satellites
and use that information 6 (calculate)
their exact position. To prevent terrorists
7 (use) the system for missile control,
the US Defense Department 8 (use)
to build in some error but this is no longer done. GPS is the basis for car navigation systems. If the driver goes off route, the
system causes warnings 9
(broadcast) in the car or makes a light 10 (flash) on and off.
2 Rewrite each of these statements using the certainty expression in brackets to produce a statement of similar meaning.
-
GPRS phones may revolutionise the way we communicate, (possible)
-
It is certain GPRS phones will provide faster Web access, (certainly)
-
Networks will probably support GPRS phones efficiently, (probable)
-
It is possible the next generation of mobile phones will be introduced next year, (could)
-
The new phones could be a big disappointment, (might)
3 Rewrite each of these statements by replacing the words in italics with ел-/-ел or phrasal verbs of a similar meaning.
-
Make sure the PC is disconnected before you remove the case.
-
You can make the picture on your monitor wider.
-
Hackers closed Hotmail for five hours.
-
Although it is not recommended, most people record their passwords.
-
A gateway makes it possible for different kinds of networks to communicate.
4 Complete each gap in this text with a suitable word from this list.
about |
divide |
|
software |
addresses |
environment |
malicious |
spread |
boot |
executable |
more |
types |
common |
infected |
networks |
using |
computers |
macrolanguage |
run |
virus |
|
Your computer could be 1 by many
different viruses. There are probably
2 than 30,000 in existence but only
3 200 to 300 are present in sufficient
numbers to be a threat to your PC. We can
4 viruses into a small number of basic
5. Boot sector viruses infect a
computer when you 6 it. File viruses
infect 7 files and the system when the
files are 8. These are less 9
now that PCs mainly run Windows.
The most common viruses now work in the Windows 10 and are spread using
119 including the Internet. Most are
macro-viruses. Melissa is an example. Melissa
12 using email. It operated by
13 the Visual Basic for Applications
(VBA) 14 to automate the Microsoft
Outlook 15 client to send itself to the
first fifty 16 in the Outlook address
book. In this way it infected millions of
17 in a few days.
A worm is not a 18 but it is a
19 program. It infiltrates your
system's network 20 and from there
infects other systems.
Progress test - Units 21 to 25
1 Make each of these essential specifications for an IT Team Leader into a sentence using the words given in brackets.
-
Ability to provide leadership to junior team members, (must)
-
Excellent communication skills, (essential)
-
Ability to manage a team, (have to)
-
Positive and flexible attitude, (need to)
-
Good resource planning skills, (must)
2 Fill in the blanks with the correct form of can or be able to, whichever is correct.
1 Laser light travel faster than an
electric current
2 In future, domestic appliances
report any breakdowns for repair.
3 Marconi send a radio signal
across the Atlantic.
4 Professor Warwick had a chip fitted into his
arm which open doors and switch
on computers as he approached.
5 Imagine to access the Internet
from a kitchen appliance.
3 Rewrite these sentences to emphasise the words in italics.
-
The Intel Pentium was introduced in 1993.
-
Microsoft launched Windows XP In 2001.
-
The Wap phone was the first mobile phone to make Internet access possible.
-
Moore's Law is named after Gordon Moore.
-
We need an alternative to silicon.
-
The GPRS phone became available in 2001.
-
Laser light can switch faster than electric current.
-
Intel designed the first microprocessor in 1971.
-
Wap phone users didn't like waiting for Internet access.
10 I don't like electronic books.
4 Complete each gap in this text with a suitable word from this list.
alternatives |
chip |
limit |
prediction |
before |
computing |
number |
principle |
between |
current |
person |
soon |
but |
designers |
piece |
switch |
cheaper |
even |
possibility |
would |
|
A chip is basically millions of switches on a tiny
1 of silicon. Each 2 is a
transistor. Gordon Moore, the co-founder of
Intel, was the first 3 to predict that
the 4 of transistors on a standard size
of silicon 5 double every eighteen
months. This 6 became known as
Moore's Law. It's not a law of physics
7 developments have shown it to be
broadly true. With the number of transistors on
a 8 now approaching fifty million,
9 the most optimistic processor
designers are beginning to realise that limits will 10 be reached.
The problem is that there is a natural
11 on the number of transistors which
can be squeezed onto a chip 12 it
melts or the operation of the transistors becomes unpredictable. By the 2010s, chip
13 expect that processors will be built
with 0.07 micron technology. That means the
distance 14 circuits will be a
700,000th of a millimetre. To reach even that stage will cost billions of dollars.
So designers have to look at 15 to
silicon. Optical computing works on the
16 that laser light is faster than an
electric 17. Quantum computers
would permit a kind of mega-parallel
18. Computers which use
superconductivity are another 19.
Fine-grained multiprocessing, which consists of thousands of simple processors working
together, may be a 20 alternative.
Even biological computing using DNA molecules is being considered.
© Oxford University Press PHOTOCOPIABLE
Oxford English for