Čizmić - WEB - Tehnički Engleski - IT - 2015 PDF
Čizmić - WEB - Tehnički Engleski - IT - 2015 PDF
Split, 2015
1
TABLE OF CONTENTS
Course details..3
Part I – Course Book units
Unit 1: What is ICT?8
Unit 2: ICT in the workplace.……………11
Unit 3: Introduction to ICT systems...13
Unit 4: ICT in education...……15
Unit 5: The history of ICT……………………………………………………………………17
Unit 6: The Internet…………………………………………………………………………...23
Additional: The Web………………………………………………………………………….29
Unit 7: Software development………………………………………………………………..33
Unit 8: Efficiency in computer systems………………………………………………………35
Unit 9: Human-computer interaction (HCI)…………………………………………………..37
Unit 10: E-commerce and e-government……………………………………………………..38
Unit 11: Computing and ethics……………………………………………………………….40
Additional: Cybercrime………………………………………………………………………42
Unit 12: ICT in the future…………………………………………………………………….48
Additional: New technologies………………………………………………………………..48
Additional: Nanotechnology………………………………………………………………….50
Additional: Web design………………………………………………………………………56
Additional: Program design and computer languages………………………………………..62
Additional: Jobs in ICT……………………………………………………………………….64
Additional: Communication systems………………………………………………………....74
Additional: Networks………………………………………………………………………....77
Additional: Robotics………………………………………………………………………….83
References…………………………………………………………………………………….88
2
COURSE DETAILS
define basic concepts from the areas of information technology e.g. ICT systems, ICT in
education, History of ICT, The Internet, Programming and programming languages,
Robotics, Computing and ethnics, Social networks etc. (knowledge)
describe pros and cons of social networks, main types of cybercrime, main features of
security on the Internet (understanding)
understand and use of grammar structures: collocations, Noun compounds and Noun
phrases, Multiword verbs, Prefixes, Suffixes, Synonyms and word-building, Passives,
Learning outcomes Phrasal verbs (usage)
prepare and give an individual presentation on a chosen topic; prepare and give a group
presentation on one of the given topics: Designing an online store, Designing a robot,
Designing an intelligent house, Airport security system. (synthesis)
Type of
Week Hours Topic
course
Introductory lesson; What is ICT? – defining ICT,
2 Lectures
introduction to different aspects of ICT ; Computer quiz
1 What is inside a PC system?
2 Lectures
Language work: Collocations, Suffixes.
ICT in the workplace – impact of ICT on business, the
2 Lectures
nature of work including teleworking and outsourcing.
Course content Introduction to ICT systems.
2
2 Lectures
Listening:embedded and general purpose systems,
data storage and management.
Display screens and ergonomics; Grammar: active and
passive sentences.
2 Lectures
3 Portfolio 1 – listening: Speech recognition systems.
Devices for the disabled. Computer jargon.
2 Lectures
3
Abbreviations and acronyms.
2 Lectures ICT in education. Computer-assisted learning (CAL).
The history of ICT (1) – introduction. Synonyms and
4 antonyms.
2 Lectures
Portfolio 2 – reading: Speech generating devices.
The history of ICT (2) – key stages in the development
2 Lectures of the computer, development of computer
components.
5 Overall revision. Video:A brief history of computing –
writing notes.
2 Lectures
Portfolio 3 – listening: E-commerce and online banking.
Vocabulary – opposites, describing a graph, crossword
5A.
4
Students' presentations.
Human-computer interaction (HCI) – aspects of human
sciences and computer sciences, different types of
2 Lectures interface.
12 Students' presentations.
Revision – crossword 9A. Networks. Phrasal verbs.
2 Lectures
Students' presentations.
E-commerce and e-government – types of e-
commerce.
2 Lectures
Students' presentations.
Computing and ethics – laws and regulations including
13 copyright.
Students' presentations.
Social networks – good or evil. The role of hacking.
2 Lectures
14 Phrases used to link ideas.
ICT in the future – virtual and mirror worlds.
2 Lectures
Augmented reality.
Lifelogging – using technological growth curves to
2 Lectures
15 predict future development. Revision.
2 Lectures Progress Test 2
☒lectures
☒individual work
☐seminars and workshops
☒ multimedia
☐practical work
Teaching types: ☐ laboratory work
☐on linecourse (100%)
☐ mentorship
☒ mixed e-learning
☐exercises
☐on-siteteaching
at least 70% attendance for full-time students and 50% for part-time students is
Students' required.
obligations: self-study, individual work (portfolio assignments, presentations)
2 0,2
Class attendance Research Practicals
ECTS ECTS
Experimental
Assignment Exercises
Continuous work
assessment: 0,2
Essay Seminar Self-study 0,6 ECTS
ECTS
0,2 Office hours and
Mid-term exams Oral exam 0,3 ECTS
ECTS final exam
5
0,2 Portfolio
Writing exam Project 0,3 ECTS
ECTS assignments
CONTINUOUS ASSESSMENT
Performance Grade ratio
Continuous testing indicators
Ai (%) ki (%)
Class attendance and participation 70 - 100 10
Oral assignments 50 - 100 20
Portfolio 0-100 20
First mid-term exam 50-100 25
Second mid-term exam 50-100 25
Students who haven't passed mid-term exams are obliged to take a final exam consisting of
portfolio assignments and theory.
FINAL ASSESSMENT
Final grade (in %) is formed based on all indicators that describe the level of students'
activities according to the equation:
N
Ocjena (%) ki Ai
i 1
6
62,5% - 74,9% average performance with some errors good (3)
75% - 87,4% above average performance with minor very good (4)
errors
87,5% - 100% outstanding performance outstanding (5)
Number of
Available in other
Required reading Title samples in
media
(available in the the library
library and other Fitzgerald, P., McCullagh, M., Tabor, C. (2011)
media) English for ICT Studies in Higher Education Studies.
Reading: Garnet Publishing Ltd.
1. Čizmić, Ivana (2015) Technical English for ICT Studies - skripta, elektronsko
izdanje (MOODLE), Sveučilišni studijski odjel za stručne studije, Split.
2. Murphy, R. (2004) English Grammar in Use, Cambridge University Press.
Recommended 3. Hornby, A. S. (2007) Oxford Advanced Learner's Dictionary, OUP. Oxford.
reading 4. Esteras, S. R. (2008) Infotech – English for computer users. Cambridge: CUP.
5. Pyne, S., Tuck, A. (ur.) (1996). Oxford Dictionary of Computing for Learners of
English. Oxford: Oxford University Press.
6. Kiš, M. (2002) Englesko-hrvatski, hrvatsko-engleski informatički rječnik. Zagreb:
Naklada Ljevak.
7
PART I – Course Book units
ICT stands for Information and Communication Technologies. ICT refers to technologies that
provide access to information through telecommunications. It is similar to Information
Technology (IT), but focuses primarily on communication technologies. This includes the
Internet, wireless networks, cell phones, and other communication media.
In the past few decades, information and communication technologies have provided society
with a vast array of new communication capabilities. For example, people can communicate
in real-time with others in different countries using technologies such as instant messaging,
voice over IP (VoIP), and video-conferencing. Social networking websites like Facebook
allow users from all over the world to remain in contact and communicate on a regular basis.
At home:
computer games
digital TV
burglar alarms
8
In education:
educational software
distance learning
interactive whiteboards
teleworking/teleconferencing
specialized software
intranet
9
In hospitals:
robot surgery
http://techterms.com/definition/ict
10
Unit 2: ICT in the workplace
Regarding the roles of ICT in business, the following uses could be mentioned:
communication, storage of information, manufacturing, design of new products and assisting
with tracking sales. Furthermore, ICT has had an immense impact on work including the need
for new work skills and the rise of teleworking and outsourcing.
Teleworking – the use of home computers, telephones, etc, to enable a person to work from
home while maintaining contact with colleagues, customers, or a central office. Also called:
telecommuting.
Reading
strategies
Skimming – passing over a text quickly to get the main idea of it. Reading strategies used:
Scanning – reading quickly to find a specific piece of information (eg. finding a specific
name, date, statistic, fact)
11
Intensive reading– reading for detail, last stage in the process of reading.
previewing
predicting
guessing from context
paraphrasing
Exercise. Read the following topic sentences and try to predict what each paragraph is
about.
12
Unit 3: Introduction to ICT systems
in the street, e.g. automated teller machines (ATMs), traffic control systems
at universities, e.g. self-study centres, interactive whiteboards
at home, e.g. TVs, DVD players, burglar alarms
in shops, e.g. EPOS systems
at work, e.g. PCs, telephones, Internet
Benefits of ICT:
saves time
is convenient
provides more ways for people to enjoy their leisure time
saves money
Prefixes. Study the words in the box. Find the prefix and try to work out the meaning in
each case.
Model answers:
13
Extending skills - Listening
ICT systems
general
embedded
purpose
systems
systems
There are basically two types of ICT systems: embedded and general purpose. An
embedded system is one which is fixed inside the device that it controls. They can be found
in all sorts of everyday devices, from the automated teller machine outside the bank, to the
washing machine and the car. They are special-purpose systems that are pre-programmed to
perform specific tasks. There is a big advantage to these embedded systems. They are
relatively inexpensive to produce because they are designed to perform a limited set of tasks.
In other words, they can only do one task or set of tasks.
General purpose systems can be set up to perform different tasks. They include
supercomputers, mainframe computers and microcomputers. They can be used for a whole
range of things. Users can extend the range in a number of ways. They can reprogram them,
upgrade them, add on new hardware or install new software to increase the capabilities of the
system.
14
Unit 4: ICT in education
There are two aspects of the use of computers in education: their use in research and their use
in learning e.g. in computer-assisted learning (CAL).
There are many abbreviations and acronyms in computing. Acronyms can be pronounced as
words, e.g. RAM, CAL, ROM, WIMP whereas abbreviations are pronounced as separate
letters such as HTTP, ISP, URL, USB, WWW.
Discussion points.
15
learning
administration
resources
VLE
assessment communication
16
Unit 5: The history of ICT
Mechanical computing
Computers in WW2
Electronic computing
17
Mechanical computing:
The Pascaline
The same principle is still used today in electricity and gas meters
By the early 19th ct, more and more calculation was required to conduct government,
commerce and engineering efficiently. Logarithmic tables, which allowed large
numbers to be multiplied and divided using addition and subtraction, were
increasingly used to speed up calculations.
Charles Babbage, an English mathematician and philosopher, discovered many errors
in existing tables and felt that the calculations should be carried out by machine for
greater accuracy. He was given money by the British government to design such a
machine.
The design for this machine, the Difference Engine, was very complex and the
engineers making the parts were unable to manufacture them with enough precision to
make it work. In addition, the government refused to continue providing the funds to
allow him to overcome these barriers and as a result, his Difference Engine was never
fully built as he designed it.
18
Babbage’s Difference Engine (1833)
Babbage has been credited with inventing the first machine recognized as a modern
computer, and so he is called the father of the computer.
He also designed an Analytical Engine, a type of mechanical computer which would
use punched cards to input programs to the machine and which would be powered by
steam. It was also never built. Despite that, it had programs written for it by a woman
called Ada Lovelace, recognized as the world’s first programmer and honoured by
having a programming language, Ada, named after her in 1983.
19
Babbage was also a cryptographer who worked for the British government. He broke
or decoded a number of codes which had been considered unbreakable up until then,
giving the British government considerable advantages in diplomacy and war.
By the end of the 19th ct, many of these principles were still being used in the
tabulating machine which used punched cards to process data from the US Census
In 1801 – Joseph-Marie Jacquard developed a weaving machine or loom – controlled
by a set of cards with holes in them – these cards introduced the principle of
programmability
Punched cards were used for more than 150 years
Computers in WW2:
Alan Turing, an English scientist and mathematician, who devised a machine which
could break German codes so that the English could read German military messages,
the machine known as Colossus was built using electronic valves and relays in order
to perform calculations and to store some of the data while it was being processed.
It was the 1st computer to do so and because of this, it is regarded as the first electronic
computer. Punched tape was used to input data and was a very fast way of doing so.
Once the 1st Colossus proved successful, a number of others followed, and by the end
of the war, 10 were in operation.
By modern standards, Colossus machines were very large and slow, but by allowing
the British to read German military communications, the impact which they had on the
war was enormous.
20
Alan Turing’s Colossus (1943)
Electronic computing:
After WW2 – power of computing was turned towards business and administrative
problems
UNIVAC – 1st American commercial computer, 1st computer to be specifically
designed for business rather than scientific purposes
Calculations were performed using vacuum tubes and reading from magnetic tapes.
UNIVAC used 5200 vacuum tubes, it could perform around 2000 operations per
second.
This technology was limited by cost, size and energy consumption in terms of how big
computers could get.
Vacuum tubes
21
In 1947 the transistor was invented by Shockley, Bardeen and Brattain. Transistors
could be made much more quickly and cheaply using a very simple and widely
available ingredient, sand. Silicon, which is obtained from sand, is the material from
which all modern electronic components are made. Transistors consumed very little
power and were very small compared to vacuum tubes.
Computers containing transistors could be smaller and still deliver as much, or more,
processing power.
Electronic computers used transistors instead of valves – the beginning of modern era
of computing
22
Unit 6: The Internet
Getting connected
The Internet consists of many systems that offer different facilities to users.
www
TELNET Email
News-
Mailing lists
groups
Internet
Video Internet
conference telephone
23
WWW, the World Wide Web, = a collection of files or pages containing links to other
documents on the Net.
Internet telephone, a system that lets people make voice calls via the Internet.
Video conference, and internet telephone, are based on IRC (Internet relay chat) protocols. A
system that allows the transmission of video and audio signals in real time so the participants
can exchange data, talk and see one another on the screen.
Newsgroups, the public discussion areas which make up a system called ‘Usenet’. The
contents of the newsgroups are contributed by people who send articles (messages) or respond
to articles.
TELNET, a program that is used to log directly into remote computer systems. Online
databases and library catalogues can be accessed by this program.
The terms "Internet" and "World Wide Web" are often used in every-day speech without
much distinction. However,
24
A brief history of the Internet
1961
In July Leonard Kleinrock (MIT) publishes the first paper on packet switching theory, which
forms the basis for the creation of the Internet. Packet switching is a network
communications method that splits data traffic (digital representations of text, sound, or video
data) into chunks, called packets, that are then routed over a shared network.
1964
1967
The United States Department of Defence Advanced Research Projects Agency (DARPA)
launches the ARPANET project to design a distributed computer network. The
ARPANETnetwork is set up, creating the basis for the Internet.
1970s
Theresearch on the ARPANET is carried out in the USA. This produces TCP/IP, the basis of
the Internet.
Microcomputers begin to be popular, initially mostly in the form of kits intended for
enthusiasts and industry. In 1977, the ready-made Apple, Commodore PET and Tandy TRS-
80 microcomputers came onto the mass market, launching the microcomputer revolution.
Even though these computers usually had a serial communications port, mostly so they could
be used as terminals, or for printers, linking of microcomputers to computer networks had to
wait until the 1980s.
The Finnish Telmac-1800 microcomputer, sold as an assembly kit (Photo and computer:
Harri K. Salminen).
25
1980s
The Internet was still considered to be a temporary system designed for the research world.
The ISO (International Standards Organization) proposed the competing OSI (Open Systems
Interconnection) model. OSI was particularly backed by telecom organisations. They had built
X.25 packet-switching networks, with monitoring and billing implemented to suit their own
purposes. The Internet relied on routers owned by the users. The only thing bought from the
telecom organisations was leased telecommunication links.
1982
1984
1986
Cisco Systems, a small company with four workers in Silicon Valley, California, delivers its
first Internet routers.
1990
Tim Berners-Lee's updated proposal, 'World Wide Web: Proposal for a HyperText Project' is
approved by CERN. The Web is born.
Exercise 1.Vocabulary.The Net. Complete the sentences with a term from the list.
1. When you are connected to the Internet, you are described as being
________________.
2. A _______________ is a piece of text or an image that, when selected, takes you to
other Internet sites.
3. The Internet is based on a _________________ called TCP/IP.
4. You need a ____________ to convert computer data into a form that can be
transmitted over the phone lines.
5. Users have to enter the log-in name and a ________________ to gain access to the
Net.
6. FTP software allows you to _________________ files from the Net to your computer.
7. The World Wide Web is known as the __________________.
8. To ‘log on’ to a remote computer you need to run a _________________ program.
26
Exercise 2. Read the above text carefully and decide whether the following sentences are
true (T) or false (F). If they are false, correct them.
1. The Internet and the World Wide Web are synonyms. _________
2. Computers need to use the same protocol (TCP/IP) to communicate with each
other.________
3. The Web was born in 1980s. ________
4. Emails are used for real-time messaging. ________
5. The subject is a part that describes the content of an email. ________
Exercise 4. Which Internet utility (1 to 7) would you use to do each of these tasks (a to g)?
http://en.wikipedia.org/wiki/Internet
http://www.nic.funet.fi/index/FUNET/history/internet/en/etusivu-en.html
27
Exercise 5. Vocabulary. Study the words in the box.
28
Additional: The Web
The World Wide Web (commonly shortened to the Web, WWW) is a network of hypertext
documents accessed via the Internet. It works by using text that contains links, hyperlinks to
other documents. Web pages are files stored in computers, which act as servers. Your
computer, the client, uses a special program to access and download web pages that is called
a web browser. Websites are groups of pages located on the Web, maintained by a
webmaster, the manager of a website.
Since the Web enables you to access all sorts of interactive multimedia information, it has
become a real information highway.
The World Wide Web was created in 1989 by the British scientist Tim Berners-Lee, working
at the European Organization for Nuclear Research (CERN) in Geneva, Switzerland, and
released in 1992. Since then, Berners-Lee has played an active role in guiding the
development of Web standards (such as the markup languages in which Web pages are
composed).
In order to surf or navigate the Web, access and retrieve web pages or websites, you need a
computer with an Internet connection and a web browser. After you have launched it, you
must type the website address or URL(Uniform Resource Locator) which may look like
this:
http://www.cambridge.org/elt/infotech3ed/study/weblinks/unit21.htm
http:// indicates the type of protocol that the server and browser will use to communicate. In
this case, it is Hypertext Transfer Protocol.
cambridge.org is the domain nameof the web server that hosts the website.
elt/infotech3ed/study/weblinks is the path, the place where a web page is located. In this case,
it comes to English language teaching.
29
Extending skills - Vocabulary
Exercise 2. Complete these instructions about how to navigate with the words in the box.
Exercise 3.Steps for buying online. Put the following steps in the correct order.
a. Put the items you want to buy into a virtual shopping cart.
b. Confirm the order and log out.
c. Enter your personal data – you may have to log in with a username and a password if
you have an account with them.
d. Enter a site dedicated to e-commerce and browse their products.
30
Language work 1: Collocations
Collocations are word combinations or set phrases that are very common in English. Here are
some examples:
Exercise 1. Match the words from the left (1-6) with the words on the right (a-f) to make
collocations.
1. ______________________________________________________________________.
2. ______________________________________________________________________.
3. ______________________________________________________________________.
4. ______________________________________________________________________.
5. ______________________________________________________________________.
6. ______________________________________________________________________.
31
Language work 2: The prefixes e- and cyber-
The e- prefix stands for electronic and is used for activities that take place on computers or
online. Some examples are:
The cyber- prefix stands for cybernetics and is used to describe things related to computer
networks. Some examples are:
1. Have you ever sent or received an e-card? If you have, what was the occasion?
2. Have you ever been to a cybercafé and used a computer with Internet access for a fee?
3. Have you ever downloaded an e-book? What was it about?
4. Name some examples of cybercrime.
http://en.wikipedia.org/wiki/World_Wide_Web
32
Unit 7: Software development
There are many different stages in the development of software. The whole process is known
as project management. The stages are:
33
Models used for developing software
Open source generally refers to any computer software or program whose source code is
made freely available for use, modification and distribution. The Linux operating system and
Apache web server are two well-known open source programs. Proprietary software is the
exclusive copyrighted property of the developers or publishers. Almost all commercial
software is proprietary, with restricted use. Some well-known examples are Microsoft
Windows, Adobe Flash Player and iTunes.
34
Unit 8: Efficiency in computer systems
There are various factors which need to be taken into account in making computer systems
efficient. These are reliability, security, speed, support requirements, overall cost. It could be
said that computer performance is characterized by the amount of useful work accomplished
by a computer system or computer network compared to the time and resources used. High
computer performance may involve one or more of the following:
Exercise 1. Study the two lists of verbs in the box. Match the verbs with similar
meanings. Make nouns from the verbs if possible.
1 2
cluster interrupt
consume guarantee
convert contribute (to)
disrupt reduce
distribute include
drive down group
ensure transform
incorporate balance, share
mask assess
measure use
play a role in hide
35
Model answers:
2.share 2.share
drive down / reduce reduction
ensure / guarantee guarantee
incorporate incorporation include inclusion
mask mask hide /
measure measurement assess assessment
play a role in / contribute (to) contribution (to)
Exercise 2. Study the table. Match each word or phrase with its meaning.
Word/phrase Meaning
‘out-of-the-box’ where physical components can be added or removed without
shutting down the system
data integrity ensuring that devices operate efficiently whether they are idle,
operating at lower usage levels or at full capacity
energy proportionality circuits on the computer’s motherboard providing the voltages
required by the microchips
‘hot swapping’ systems supplying power with built in storage capacity so that
during a power outage servers can keep running
uninterruptible power supplies (UPS) equipment provided by the manufacturer without modification
voltage regulator circuitry ensuring that data is not corrupted
36
Unit 9: Human-computer interaction (HCI)
Computer sciences, as opposed to the human sciences, can make contributions to tools and
processes in HCI. The main focus of the computer sciences models of HCI is on how the
system can become more effective within existing system constraints. Choosing the best
combination of hardware and software for input and output devices is important if designers
are to achieve this. The speed with which feedback takes place is also very important, as it can
affect the user’s perception of the responsiveness of the device, and the ease of interactivity
with the system.
Complete the sentences with the most suitable word or provide the most suitable word
for given definitions.
37
Unit 10: E-commerce and e-government
E-commerce or electronic commerce is the buying and selling of goods and services, or the
transmitting of funds or data i.e. it refers to commercial transactions which take place over an
electronic network, primarily the Internet. There are many different forms:
Bricks and mortar shops refer to shops or companies which have a physical presence and
offer face-to-face consumer experiences ≠ virtual storefronts.
http://www.clocksoftsolutions.com/e-commerce/
38
Before buying things online, a few basic precautions should be taken:
Online services have some advantages and disadvantages. Here are some examples:
Advantages Disadvantages
e-tickets very easy to complete transactions can be charges to consumer for e-
online; easy to change details; no ticket; additional fees at airport for
need to go to travel agents printing; may be difficult for
people with limited literacy and
ICT skills
using web for marketing and savings on marketing can be passed requires customer to be aware of
promotion on to consumer in form of lower website in order to visit the site
prices
selling additional services such as convenient for consumers to look does not provide opportunity for
accommodation and car hire in one place; can provide special comparison with other prices and
deals services
Exercise 1.Steps for buying online. Put the following steps in the correct order.
e. Put the items you want to buy into a virtual shopping cart.
f. Confirm the order and log out.
g. Enter your personal data – you may have to log in with a username and a password if
you have an account with them.
h. Enter a site dedicated to e-commerce and browse their products.
39
Unit 11: Computing and ethics
There are several ethical issues in computing that have to be taken into consideration such as
privacy and private data collection, security, intellectual property rights, accessibility,
censorship and filtering, robotics and artificial intelligence, and others. Internet privacy is one
of the issues that has emerged since the evolution of the World Wide Web. Millions of
internet users often expose personal information on the internet. Other important issues are
fraud and identity theft. Also, some companies violate their users’ right to privacy.
Security has long been a topic of ethical debate where, for example, hacking, cyberstalking
and online harassment play an important role. When it comes to accuracy, it is difficult to
verify the authenticity of information shared online.
https://darkpsychology.co/ipredator-probability-inventory-cyberstalking/
Intellectual property rights comprise issues like software piracy, copyright infringement,
digital divide which is connected to the freedom of information. This refers to the unequal
socio-economic divide between those who have access to digital and information technology
such as cyberspace and those who have limited or no access at all. This gap of access between
countries or regions of the world is called the global digital divide.
In terms of robotics and artificial intelligence, ethical concerns are related to military drones,
spy robots, driverless trains and cars, medical robots etc. The question is whether they can be
autonomous enough and exhibit ethical behaviour, how well they can function outside linear,
predefined scenarios.
Another issue related to the topic is cyberethics which can be defined as the study of ethics
pertaining to computers, encompassing user behaviour and what computers are programmed
to do and how this affects individuals and society. In order to introduce a set of standards to
guide and instruct people in the ethical use of computers, the Ten Commandments of
Computer Ethics were created in 1992 by the Computer Ethics Institute.
40
The Ten Commandments are as follows:
http://en.wikipedia.org/wiki/Ten_Commandments_of_Computer_Ethics
http://en.wikipedia.org/wiki/Cyberethics
Exercise 1. Study the terms in the box and explain their meanings.
Model answers:
Blach hat hacker – a hacker who gains access to systems for personal gain or in order to
damage them
Known software exploit – a known flaw in a piece of software which allows hackers to take
control of it
Technical legal breach – where the law is broken, but the breach is very minor and the case
is extremely unlikely to be taken to court
Password protection policy – a policy which sets out how strong passwords can be
generated and when they should be changed
Internet safety guidance – guidance for avoiding malicious websites, phishing and other
types of Internet dangers
Secure equipment disposal – how to get rid of old equipment in a way which does not
compromise security; particularly important for old data disks and other forms of storage
41
Exercise 2. Study the words in the box. Match the words in columns 1 and 2 to make
phrases.
1 2
client testing
data system
legal access
penetration protection
privacy outcome
reverse legislation
root exploit
successful engineering
target consent
unpatched situation
Additional: Cybercrime
The Internet provides a wide variety of opportunities for communication and development,
but unfortunately it also has its dark side. Internet security involves the protection of a
computers internet account and files from intrusion of an outside user. Basic security
measures involve protection by well selected passwords, change of file permissions and back
up of computers data.
There are also white-hat hackers who debug or fix security problems.
A firewall is a software program that has the ability to block any unauthorised ports on the
computer. Each computer user should install such a program designed to prevent spyware
from gaining access to the internal network.
42
Types of cybercrime:
piracy
cyberstalk
plagiarism
ing
cyber-
IP crime
scam
spoofing
phishing malware
Piracy – the illegal copying and distribution of copyrighted software, information, music and
video files
Plagiarism - the unauthorized use or close imitation of the language and thoughts of another
author and the representation of them as one's own original work
Malware (malicious software) – software created to destroy the computer data. These are the
main types:
Trojan horses - a computer program. The program claims to do one thing (it may
claim to be a game) but instead does damage when you run it (it may erase your
hard disk). Trojan horses have no way to replicate automatically.
Worms – self-copying programs that have the capacity to move from one computer to
another without human help by exploiting security holes in computer networks. They
don’t need to be attached to a document.
Viruses- programs which are able to log into the personal files on a computer it has
affected and as a result, can end up removing all of them. It can have serious side
effects on a computers system.
Spyware - programs which pretend to do one thing, but in reality snoops out your
personal data, or can end up damaging it. These types conceal their identity or true
intentions and are usually quite hard to detect.
43
Phishing – bank fraud to get banking information such as passwords of Internet bank
accounts or credit cards details. Phishing happens over email. Users get ˮlegitimate lookˮ
email from a foreign source.
Phishing mail is usually cloaked as an official email. The sender is attempting to trick the
recipient into revealing confidential information.
Another way of phishing is sending hyperlinks over Instant messaging and it often directs
users to enter details at a fake website whose looks is almost the same like the legitimate one.
Phishing is a continual threat that keeps growing to this day. The risk grows even larger in
social media such as Facebook, Twitter, and Myspace etc.
IP spoofing – making one computer look like another in order to gain unauthorized access
44
Prevention of cybercrime
1. Securing information
It's important to keep shared information at a minimum so that cyber stalker cannot identify
information provided by the user himself. Social networks often ask for personal info such as
address, phone number, birthday, etc. It is best not to put those types of information onto
these websites.
Passwords
Passwords are created to prevent people from unauthorized access into personal info.
Common way that passwords may be compromised is through repeated guessing. Strong
password should contain at least 10 characters, upper and lower letters, numbers and symbols.
It is also recommended to regularly change password.
PINs
A PIN may consist of at least 4 digits. Birthdays, birth-years, repeating numbers and banking
PINs should not be used as PINs for your internet accounts.
2. Security software
Antivirus/Internet security software should be used to prevent desktop from various malware
and viruses. Without the help of the antivirus software, it is impossible to detect and remove a
virus.
3. Firewalls
Firewall is a program that monitors and controls incoming and outgoing internet traffic. It is
important to keep the firewall running at all times. Firewalls come pre-installed into most
operating systems. Users can control which programs can communicate with the network.
Operating system and programs should be up-to-date to prevent viruses from taking
advantage of exploits that may have been already patched with updates.
5. Parental control
A good way of reducing the possibility to access offensive content is setting up parental
controls. They allow users and parents to place filters on their computers.
Content filters limit age-appropriate content and specified types of content that may user
dislike. Software based parental controls can provide a more in depth solutions specific to
each device it is installed on. These controls can provide logs, keystrokes, and can limit what
children see online and the length of time they have Internet access for each day.
45
6. Public computers
Public computers may be physically accessed by anyone within range of the computer.
Logging into banking accounts from public computers should be avoided. It's recommended
to clear cookies and clear browsing data when signing out.
Antivirus software is a computer software used to prevent, find and remove malicious
software. Antivirus software is sometimes known as anti-malware software.
Most popular antivirus programs today are Antivirus Protection & Internet Security by
Kaspersky Lab, NOD32 Antivirus by ESET, Bit Defender Antivirus as well as Norton
antivirus. Most popular anti-malware program is Malwarebytes' Anti-Malware.
Antivirus and anti-malware programs should update their definitions whenever update is
available. User does not have to run manual scan because most programs scan computer at
least once a week.
Pop ups can lead to malicious software’s download page. Most web browsers have internal
pop-up blockers but it’s recommended to install plug-ins such as Ad Away.
3. Password managers
Password managers are programs that help to organize passwords for internet accounts. They
encrypt password data, and they usually autofill user and password data onto proper website.
46
Extending skills - Vocabulary
Exercise 1. Identify the Internet crimes sentences (1-6) refer to. Choose from the box.
1. Crackers try to find a way to copy the latest game or computer program. ___________
2. Many people would probably open an email they believe to be from their bank and
happily send off all their security details. ________________
3. This software’s danger is hidden behind an attractive appearance. That’s why it often
comes with good-looking photos of celebrities. __________________
4. There is a particular danger in Internet commerce and emails. Many people have been
deceived because they believed they had been offered a special gift or a certain
amount of money. __________________
5. ‘Mylife’ spreads by sending infected mails and is also able to infect websites.
________________
6. Since millions of children spend time in Internet chat rooms talking to strangers, they
could be abused by sexual predators. __________________
Exercise 2. Fill in the gaps in these security tips with words from the box.
Exercise 3. Vocabulary review: Security. Solve the clues with the most appropriate
word(s).
Technology has progressed at a rapid rate during the last 100 years, more than any other
period in history. The 20th century began with the infancy of airplanes, automobiles and radio.
It ended with computers, spaceships, cell phones, wireless internet and virtual worlds.
Many oft he technological advances we are seeing today will shape our daily life int he future
– the way we relax, interact, communicate and conduct business. ICT will continue to
advance, empower and transform every aspect of our life. Some oft he emerging technologies
and trends are:
http://www.ichoosetechnology.com.au/home/what-is-ict/ict-in-the-future
http://computer.howstuffworks.com/virus.htm
http://en.wikipedia.org/wiki/Internet_security
Nanobots, robots formed from molecules or molecular components, will be used in medicine
to control and diagnose diseases. For example, they will be injected and will move through
blood vessels destroying cholesterol molecules or cancer.
Nanocomputers, molecule-sized computers, may have the power of 100 workstations but
only be the size of a grain of sand. There will be two main types of molecular computers:
Computers will be embedded or hidden in a variety of items. For example, we’ll have
wearable computers that will be embedded in a belt or a piece of jewellery.
48
ICT devices will be mobile and multimedia: we’ll watch mobile TV programmes on
our phones which will also access the Internet.
There will be gesture interfaces based on facial-hand recognition systems.
Computer chips can be injected under the skin: RFID, radio-frequency identification
tags, might be used to track or identify people or to store information.
By the year 2040 there might be intelligent robots, machines that will be able to think
creatively.
Exercise 1. Read these extracts and replace the words in italics with the words from the
above text.
____________________________
5. Scientists at an Israeli institute have developed a very small one – so small that a
trillion of its kind fit into a test tube. _____________________
49
Additional: Nanotechnology
http://nanotechsizematters.yolasite.com/applications.php
What is Nanotechnology?
Nanoscience and nanotechnology are studies and application of things on nanoscale which is
one billionth of a meter. It is used in various areas in our life such as: engineering, physics,
biology, science, medicine etc.
Nanoscience as we know it today is quite new but nano materials have been in use for several
hundred years. Artists in middle age used gold and silver particles to create more brighter and
unique colors to paint windows in churches. The microscopes needed to see things at the
nanoscale were invented about 30 years ago. They are called Electron Microscopes. Scientists
and engineers are trying to find wide variety of ways to improve properties of material such as
higher strength, higher flexibility, lighter weight, increased control of light spectrum, better
electrical conductors, greater chemical reactivity and much more.
Electron microscope
The electron microscope is a type of microscope that uses a beam of electrons to create an
image of the specimen. It is capable of much higher magnifications and has a greater
resolving power than a light microscope, allowing it to see much smaller objects in finer
detail. The wavelength of an electron can be up to 100,000 times shorter than that of visible
light photons. A transmission electron microscope can achieve better than 50 picometers
resolution and magnifications of up to about 10,000,000 times while most light microscopes
are limited to about 200 nanometers resolution and useful magnifications below 2000x.
50
Material behavior on nanoscale
Behavior of materials on nanoscale is different because it has more area for reaction. The
more we lower the scale the more area there is to react and those reactions depend on type of
material we are observing. Few examples: powdered sugar dissolves faster than cube sugar.
Big parts of aluminium are not very reactive to fire but nanoparts are so reactive that they are
used in rocket fuel.
Light also reacts differently on nanoscale. Usually white light contains all colours but when
we go down on nanoscale, white light only bounces certain colour back. Gold reflects
different colours depending on the size we are observing. It starts looking red, pink, purple,
blue and when it is too small to reflect any light it becomes invisible.
Nanotechnology benefits
http://www.slideshare.net/sumitpramanik007/nanotechnology-baseddrugdeliveryppt
By observing nature on nanoscale scientists came up with new materials and techniques that
can greatly improve our everyday life. They are using the fact that it is possible to make your
own new materials on nanoscale with different structure. This allows them to make best use
of each material on specific field by modifying it just for that use.
51
Everyday benefits
There are already over 800 everyday products that rely on nanoscale materials and processes:
Nanoscale additives in polymer composite materials give them special traits such as
lighter weight but at the same time those materials are more durable and resilient. This
allows easier use of items like baseball bats, tennis rackets, motorcycle helmets,
automobile bumpers, luggage etc. They are also added in cloth to make them resistible to
wrinkles.
Nanoscale thin films on eyeglasses make them more resistible to environment effects such
as scratches, fog, water, heat and cold. They also gain ability of self cleaning and
antireflection which greatly helps in products such as computer and television screens,
cameras, mobile phones and glass in general.
Nanoscale materials in cosmetic products make them a lot more beneficial for health,
cleaning and absorbing. They are better in detoxification and protecting skin. Those
materials are used in sunscreens, skin creams, shampoos and even make-up.
Nano-engineered materials are also used in food industry. They increase vitamins and
nutritious value, improve taste, help in fight with cholesterol and keeping food fresh by
adding antibodies to packages. Some also have plastic packaging that can warn against
spoiled food and to detect salmonella, pesticides, and other contaminates on food. There
are also nanosize powders that can be added in food or taken as supplements which our
bodied absorb more easily.
Oil recovery technique involves injecting water into the rock pores where oil is located.
This displaces the oil and forces it out.Infusing the water with nanoparticles that can plug
the passages between the rock pores. This method is intended to make the water take
narrower paths into the pores that contain oil and force the oil out.
Nano-engineered materials in automotive products help with lower gas consumption,
reduced friction of tires on surface, higher power batteries, less exhausting gasses and
many more.
Nano-engineered household products such as stain removers; environmental sensors, alert
systems, air purifiers and filters; antibacterial cleansers help in keeping home clean and
healthy.
Nanoscale transistors which are faster and more powerful, and in the same time they use
less energy. Those transistors take a lot less space and by that microchips are able to hold
more of them to increase performance even more.
52
Magnetic random access memory (MRAM) is memory with nanoscale magnetic tunnels
with allow extremely fast flow of data. In case of system shut down or crash this memory
will save information.
OLED screens are used on many new TVs, laptops, phones and cellphones and cameras.
They have great benefits such as less power consumption, more flexible screens, more
detailed colours, sharper display…
Wires containing carbon nanotubes to have much lower resistance than the high-tension
wires currently used in the electric grid and by that reducing transmission power loss.
Nano thin scales are used to make smart phones and computers that are bendable and like
that can be bent around wrists like watches. They are covered in nanoscale thin gold
layers which increase flexibility and make them more resilient to any kinds of damage.
Other computing and electronic products include: Flash memory chips for iPod nano,
hearing aids for deaf people with greater response time, antibacterial protection for
computer mouse, keyboard and cell phone, inks for printer, more realistic video games.
Many scientists are looking for ways to develop clean, affordable and renewable energy
sources. Those sources have to supply energy with less harm to environment then current
sources. Goal is to produce more efficient sources overall.
Prototype solar panels with nanotechnology are more efficient than standard designs in
converting sunlight to electricity. This suggests greater use of solar panels in near future
since they are environment friendly and less expensive. Nanostructured solar cells are
cheaper to manufacture and easier to install, since they can use print-like manufacturing
processes and can be made in flexible rolls rather than discrete panels.
Nano-bioengineering is aiming to enable conversion of more bio degradable things into
fuels such as: wood, grass, corn and many other plants. This will lower bad gas effects to
environment.
Nanotechnology is used to make batteries that are less flammable, charge quicker, more
efficient, lighter weight and hold electrical charge longer. Batteries like this help
environment greatly because we use less of them and they are easier to recycle.
Various nanoscience-based options are being used to convert waste heat many electrical
and mechanical appliances such as computers, automobiles, even homes to usable
electrical power.
Windmills with blades made of carbon nanotubes that are longer, stronger, and lighter-
weight than other blades to increase the amount of electricity that windmills can generate.
Benefits in medicine
Nanotechnology has been used in the early diagnosis of cancer and brain damage.
Nanoscaled particles can be implanted inside brain, which search for damaged or
problematic tissue and give more information to doctors.
53
There are predictions that in the near future nanosize robots will be used in blood flow to
detect and destroy harmul cells. Those robots will be smaller then red cells in human
blood.
Gold nanoparticles can be used to detect early-stage Alzheimer’s disease.
Fun Facts
54
Future perfect (will have + past participle)
to talk about actions finished at a stated future time
Exercise 1. Put the following verbs in the correct future form. In some sentences more
than one answer will be possible.
http://www.nano.gov/nanotech-101/what/definition
http://www.nano.gov/you/nanotechnology-benefits
http://en.wikipedia.org/wiki/Electron_microscope
http://listverse.com/2014/12/01/10-unconventional-uses-of-nanotechnology/
55
Additional: Web design
The intent of web design is to create a website (a collection of electronic files residing on one
or more web servers) that presents content (including interactive features or interfaces) to the
end user in the form of web pages once requested. Such elements as text, forms, and bit-
mapped images (JPEGs, PNGs) can be placed on the page using HTML, XHTML, or XML
tags. Displaying more complex media (vector graphics, animations, videos, sounds) usually
requires plug-ins such as Flash, QuickTime. In computing, a plug-in refers to the additional
software that enables the web browser to support the new content in the form of multimedia
files.
It is important to note the difference between a website and a web page. A website is a
collection of information about a particular topic or subject. Designing a website is defined as
the arrangement and creation of web pages that in turn make up a website. A web page
consists of information for which the website is developed. A website might be compared to a
book, where each page of the book is a web page.
To build a website you could learn how to write HTML tags, the coded instructions that form
web pages, or else use an HTML editor or WYSIWYG (What You see Is What You Get)
application that converts a visual layout into HTML code. A simpler option is to use a web
template provided by a web-based site builder, where you just fill in the information you
want on the page.
56
http://catseyemarcom.com/blog/web-design-101/
Basic elements
Some of the basic elements that can be found on a web page are:
Text
Links – connections from text or graphics on the current web page to different parts of
the same page, to other web pages or websites, or to external files
Graphics – pictures created with formats such as JPEG (Joint Photographic Experts
Group)and GIF (Graphical Interchange Format)
Tables
Frames – subdivisions of a web page allowing the display of different HTML
documents on the same page.
Web pages can also include multimedia files: animations, audio and video files. Sounds can
be recorded with different audio formats like MIDI, WAV and MP3. Web pages can also be
interactive by using Java applets, specific applications using different programming
languages.
http://www.plauditdesign.com/web-design-minneapolis.html
57
HISTORY
EARLY 1990'S
In 1991 the very first website was published by Tim Berners-Lee. The internet consisted
mainly of text based sites with no sign of visual considerations such as typography and
imagery. Lightweight websites were built and optimised for the current internet speeds which
were dial-up.
MID 1990'S
Visual hit counters started to appear in an attempt to show authority. Free page builders such
as geocities and angelfire made it simpler for novice computer users to build their very own
website.
LATE 1990'S
Flash introduced new elements of web design such as combining virtual graphics with
interaction. The late 1990's saw the beginning of visitor focused web design. Structure,
navigation, appearance and usability all became important areas.
EARLY 2000'S
Although CSS(cascading style sheets) had been around since the late 90s, it became popular
in 2000. CSS allowed designers to separate website content from design/styling and increase
flexibility in website layout. Links began to be attached to images and not just text.
MID 2000'S
Website designers were beginning to use advanced navigation, drop down menus and web
forms, all thanks to javascript's popular rise in the mid 2000's. The mid 2000's also saw the
collaborative movement of the semantic web. This aimed at allowing machines to understand
web pages just as well as humans.
LATE 2000'S
The term web 2.0 was coined which saw web designers take a turn towards interactive content
and web applications by utilising javascript and xml (known as ajax). Web designers used
interactive content to help users view new content without having to reload the page. Html 5
gains mainstream popularity over flash. SEO(search engine optimization) was now an
extremely important part for a web designer to take into consideration.
58
THE MOBILE WEB
In 2008, mobile access to the internet exceeded desktop access for the firs time. Many
businesses looked towards creating a condensed 'mobile' version of their site. Web designers
focused on tall and skinny designs rather than short and wide.
TODAY
Two decades on from the very first website and web design has come a long way. Good web
design is now seen as an irreplaceable part of every marketing strategy. RWD (responsive
web design) has recently soarded in popularity, aiming to provide users with an optimal
viewing experience on any device which does away with the need to build a separate 'mobile'
site.
59
Extending skills - Vocabulary
2. Multimedia file can be included b. usually needed to enjoy audio and video files.
Across
Down
60
Exercise 3. Speaking. Answer the following questions.
http://en.wikipedia.org/wiki/Web_design
61
Additional: Program design and computer languages
Machine code – the only language a PC can directly execute. It consists of 1s and 0s.
Assembly languages – symbolic languages that are easy to understand. They use
abbreviations such as ADD, SUB, MPY to represent instructions.
A compiler – software used to translate the original code into a lower-level language or
machine code so that the CPU can understand it.
62
Extending skills - Vocabulary
Exercise 2.Vocabulary.Word building. Look at the groups of words and complete the
sentences with the correct word.
63
Additional: Jobs in ICT
A project manager controls all the people involved in the different stages of development of
a computer project, i.e. analysts, programmers, support specialists etc.
Exercise 1. Introduction. Work in groups. List some computing jobs you know.
Compare your list with other students in the class.
Exercise 2. Discussion. Which of the jobs listed below would you like to make your
career? Give your reasons.
ANALYZE
database analysts – in charge of the research and development of databases
network analysts – study the network requirements and recommend the most
suitable type of network
systems analysts – decide what ICT system will cater for the requirements of a
specific institution
DESIGN AND DEVELOP
web designers (webmasters) – create and maintain web pages and web
applications for websites
desktop publisher – create publications, websites, books, advertisements and
more. Job titles include print and web designers, art or creative directors,
production artists, digital illustrators, photo retouchers.
software engineers – plan, design and test computer programs
hardware engineers – design and develop ICT devices
security specialists- specialize in the design of software and hardware to
protect information from malware: viruses, spyware etc.
MANAGE
network or computer systems administrators – install and maintain
networks
database administrators – manage the accuracy and efficiency of databases
SUPPORT
computer operators – control computer data processing
help desk technicians – in charge of troubleshooting, the solution of technical
problems
computer training instructors (trainers) – teach people how to use hardware
and software
technical writers – write the instructions for ICT systems.
64
Applying for a job
Needed documents:
curriculum vitae
a letter of application
other documents on request
CURRICULUM VITAE
PERSONAL DETAILS
Mobile: +385 98 11 22 33
E-mail: [email protected]
EDUCATION
65
2002-2006 Technical High School in Split
WORK EXPERIENCE
capability of self-studying
tendency to team work, responsibility, quick thinking in situations under pressure
REFEREES WORK
66
A letter of application
Marko Ivić
Vukovarska 150
21 000 Split
Tel:
Mob:
E-mail: [email protected]
VIPnet d.o.o.
Vrtni put 1
Since I graduated from The University of Split, Department of Professional Studies on 14 July
2010 and therefore gained the qualifications of a graduate programmer, I think I could use my
knowledge at your company in the best possible way.
I have more than two years of work experience doing different kinds of jobs and I also meet all
conditions stated in the ad.
67
Along with this letter of application, you will find my curriculum vitae as well as a copy of my
diploma enclosed.
Sincerely yours
Marko Ivić
68
Job ads
First advertisement
http://www.topitconsultant.com/Appointment.aspx?ID=11156&QueryID=383077
Our client is a global business and IT management consulting firm. At present they are
recruiting for a Data Analyst to join their Financial Services practice. Specifically they are
looking for Data Analysts to work within their delivery teams on large scale, complex data
warehousing and business intelligence projects.
The role will involve taking on a range of roles throughout the development cycle, from
gathering and cataloguing data requirements, profiling data content of source systems,
specifying new data structure requirements, developing data models and determining the
transformation rules between systems. The role requires individuals who are comfortable
working closely with business representatives, source system experts and Data Warehouse
development teams.
Requirements
Benefits
All employees receive core benefits, for example 25 days' annual leave. An allowance is also
received to spend on your choice from a range of flexible benefits:
pension plan
private medical insurance
life assurance
permanent health insurance
As you are promoted you will benefit from additional benefits or an increased flexible benefit
allowance. Employees are also able to participate in an employee share purchase scheme.
69
To apply please send an application by email to: [email protected]. Please quote
reference number TITC/DA/0908
Second advertisement
Zagrebačka banka
Gundulićeva 26
21 000 Split
Zagrebačka banka, The Bank of Zagreb, has opened the position for the full-time job of
Computer Network Support Person.
Essential requirements:
Desirable requirements:
If you are interested in working in a highly competitive company, please send your CV, a
letter of application and a copy of your diploma to Mr Goran Perković, Head of the Human
Resources Department by 15 December 2008.
70
Third advertisement
If you would like to hear about outstanding opportunities in Europe to work in the expanding
area of personal communication systems, write to:
Euroengineer Ltd
Austin Street
Norwich
NJ2 1BL
Enclose your CV and the names of two referees. Applicants should have a degree or
equivalent in information technology or a related discipline. A good command of foreign
languages would be an advantage.
Fourth advertisement
Duties:
Qualifications:
Qualified candidates please send an updated CV in Word format in English not later than
November 22nd via application link.
Please include e-mail and phone number in your CV. Only short-listed candidates will be
contacted. The anticipated start date is 01 December 2015.
Exercise 3.Writing. Choose one of the above job advertisements that sounds most
interesting to you and write your CV and a letter of application according to the given
examples.
personal experiences
past actions in a time up to now where we put emphasis on the quantity or number
(how many?)
72
Language work II: Present perfect continuous
Exercise 4. Put the verbs into the present perfect simple or the present perfect
continuous.
Exercise 5. Make questions using these prompts. In pairs, ask and answer the questions.
http://www.nextstepmagazine.com/nextstep/articlePage1.aspx?artId=2484&categoryId=4
73
Additional: Communication systems
http://en.wikipedia.org/wiki/Category:Telecommunications
http://www.webopedia.com/TERM/t/teleworking.html
http://en.wikipedia.org/wiki/Call_centre
Call centres - a centralized office used for the purpose of receiving and transmitting a large
volume of requests by telephone. A call centre is operated by a company to administer
incoming product support or information inquiries from consumers. Outgoing calls for
telemarketing, product services, and debt collection are also made. In addition to a call centre,
collective handling of letters, faxes, live chat, and emails at one location is known as a
contact centre.
Telemarketing – the process of selling goods and services over the phone.
74
Language work: The passive
In technical writing
The BlackBerry is primarily known for its ability to send and receive email.
75
Modal verbs in the passive
Exercise 1. Complete these sentences with a suitable passive form of the verbs in
brackets.
76
Additional: Networks
Geographical area
LAN (Local Area Network) – covering a small physical area
WAN (Wide Area Network) – covering a broad area
MAN (Metropolitan Area Network) – covering a city
PAN (Personal Area Network) – including a laptop, a mobile phone and a
PDA
Architecture
Peer-to-peer – all the computers share files and peripherals without a separate
server computer.
Client-server – computer plays the role of a server and stores and distributes
information to the other nodes or clients.
Topology
Bus network - a network in which all the computers are connected via a
shared communications line, called a bus.
Star network - one of the most common computer network topologies. In its
simplest form, a star network consists of one central switch, hub or computer,
which acts as a connection point to transmit messages.
Ring network - a network topology in which each node connects to exactly
two other nodes, forming a circular pathway for signals - a ring.
77
LANs are usually placed in the same building. They can be built with two main types of
architecture, peer-to-peer or client-server. Computers in a LAN need to use the same protocol
or standard of communication.
A router, a device that forwards data packets, is needed to link a LAN to another network,
e.g. to the Net.
Most networks are linked with cables or wires but new Wi-Fi, wireless fidelity, technologies
allow the creation of WLANs, where cables or wires are replaced by radio waves. To build a
WLAN you need access points, radio-based receiver-transmitters that are connected to the
wired LAN, and wireless adapters installed in your computer to link it to the network.
Hotspots are WLANs available for public use in places like airports and hotels, but
sometimes the service is also available outdoors (e.g. university campuses, squares, etc.).
WANs have no geographical limit and may connect computers or LANs on opposite sides of
the world. They are usually linked through telephone lines, fibre-optic cables or satellites. The
main transmission paths within a WAN are high-speed lines called backbones.
Wireless WANs use mobile telephone networks. The largest WAN in existence is the
Internet.
Exercise 1. Match the technical terms (1-5) with the explanations (a-e).
78
1. __________ 2. ____________ 3.__________ 4._________ 5. __________
Exercise 2.True and false sentences. Mark the sentences as true (T) or false (F).
1. LANs link computers and other devices that are placed far apart. ___________
2. In a peer-to-peer architecture, all the workstations have the same capabilities. __________
Exercise 3.Vocabulary. Use the words in the box to complete the sentences.
2. The style of ___________________ networking permits each user to share resources such
as printers.
3. The star is a topology for a computer network in which one computer occupies the central
part and the remaining __________________ are linked solely to it.
4. At present Wi-Fi systems transmit data at much more than 100 times the rate of a dial-up
modem, making it an ideal technology for linking computers to one another and to the Net in
a _____________________________.
5. All of the fibre-optic _________________ of the United States, Canada and Latin America
cross Panama
79
6. A ___________________ joins multiple computers (or other network devices) together to
form a single network segment, where all computers can communicate directly with each
other.
1. The speed with which a modem can process data is measured in _____________.
a) bandwith b) bits per second (bps) c) signal
2. Cables consisting of several copper wires each with a shield are known as
____________ cables.
a) twisted pair b) optical fibre c) power cables
3. Computers that are connected together within one building form a _____________.
a) WAN b) ISP c) LAN
4. If you transfer a file from a remote computer to your computer, you ____________.
a) download b) upload c) run
5. To send out information is to ______________________.
a) signal b) packet c) transmit
6. A document containing information and graphics that can be accessed on the Internet
is _______________________.
a) a website b) a web page c) the World Wide Web
Exercise 5. Here is a list of instructions for someone wanting to set up a small network.
Put the instructions in the correct order.
80
j) Get the hardware you need: an Ethernet adapter card for each computer that doesn't
have an Ethernet port, a hub if you've got more than two computers, cables and wall
jacks.
Exercise 6. Complete the words in the following sentences by adding the prefix inter-,
intra-, trans-, com-, con-, up- or down-.
1. Last month computer _______time cost the company over €10,000 in lost production.
2. The computers in the production department have now ben successfully
______connected with those in the planning department.
3. Once you have completed payment details the data will be ________mitted via a
secure link.
4. We cannot network these computers because the systems are not _______patible.
5. Many companies distribute internal documents on their own ________net.
6. Once the home page has been completed, we'll be ready to ______load the site.
7. Cables are being laid throughout the building as the network requires physical
_____nections.
8. Using the network he was able to ______bine the data from different reports.
Phrasal verbs are common in conversational English. They are made up of two words: a verb
and a preposition. For example:
Exercise 1. Match each phrasal verb below with its correct definition.
81
1. _______ 2. _______ 3._______ 4._______ 5. _______ 6. ________ 7. _______
Exercise 2. Each of the sentences below should contain a phrasal verb. Complete the
sentences by choosing the correct verbs and prepositions from the two boxes. Sometimes
you have to change the form of the verb.
verbs prepositions
break round shut turn log down on down down up
warm on
3. You have to give your password in order to __________ _______ to the system.
4. Your printout will arrive in a couple of minutes: the laser’s still ____________ _______.
5. Pushing the big red button on the front ____________ the CPU _______.
6. When we found the virus, the first thing we did was to ___________ _________ the
entire system.
http://en.wikipedia.org/wiki/Computer_network
http://compnetworking.about.com/, http://www.howstuffworks.com/home-network.htm
82
Additional: Robotics
Etymology
Robotics is the engineering science and technology of robots, and their design,
manufacture, application and structural disposition. Robotics is connected withelectronics,
mechanics, and software. The word "robot" was used for the first time in public by Czech
writer Karel Čapek in his play R.U.R. (Rossum's Universal Robots), published in 1920. The
term "robotics" was coined by Isaac Asimov in his 1941 science fiction shortstory "Liar!"
During the history different people thought about artificial intelligence which wouldbe
able to take some human capabilities like walking, moving with hands etc. In the first century
Greek scientist Heron of Alexandria described 100 machines and automata in his work
Pneumatica and Automata. He described a coin – operated machine, a steam – powered
engine etc.
At the end of 15th century, Leonardo da Vinci made designs for humanoid robots. In
18th century Jacques de Vaucanson constructed mechanical duckwhich was able to eat, flap
its wings and excrete. At the end of 19th century Nikola Tesla demonstrated first radio –
controlled robot boat. In 1930s first humanoid robot, known as Elektro and made by
Westinghouse Electric Corporation, was presented to public. In 1942 Isaac Asimov
formulated the Three Laws of Robotics. The Three Laws of Robotics are as follows:
1. A robot may not injure a human being or, through inaction, allow a human being to
come to harm.
2. A robot must obey any orders given to it by human beings, except where such orders
would conflict with the First Law.
3. A robot must protect its own existence as long as such protection does not conflict
with the First or Second Law.
Actuators are like the "muscles" of a robot, the parts which convert stored energy into
movement. By far the most popular actuators are electric motors that spin a wheel or gear, and
linear actuators that control industrial robots in factors.
83
Current robotic and prosthetic hands receive far less tactile information than the
human hand. Recent research has developed a tactile sensor array that mimics the mechanical
properties and touch receptors of human fingertips.
Computer vision systems rely on image sensors which detect electromagnetic radiation
which is typically in the form of either visible light or infra – red light. The sensors are
designed using solid – state physics. The process by which light propagates and reflects off
surfaces is explained using optics. Sophisticated image sensors even require quantum
mechanics to provide a complete understanding of the image formation process.
Robots which must work in the real world require some way to manipulate objects:
pick up, modify, destroy, or otherwise have an effect. Thus the „hands“ of a robot are often
referred to as end effectors, while the arm is referred to as a manipulator.
For simplicity, most mobile robots have four wheels. However, some researchers have
tried to create more complex wheeled robots, with only one or two wheels. These can have
certain advantages such as greater efficiency, reduced parts, and allow a robot to navigate in
tight places that a four wheeled robot would not be able to.
Walking is a difficult and dynamic problem to solve. Several robots have been made
which can walk reliably on two legs. None have yet been made which are as robust as a
human. Many other robots have been built that walk on more than two legs, due to these
robots being significantly easier to construct.
Types of robots
There are several different kinds of robots which mostly differ in their application, but we can
generally divide them into three fields.
Mobile robot
Mobile robots have the capability to move around in their environment and are not fixed to
one physical location. An example of a mobile robot that is in common use today is the
automated guided vehicle or automatic guided vehicle (AGV). An AGV is a mobile robot that
follows markers or wires in the floor, or uses vision or lasers. Mobile robots are also found in
industry, military and security environments. They also appear as consumer products, for
entertainment or to perform certain tasks like vacuum cleaning. Mobile robots are the focus of
a great deal of current research and almost every major university has one or more labs that
focus on mobile robot research.
84
http://spectrum.ieee.org/automaton/robotics/robotics-hardware/robotics-trends-for-2012
Industrial robots usually consist of a jointed arm (multi-linked manipulator) and end effector
that is attached to a fixed surface. One of the most common type of end effector is a gripper
assembly. They are defined as an automatically controlled, reprogrammable, multipurpose
manipulator. It can be either fixed or mobile for use in industrial application.
http://www.linksic.isy.liu.se/?page=industrialrobotics-2
Service robot
The term "service robot" is less well-defined. It could be defined as "a robot which operates
semi- or fully- autonomously to perform services useful to the well-being of humans and
equipment, excluding manufacturing operations."Modern robots are usually used in tightly
controlled environments such as on assembly lines because they have difficulty responding to
unexpected interference. Because of this, most humans rarely encounter robots. However,
domestic robots for cleaning and maintenance are increasingly common in and around homes
in developed countries.
85
http://www.can-cia.org/index.php?id=1330
Designing a robot
1. Defining a problem
You need to determine what problem you are trying to solve before you attempt to design and
build a robot.
gathering information
identifying specific details of the design which must be satisfied
identifying possible and alternative design solutions
planning and designing an appropriate structure which includes drawings
You decide how a robot will move, manipulate objects, be powered and „sense“ its
surrounding. You also decide on robot’s shape, size, durability, which materials to use, and
potential effects of any new design (factors like health and safety factors, noise, smell,
pollution, etc.)
3. Creating a Prototype
86
Creating a prototype using logo, solving design problems, taking notes and pictures, and
generally improving your robot to optimal quality before deciding on a specific design.
Second and third step are essential in creating a robot you wanted.
Now it is time to program your robot. You can achieve basic intelligence in your robot by
using only relays, potentiometers, bump switches and some discrete components. You can
also add sensors or more sophisticated control elements like microprocessor. Once you've
programmed your robot, you need to test to see if it performs what it's supposed to.
Advances in this field are achieved every day so progress is constant and hard to keep track
of. We can only wonder what the future brings.
Robotical system ROKI is made for assisting in surgical operations. Croatia started to
develop robotics in medicine with this project which is financed by Croatian Institute for
Technology, University of Zadar. Project team consists of 11 scientists who had to define and
make a project idea. Projecting, producing and final examinations are made in Croatian high
technology company HSTEC.
87
References
Fitzgerald, P., McCullagh, M., Tabor, C. (2011). English for ICT Studies in Higher
Education Studies-Course Book. Reading: Garnet Publishing Ltd.
Esteras, S. R. (2008). Infotech – English for Computer Users (4th edition), Student’s
Book. Cambridge: CUP.
Esteras, S. R. (2007). Infotech – English for Computer Users (3rd edition), Student’s
Book. Cambridge: CUP.
Esteras, S. R. (2007). Infotech – English for Computer Users (3rd edition), Workbook.
Cambridge: CUP.
Esteras, S. R., Fabre, E. M. (2007). Professional English in Use. Cambridge: CUP.
Eastwood, J. (1999). Oxford Practice Grammar.Oxford: OxfordUniversity Press.
Glendinning, E.H. and McEwan, J. (2002). Basic English for Computing.Oxford:
OxfordUniversity Press.
Glendinning, E.H. and McEwan, J. (2002). Oxford English for Information
Technology.Oxford: Oxford University Press.
Oxford Collocations Dictionary for Students of English. (2002). Oxford:
OxfordUniversity Press
Riley, D. (1999). Check Your Vocabulary for Computing. Teddington: Peter Collin
Publishing Ltd.
Oxford Dictionary of Computing for Learners of English. (1996). Oxford: Oxford
University Press,
Internet
http://techterms.com/definition/ict
http://en.wikipedia.org/wiki/Internet
http://www.nic.funet.fi/index/FUNET/history/internet/en/etusivu-en.html
http://www.cambridge.org/elt/infotech3ed/study/weblinks/unit21.htm
http://en.wikipedia.org/wiki/World_Wide_Web
http://computer.howstuffworks.com/virus.htm
http://en.wikipedia.org/wiki/Internet_security
http://en.wikipedia.org/wiki/Ten_Commandments_of_Computer_Ethics
http://en.wikipedia.org/wiki/Cyberethics
http://searchcio.techtarget.com/definition/e-commerce
http://www.ichoosetechnology.com.au/home/what-is-ict/ict-in-the-future
http://listverse.com/2014/12/01/10-unconventional-uses-of-nanotechnology/
http://www.nano.gov/nanotech-101/what/definition
88
http://www.nano.gov/you/nanotechnology-benefits
http://en.wikipedia.org/wiki/Electron_microscope
http://www.slideshare.net/sumitpramanik007/nanotechnology-baseddrugdeliveryppt
http://en.wikipedia.org/wiki/Computer_network
http://compnetworking.about.com/
http://www.howstuffworks.com/home-network.htm
89