Giáo trình Tiếng anh chuyên ngành công nghệ thông tin english for information technology

Computer hardware equals the collection of physical elements that comprise a computer system: Phần cứng máy tính là các yếu tố vật chất tạo nên một hệ thống máy tính. Computer software, or just software, is a collection of computer programs and related data that provides the instructions for telling acomputer what to do and how to do it: Phần mềm máy tính thường gọi là phần mềm là các chương trình máy tính và dữ liệu liên quan cung cấp các hướng dẫn để máy tính phải làm gì và cách làm. Short Message Service (SMS) is a text messaging service component of phone, web, or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed line or mobile phone devices: Dịch vụ tin nhắn ngắn (SMS) là một tin nhắn văn bản của điện thoại, web, hoặc các hệ thống thông tin di

pdf146 trang | Chia sẻ: huongthu9 | Lượt xem: 604 | Lượt tải: 0download
Bạn đang xem trước 20 trang tài liệu Giáo trình Tiếng anh chuyên ngành công nghệ thông tin english for information technology, để xem tài liệu hoàn chỉnh bạn click vào nút DOWNLOAD ở trên
nsions are .txt, .pdf, .doc and .htm (or .html). Most of the text files that you find on the Web have the extension .htm, created with the hypertext markup language. Graphics Graphics on the Web can include pictures, photos, paintings, image- maps and buttons. The most common formats are .gif ( a standard image format developed by CompuServe) and .jpg or .jpeg ( created by the Joint Photographic Experts’ Group) Sounds The Internet is a great place to find and hear hit songs, movie soundtracks and recorded interviews. The most common formats are these: • Wav: wav files can be played with Sound Recorder included with Windows • .ra or .ram: RealAudio files can be heard with RealPlayer, a plug- in you can download from the Web. • .mp3: compresses music files that can be played with an MP3 player Video and animation You can see cartoons and movie clips on the Web, but you need the appropriate software. Video files are usually stored in: .avi, .mov and .mpg (or .mpeg) formats. To view MPEG videos you just need Video for Windows. However, to create high-quality movie clips you need a dedicated MPEG expansion card. You can also find animation and 3-D words. The two standard tools to manipulated animated worlds are VRML and Java. To view a virtual animation you need a program like QuickTime VR. Compressed files When you download files, they’re probably compressed. Windows files have a .zip extension. Macintosh files usually have a .sit extension and are opened with StuffIt. V. FURTHER READING Multimedia 104 Multimedia is media and content that uses a combination of different content forms. This contrasts with media that use only rudimentary computer displays such as text-only or traditional forms of printed or hand-produced material. Multimedia includes a combination of text, audio, still images, animation, video, or interactivity content forms. Multimedia is usually recorded and played, displayed, or accessed by information content processing devices, such as computerized and electronic devices, but can also be part of a live performance. Multimedia devices are electronic media devices used to store and experience multimedia content. Multimedia is distinguished from mixed media in fine art; by including audio, for example, it has a broader scope. The term "rich media" is synonymous for interactive multimedia. Hypermedia can be considered one particular multimedia application. 105 CHAPTER 6. PROGRAMMING UNIT 13 PROGRAM DESIGN I. VOCABULARY Assembly language Assembler Associate binary code complex convert Compiler diagnosing High – level language mnemonic Machine code Problem – oriented Object program Source program symbolic version hợp ngữ bộ dịch hợp ngữ Kết hợp, cộng tác Mã lưỡng phân (nhị phân) Phức tạp, rắc rối Biến đổi, chuyển đổi Bộ biên dịch, trình biên dịch Chuẩn đoán, miêu tả đặc trưng ngôn ngữ lập trình bậc cao Trí nhớ, giúp trí nhớ Mã máy hướng vấn đề chương trình đích chương trình nguồn Tượng trưng, biểu tượng Bản dịch 106 II. LANGUAGE WORK Infinitive constructions The infinitive is used: • after adjectives - It is difficult to use machine code. • after modal verbs with to : ought to, used to - I ought to make a back-up copy. - Using a computer is much easier than it used to be. • after modal and auxiliary verbs without to : can, could, may, might, shall, should, will, would, would rather, would rather, would sooner - Unfortunately, computers can’t understand English. - I ‘d rather buy a game than a spreadsheet. III. READING COMPREHENSION Task 1. Warm up In pairs, try to think of an answer for the question. What is programming ? Look at the definition in the Glosary. Is it similar to yours? Task 2. Complete the following definitions with the words and phrases in the box. The various parts of the program may occur in programs language Binary numbers a given problem 1. Algorithm The step – by – step specification of how to reach the solution to 2. Flow chart A diagram representing the logical sequence between 3. Coding The translation of the logical steps into a programming 4. Machine code 107 The basic instructions understood by computers. The processor operates on code which consists of . 5. Debugging The techniques of detecting, diagnosing, and correcting errors ( or “bugs “ ) which. Task 3. Read the text and find answers to these questions. 1. Do computers understand human languages? 2. What are the differences between low – level and high – level languages? 3. What is an assembler? 4. What is the function of compilers? 5. What do you understand by the terms source program and object program? 6. In the future, could computers be programmed in Spanish, French, or Japanese? Programming languages Unfortunately, computers cannot understand ordinary spoken English or any other natural language. The only language they can understand directly is called machine code. This consists of the 1s and 0s (binary code) that are processed by the CPU. However, machine code as a means of communication is very difficult to write. For this reason, we use symbolic languages that are easier to understand. Then, by using a special program, these languages can be translated into machine code. For example, the so – called assembly languages use abbreviations such as ADD, SUB, MPY to represent instructions. These mnemonic codes are like labels easily associated with the items to which they refer. Basic languages, where the program is similar to the machine code version, are known as low – level languages. In these languages, each instruction is equipvalent to a single machine code instruction, and the program is converted into machine code by a special program called an assembler. These languages are still quite complex and restricted to particular machines. 108 To make the programs easier to write and overcome the problem of intercommunication between different types of machines, higher – level languages were designed such as BASIC, COBOL, FORTRAN, or Pascal. These are all problem – oriented rather than machine- oriented. Program written in one of these languages (known as source programs) are converted into a lower- level language by means of a compiler (generating the object- program). On compilation, each statement in a high – level language is generally translated into many machine code instructions. People communicate instructions to the computer in symbolic languages and the easier this communication can be made, the wider the application of computers will be. Scientists are already working on Artificial Intelligence and the next generation of computers may be able to understand human languages. Instructions are written In a high – level language ( e.g Pascal, BASIC, COBOL, Ada, C, Lisp ) This is known as the source program  .  Instructions are compiled and packaged into a program. The software is ready to run on the computer. Task 4. Make sentences as in the example. Example: Not easy / write instructions in Pascal Compiler Compilers translate the original code into a lower-level language or machine code so that the CPU can understand it 109 It is not easy to write instructions in Pascal. 1 Advisable / test the program under different conditions. 2 Expensive / set up a data – processing area. 3 Unusual for a program / Work correctly the first time it is tested. 4 Difficult for students / learn FORTRAN. 5 Important / consider the capabilities of the programming language. 6 Quite easy / write instructions in BASIC. IV. PRACTICE Exercise 1. Now look again at the reading passage in Task 2. Underline the infinitive constructions after modal verbs. Example: Unfortunately, computers cannot understand ordinary spoken English Exercise 2. Look at these pairs of examples and decide where there is an “important “change in meaning. 1 a I remember shutting down the computer before I left the room. b Please, remember to buy the new program. 2 a They stopped to look at the flowchart. b They stopped looking at the flowchart. 3 a I like studying C language. b I like to study C language in the evening. 4 a It has started to rain. b It has started to raining. 5 a He needs to work harder. b This hard disk needs repairing. 110 V. FURTHER READING Program Design Language Program Design Language (or PDL, for short) is a method for designing and documenting methods and procedures in software. It is related to pseudocode, but unlike pseudocode, it is written in plain language without any terms that could suggest the use of any programming language or library. PDL was originally developed by the company Caine, Farber & Gordon and has been modified substantially since they published their initial paper on it in 1975. It has been described in some detail by Steve McConnell in his book Code Complete. 111 UNIT 14 LANGUAGES I. VOCABULARY Appliance Thiết bị, dụng cụ Extensible Có thể mở rộng, kéo dài ra Element Yếu tố, nguyên lý cơ bản Fetch Tìm về, trào ra, bán được Lucent Sáng chói, sáng ngời Manufacture Sự chế tạo, sản xuất Philosophy Triết học, triết lý Portals Cổng, cửa Recognition Sự công nhận, thừa nhận, nhận ra Synthesis Sự tổng hợp Toolbox Hộp dụng cụ Utility Tính thiết thực, thực tiễn, tiện ích II. LANGUAGE WORK The passive HELP box The passive The passive is formed with the verb to be in the correct tense and the 112 past participle of the main verb. Instructions are processed by the CPU. The computer was invented by Charles Babbage. III. READING COMPREHENSION Task 1. Warm-up 1. Make a list of as many computer languages as you can think of. 2. Do you know any languages used to interact with the Internet through voice-recognition? Task 2. Read the voice XML language Study this table and answer the questions below. Language Date Characteristics Uses VXML or voice XML (Voice extensible markup language) Created by a Working Group of four companies- AT and T, lucent, Motorola and IBM 2000 Based on the XML language For input, Voice XML uses voice recognition. For output, it uses pre- recorded audio content and speech synthesis (text-to-speech) How do you access a voice web portal? First, you dial its phone number. Then the call is received by a telephone server and the Voice XML pages are fetched via HTTP. Finally, you get the required information. A typical Voice XML page could be “sports. vxml”. Used to create voice-user interfaces. Make Internet content accessible via voice and phone. Instead of using a web browser on a PC, you use the telephone to access voice-equipped websites via a Voice XML interpreter (a voice browser) Application: -Voice portals (telephone services where you can hear information about sports, news, traffic, ect. - Voice-enables intranets - Voice e-commerce - Home appliances controlled by voice. 1. What does VXML mean? 113 2. Who created voice XML? 3. When was it developed? 4. What technologies does it use for input and output? 5. What are the most suitable applications for voice XML? 6. What do you think are the benefits of having a voice Web? PRACTICE Exercise 1. Look at the HELP box and then complete these sentences with a suitable verb form. 1. COBOL (use)for business applications. 2. Original programs (write)in a high-level language. 3. All computer languages (must translate)into binary commands. 4. The ADA language (develop)in 1979. 5. In the 1970s, new languages such as LISP and PROLOG (design).for research into Artificial Intelligence. 6. A new version of Turbo Pascal (release)..just. 7. In the next century, computers (program).in natural languages like English or French. Exercise 2. How do you make the passive in your language? Exercise 3. Read the passage and complete it with the verbs in brackets in the correct form. Visual BASIC Visual BASIC is a programming language and an environment (develop)by Microsoft in 1990. It (use) to create applications for Windows operating systems. The name “BASIC” (stand) .. for Beginner’s All-purpose Symbolic Instruction Code. The original BASIC language (create)....in 1965 and adopted by many programmers and PC manufacturers because it was user-friendly and easy to learn. 114 The adjective “Visual” refers to the technique used to create a graphical user interface. Instead of (write) a lot of instructions to describe interface elements, you just (add).pre-defined objects such as buttons and dialog boxes, which can (choose)from a toolbox. It (take) .. only a few minutes to create a Visual BASIC program. Using the mouse, you simply (drag)and drop controls (e.g. option buttons, text boxes, icons, menu bar, etc.) into the required position, and then define their color, size and behavior. Thanks to its object-oriented philosophy and interactive nature, Visual BASIC (enable) the programmer to quickly create all sorts of applications from small system utilities to database programs and Internet server applications. IV. FURTHER READING Language Language is the human capacity for acquiring and using complex systems ofcommunication, and a language is any specific example of such a system. The scientific study of language is called linguistics. It is impossible to know precisely how many languages there are in the world, and the number depends on a partly arbitrary distinction between languages and dialects. However, estimates vary between around 6,000 and 7,000 languages in number. Natural languages are spoken or signed, but any language can be encoded into secondary media using auditory, visual or 115 tactile stimuli, for example in graphic writing, braille, or whistling. This is because human language is modality-independent. When used as a general concept, "language" may refer to the cognitive ability to learn and use systems of complex communication, or to describe the set of rules that makes up these systems, or the set of utterances that can be produced from those rules. 116 CHAPTER VII. COMPUTERS TOMORROW UNIT 15 INTERNET ISSUE I. VOCABULARY alert Cảnh báo, báo động attack Tấn công, ăn mòn attachment Phụ tùng, đính/gắn kèm. Break into Đột nhập Bulletin Bản tin ( trình bày ngắn gọn) Certificate Chứng nhận, chứng chỉ Confidential Bí mật, riêng tư Consultant Người tư vấn, cố vấn Crucial Quyết định, cốt yếu, chủ yếu Decryption Giải mã Disable Phá hỏng, mất khả năng hoạt động Download Tải xuống encryption. Mã khóa encode Mã hóa Expose Phơi, bày, vạch trẩn Hacker Người giỏi dùng, lập trình máy, tin tặc 117 Illegally Bất hợp pháp, trái luật pháp Intermediary Trung gian Infiltrated Xâm nhập Intruders Kẻ xâm phạm, xâm nhập Lock khóa Plain Khu vực rộng, phẳng. Private Cá nhân, riêng tư Propagate Phổ biến, truyền bá, truyền Protection Bảo vệ Security Sự an ninh, sự bảo đảm Solution Giải pháp Temporarily Một cách tạm thời Transaction Giải quyết, thực hiện, giao dịch (un)scrupulous Cẩn thận, tỉ mỉ, chi tiết II. LANGUAGE WORK HELP box • Hacker: a person who obtains unauthorized access to computer data • Cookies: small files used by Web servers to know if you have visited their site before. • Certificates: file that identify users and Web servers on the net, like digital identification cards. • Encryption: the process of encoding data so that unauthorized users can’t read it. • Decryption: the process of decoding encrypted data transmitted to you III. READING COMPREHENSION Task 1. Warm-up Try to answer these questions. 1. Is it technically possible for computer criminals to infiltrated into the Internet and steal sensitive information? ......................................................................................................................... 2. What is a hacker? ......................................................................................................................... 118 3. Can viruses enter your PC from the internet? ......................................................................................................................... Task 2. Read about security and privacy on the internet There are a lot of benefits from an open system like the internet, but we are also exposed to hackers who break into computer systems just for fun, as well as to steal information or propagate viruses. So how do you go about making online transactions secure? Security on the Web The question of security is crucial when sending confidential information such as credit card numbers. For examples, consider the process of bying a book on the Web. You have to type your credit card number into an order form which passes from computer to computer on its way to the online bookstore. If one of the intermediary computers is infiltrated by hackers, your data can be copied. It is difficult to say how often this happens, but it’s technically possible. To avoid risks, you should set all security alerts to high on your Web browser. Netscape communicator and Internet Explorer display a lock when the Web page is secure and allow you to disable or delete “cookies” If you use online bank services, make sure your bank uses digital certificates. A popular security standard is SET (secue electronic transactions) Email privacy Similarly, as your e-mail message travels across the net, it is copied temporarily on many computers in between. This means it can be read by unscrupulous people who illegally enter computer systems. 119 The ony way to protect a message is to put it in a sort of “envelope”, that is, to encode it with some form of encryption. A system designed to send e-mail privately is Pretty Good Privacy, a freeware program written by Phil Zimmerman. Network security. Private networks connected to the Internet can be attacked by intruders who attempt to take valuable information such as Social Security numbers, bank accounts or research and business reports. To protect crucial data, companies hire security consultants who analyse the risks and provide security solutions. The most common methods of protection are passwords for access control, encyryption and decryption systems, and firewalls. Virus Protection Viruses can enter a PC through files from disks, the Internet or bulletin board systems. If you want to protect your system, don’t open e- mail attachments from strangers and take care when downloading files from the Web. (Plain text e-mail alone can’t pass a virus) Remember also to update your anti-virus software as often as possible, since new viruses are being created all the time. 120 Task 3. Read the text and find answers to these questions 1. Why is security so important on the Internet? ......................................................................................................................... ......................................................................................................................... 2. What security features are offered by Netscape Communicator and Interner Explorer? ......................................................................................................................... ......................................................................................................................... 3. What security standard is used by most banks to make online transactions secure? ......................................................................................................................... ......................................................................................................................... 4. How can we protet and keep our e-mail private? ......................................................................................................................... ......................................................................................................................... 5. Which ways can a virus enter a computer system? ......................................................................................................................... ......................................................................................................................... IV. PRACTICE Exercise 1. Match the sentences on the left with the explanations on the right A B 1. update your anti- virus software a. make sure your bank uses digital certificates. 2. protect your system b. A popular security standard 3. The most common methods of protection c. since new viruses are being created all the time. 4. to protect a message d. don’t open e-mail attachments from strangers 5. To avoid risks e. passwords for access control, encyryption and decryption systems, and firewalls 6. If you use online bank services f. to put it in a sort of “envelope” 7.SET (secue g. you should set all security alerts to high on your 121 electronic transactions) Web browser. Exercise 2. Translate the sentences into Vietnamese 1. You have to type your credit card number into an order form which passes from computer to computer on its way to the online bookstore. If one of the intermediary computers is infiltrated by hackers, your data can be copied. ......................................................................................................................... ......................................................................................................................... ......................................................................................................................... ......................................................................................................................... 2. To avoid risks, you should set all security alerts to high on your Web browser. Netscape communicator and Internet Explorer display a lock when the Web page is secure and allow you to disable or delete “cookies” ......................................................................................................................... ......................................................................................................................... ......................................................................................................................... 3. A system designed to send e-mail privately is Pretty Good Privacy, a freeware program written by Phil Zimmerman. ......................................................................................................................... ......................................................................................................................... 4. Private networks connected to the Internet can be attacked by intruders who attempt to take valuable information such as Social Security numbers, bank accounts or research and business reports. ......................................................................................................................... ......................................................................................................................... ......................................................................................................................... 5. Viruses can enter a PC through files from disks, the Internet or bulletin board systems. If you want to protect your system, don’t open e-mail attachments from strangers and take care when downloading files from the Web. ......................................................................................................................... ......................................................................................................................... ......................................................................................................................... 122 V. FURTHER READING INTRODUCTION TO NETWORKING A basic understanding of computer networks is requisite in order to understand the principles of network security. In this section, we'll cover some of the foundations of computer networking, then move on to an overview of some popular networks. Following that, we'll take a more in- depth look at TCP/IP, the network protocol suite that is used to run the Internet and many intranets. Once we've covered this, we'll go back and discuss some of the threats that managers and administrators of computer networks need to confront, and then some tools that can be used to reduce the exposure to the risks of network computing. 123 UNIT 16 LANs AND WANs Libraries use a WAN to keep records of loans and to supply information to library users who have modems I. VOCABULARY Backup device thiết bị sao lưu Desktop màn hình nền Enable cho phép Including chứa, bao hàm, bao gồm Intermediary device thiết bị trung gian Local area network – LAN mạng cục bộ Network mạng máy tính, mạng Network interface card thẻ giao tiếp mạng Posting gửi thông báo Resource tài nguyên Share chia sẻ 124 Server máy chủ Via Qua, theo đường, thông qua Within trong vòng Wide area network – WAN mạng diện rộng II. LANGUAGE WORK Ability: CAN - Can is used to express possibility E.g. You can buy a computer at the hardware store. - Can is used to express ability: E.g. Computer can save a lot of information. - Can is used to express an acquired skill. In example can use = knows how to use. E.g. Maria can use the computer. She has been taking lessons for many years III. READING COMPREHENSION LANs and WANs A network is simply two or more computers linked together. It allows users to share not only data files and software applications but also hardware like printers and other computer resources such as fax. Most networks link computers within a limited area – within a department, an office or a building. These are called Local Area Networks, or LANs. But networks can link computers across the world, so you can share information with someone on the other side of the world as easily as 125 sharing with a person at the next desk. When networks are linked together in this way they are called Wide Area Networks, or WANs. Networks increase productivity by allowing workers to share information easily without printing, copying, telephoning, or posting. They are also save money by sharing peripherals such as printers. Task 1. Answer the questions 1. What is a LANs? ......................................................................................................................... ......................................................................................................................... 2. What is a WAN? ......................................................................................................................... ......................................................................................................................... 3. What are the advantages of networks? ......................................................................................................................... ......................................................................................................................... 4. What is the difference between a Local Area Network and Wide Area Network? ......................................................................................................................... ......................................................................................................................... 5. What are its hardware components? ......................................................................................................................... ......................................................................................................................... Task 2. Now read the passage and find out if your answer were correct WANs AND WORLDWIDE COMMUNICATIONS For long-distance or worldwide communications computers and LANs are usally connectec into a wide area network (WAN) to form a single intergrated network. The largest WAN in existence is the Internet. Networks can be linked together by either Telephone lines or fibre- optic cables. For example, ISDN (intergrated services digital network) and ADSL (Asymmetric Digital Subscriber Line) are an international standard for transmitting digital text, sound, voice and video data over telephone lines. On the other hand, FDDI (fibre distributed data interface) is an optical- fibre network. It transmits data at great speed -100 magabits ore 126 second. A vaiation called FDDT transmits data at 200 Mbps. FDDI networks are typically used as backbones for wide area networks. Modern telecommunications use fibre-optic cables because data can be transmitted at a very high speed through the extremely wide bandwidths of glass fibres. The fibre system operates by transmitting light pulses at high frequencies along the glass fibre. This offers considerables advantages (i) the cables require little physical space (ii) They are safe because they don’t carry electricity; (iii) they avoid electromagnetic interference. Networks on different continents can also be connected via Satelite. Computers are connected by a modem either to ordinary telephone wires or fibre-optic cables, which are linked to a dish aerial. This aerial has a large concave reflector for the reception and dending of signals. Then, when signals are received by the satellite, they are amplifieds and sent on to workstations in another part of the world. Task 3. Answer these questions 1. How can computers be linked up over a long distance? ......................................................................................................................... ......................................................................................................................... 2. What are the advantages of optical- fibre cables over telephong lines? ......................................................................................................................... ......................................................................................................................... 3. What is the function of communications satellites? ......................................................................................................................... ......................................................................................................................... 127 IV. PRACTICE Exercise 1. Identify these hardware components of the network. a. ___________________ most networks have at least one central computer which all the desktop computers connect to. This is the most important computer on your network. It stores the data files and application software programs that the users need to access or share it with others. b. ___________________ this is the desktop computer or notebook computer on your desk. It is linked to the server, and can access rules and applications on it. Each computer on the network has a device called a network interface card which connects the computer to the network. Many computers come with these cards fitted as standard. c. ___________________ Once you have a network you can share any number of these, including printers, scanners, CD-ROM drives, and backup drives. d. ___________________ Desktops typically connect via telephone- type cabling to this intermediary device, which enables communication between servers and desktops. Exercise 2. Match from (1-10) with (a-j). 1. You place a floppy disk near a magnet a. It is not lost when you switch off 2. You press Print Screen b. The computer hang 3. You input the correct password c. The cursor moves to the left 4. You add memory to a computer d. You damage the drive 5. You move the mouse to the left e. You copy the screen 6. You store data in RAM f. You have access to the network 7. You use a faster modem g. You destroy the data 8. There is a memory fault h. It runs faster 9. You press the arrow key i. Your phone bill are lower 10. You move a CD-ROM drive with the disk in place. j. The cursor moves across the screen Exercise 3. Translate the sentences into Vietnamese 128 1. Most networks link computers within a limited area – within a department, an office or a building. These are called Local Area Networks, or LANs. But networks can link computers across the world, so you can share information with someone on the other side of the world as easily as sharing with a person at the next desk. .. .. .. 2. Networks increase productivity by allowing workers to share information easily without printing, copying, telephoning, or posting. They are also save money by sharing peripherals such as printers. .. .. 3. Networks can be linked together by either Telephone lines or fibre-optic cables. For example, ISDN (intergrated services digital network) and ADSL (Asymmetric Digital Subscriber Line) are an international standard for transmitting digital text, sound, voice and video data over telephone lines. .. .. .. 4. Modern telecommunications use fibre-optic cables because data can be transmitted at a very high speed through the extremely wide bandwidths of glass fibres. .. 5. Networks on different continents can also be connected via Satelite. Computers are connected by a modem either to ordinary telephone wires or fibre-optic cables, which are linked to a dish aerial. 129 .. .. V. FURTHER READING Introduction to Network Types LAN, WAN and Other Area Networks One way to categorize the different types of computer network designs is by their scope or scale. For historical reasons, the networking industry refers to nearly every type of design as some kind of area network. Common examples of area network types are: • LAN - Local Area Network • WLAN - Wireless Local Area Network • WAN - Wide Area Network • MAN - Metropolitan Area Network • SAN - Storage Area Network, System Area Network, Server Area Network, or sometimes Small Area Network • CAN - Campus Area Network, Controller Area Network, or sometimes Cluster Area Network • PAN - Personal Area Network 130 • DAN - Desk Area Network LAN and WAN were the original categories of area networks, while the others have gradually emerged over many years of technology evolution. Note that these network types are a separate concept from network topologies such as bus, ring and star. 131 UNIT 17 NEW TECHNOLOGIES I. VOCABULARY Authentication xác thực, xác nhận là đúng Deliver Phân phối Dialpad Bàn phím E-commerce Thương mại điện tử Eliminate loại trừ, loại ra, rút ra Flip up Búng, khiếm nhã, bỡn cợt Gadget đồ dùng, bộ phận cải tiến Handheld xách tay Head-mounted Đội trên đầu Headset bộ ống nghe điện đài Hybrid Lai, ghép 132 Illusionary ảo giác, ảo tưởng Imaginary ảo, tưởng tượng Immersed Ngâm, chìm Incorporate Hợp nhất, kết hợp chặt chẽ Initiate đề sướng, khởi nguồn, bắt đầu Interact Tương tác Propelled Đẩy đi, đẩy tới, chất nổ Protocol Giao thức Pop up Xuất hiện, xảy ra bất ngờ Reluctant Miễn cưỡng Satellite Vệ tinh nhân tạo Simulation Mô phỏng Simultaneously một cách đồng thời Transmit Truyền, phát Vice versa Ngược lại Wireless Không giây 3G (third- generation) thế hệ thứ ba 3D (three-dimensional) ba chiều VR (virtual) Ảo WAP (Wireless Application Protocol) Giao thức ứng dụng không dây PDA (personal digital assistant) Thiết bị hỗ trợ cá nhân kỹ thuật số II. LANGUAGE WORK Making predictions HELP box • Future with will/shall A computer program will be the world chess champion. • Future contuous (will be + present participle) In twenty years’ time, some people will be living in space, inside a 133 computerized colony. • Future perfect ( will have + past participle) By 2020, new technology will have revolutionized communications. • Special structures - Possibility (may/might/could) Scientists may discover new electronic components. - Probability (likely to) Talking machines are likely to be built - Certainly (certainly, definitely, certain to) Working hours will definitely become shorter with the help of computers. Prices are certain to go up. III. READING COMPREHENSION Task 1. Look at these pictures and match them with texts 1 to 4 New product 1. Not long ago, mobile phones could just transmit voice and SMS messages. Now they can display Internet information thanks to the Wireless Application Protocol or WAP. Some hybrid models combine a phone with a PDA. They look like a regular phone with a dialpad and a small screen on its front. But if you flip up the front cover you find a larger screen that is touch-sensitive. Some include a virtual keyboard which pops up when you want to enter email text or a WAP address. But the future is called “third-generation” (3G) mobiles. They transmit a caller’s picture and voice simultaneously. UMTS mobile phones deliver users information, e-commerce, games and videoconferencing via fixed, wireless and satellite networks. 2. Internet TV sets allow you to surf the Web and have email while you are watching TV, or vice versa. Imagine watching a film on TV and simultaneously accessing a Web site where you get information on the actors in the film. This is ideal for people who are reluctant to use PCs but are interested in the Internet. 134 Web TV was the first company which brought Internet services to TV viewers through a set – top computer box. Another option is WorldGate’s technology, which offers the Internet through cable TV. The model built by OEM Metec integrates a complete Windows PC in a TV set. The next generation of Internet – enabled televisions will incorporate a smart-card for home shopping, banking and other interactive services. a b c d 3. Virtual reality lets people interact with artificial objects and environments through three-dimensional computer simulation. In a VR system, you are hooked to a computer through a controlling device, such as a glove, and head-mounted displays give you the feeling of being propelled into an artificial three-dimensional world. The computer brings to life 135 events in a distant, virtual world using databases or real-time objects and sounds. Your senses are immersed in an illusionary, yet sensate, world. VR can be applied to anything from video games, testing a motor vehicle, visiting a virtual exhibition, to checking out imaginary kitchen designs. 4. Bluetooth is a standard wireless technology designed to connect mobile phones computers and other devices, replacing direct cable links. Since it uses high-frequency radio waves, the transfer of data and voice is very fast. All data are protected by advanced methods of encryption and authentication. Bluetooth was initiate by Ericsson and the objective was to eliminate cables between mobile phones, PC cards, headsets, ect. Today it is supported by companies such as Nokia, IBM, Toshiba and Intel. With Bluetooth, a handheld computer can be used to surf the Internet wherever you are, or to transfer files with other participants in meetings. Mobile phones will soon be used to control all sorts of gadgets in the house, from TV sets to refrigerators. • PDA Personal Digital Assistant which includes an address book, a calendar, Internet access, ect. • WAP Wireless Application Protocol which enables mobile phones to access the Internet. • IBM International Business Machines. Task 2. Write a suitable caption under each picture. Task 3. Look at the picture below and read the text. Then discuss these questions in small groups and prepare a short report for the class. 1. What are the most important differences between handheld computers (eg. palmtops, PDAs, ect.) and traditional compters? ......................................................................................................................... ......................................................................................................................... 2. What are the advantages and limitations of handheld computers? ......................................................................................................................... ......................................................................................................................... 136 Psion Series 5mX handheld computers have a keyboard and a touch-sensitive screen. Although every light weight, they have one month battery capacity, 16 MB of RAM, a windowing OS, a microphone for sound recording and a full range of application which lets you sent e-mail and browse the web 3. Should students be allowed to use handheld computers in class? ......................................................................................................................... ......................................................................................................................... 4. Do you agree with this statement: “Soon, handheld PCs will combine the functions of traditional PCs, cellular phones and pocket-size organizers? ......................................................................................................................... ......................................................................................................................... IV. PRACTICE Exercise 1. Match the terms on the left with the explanations on the right. 1 Internet – enabled TV a Location on the Internet where a company puts web pages 2 Website b Technology that allows users to see a computer simulated world in which they can move. 3 Virtual reality c TV set used as an Internet device 4 WAP d Device that can handle multiple data types including voice and video. 5 Wireless e Protocol that enables mobile phones to access Internet information. 6 3G mobile phone f Without the use of cables. 137 Exercise 2. Look at the HELP box and then expand these sentences using the future perfect tense. 1. In ten years time/a lot of people/connect their television to the telephone line. 2. Portable PCs/replace/desktop PCs/in a few years’ time. 3. With the help of computers/doctors/find/cure/AIDS and cancer/by the year 2010. 4. By this time next year/software manufactures/make/hundreds of new programs. 5. by 2020/ post offices and bookshops/disappear. 6. By this time next year/I/Buy/handheld computer. Exercise 3. Here are some predictions made by an intelligent supercomputer. In small groups, write your own predictions. * Work/jobs Eg. By the year 2030 human labour in industry will have been replace by robots. Yours: 138 • Homes Eg. Families will have robots to do the housework. Yours: Education/Schools Eg. By the end of the next century, every student in every school in the world will have a PC Yours: Money/Holidays Eg. Cash will disapper Yours: Exercise 4. Translate the sentences into Vietnamese 1. Some hybrid models combine a phone with a PDA. They look like a regular phone with a dialpad and a small screen on its front. But if you flip up the front cover you find a larger screen that is touch-sensitive. 139 2. Internet TV sets allow you to surf the Web and have email while you are watching TV, or vice versa. Imagine watching a film on TV and simultaneously accessing a Web site where you get information on the actors in the film. 3. In a VR system, you are hooked to a computer through a controlling device, such as a glove, and head-mounted displays give you the feeling of being propelled into an artificial three-dimensional world. 4. Bluetooth is a standard wireless technology designed to connect mobile phones computers and other devices, replacing direct cable links. Since it uses high-frequency radio waves, the transfer of data and voice is very fast. 5. With Bluetooth, a handheld computer can be used to surf the Internet wherever you are, or to transfer files with other participants in meetings. Mobile phones will soon be used to control all sorts of gadgets in the house, from TV sets to refrigerators. V. FURTHER READING SPEED BOOST 140 Also pushing the wired-to-wireless envelope is the approval of the 802.11n wireless standard, coupled with capabilities that render it superior to 802.11a, 802.11b and 802.11g. “Ratification has made the standard mainstream, so end-users are comfortable going wireless even for mission- critical applications, like office videoconferencing and retail inventory management,” asserts Dilip Advani,productmanager,AirMagnet Vendors and VARs say customers in many vertical markets favor the improved throughput available with 802.11n Wi-Fi, which reportedly offers four to six times the bandwidth available under 802.11 a/b/g standards. Other advantages of 802.11n over its predecessors encompass enhanced efficiency bolstered by MIMO (multiple input and multiple output) technology, wherein multiple antennas are employed at the network’s transmitter and receiver. MIMO accomplishes the boost via higher spectral efficiency, which yields more bits per second per hertz of bandwidth, and link reliability or diversity, which reduces fading. Additionally, 802.11n has the potential to support more users per single access point than its predecessors, with the extra promise of better 141 performance from less equipment, observes Joe Epstein, senior director of technology, Meru Networks 142 PHỤ LỤC A central processing unit (CPU), also referred to as a central processor unit, is the hardware within a computer system or smartphone which carries out the instructions of a computer program by performing the basic arithmetical, logical, and input/output operations of the system: Bộ xử lý trung tâm (CPU) là phần cứng trong một máy tính hoặc điện thoại thông minh thực hiện các hướng dẫn của chương trình máy tính bằng cách thực hiện các phép tính cơ bản, và nhập/ xuất dữ liệu của hệ thống A personal computer (PC) is a microcomputer designed for use by one person at a time: máy tính cá nhân (PC) là máy vi tính được thiết kế để một người sử dụng tại một thời điểm. Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength radio transmissions in the ISM band from 2400–2480 MHz) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security: Bluetooth là một chuẩn công nghệ không dây để trao đổi dữ liệu trên một khoảng cách ngắn (bằng cách sử dụng truyền dẫn vô tuyến bước sóng ngắn trong băng tần ISM từ 2400-2480 MHz) từ các thiết bị di động và cố định, tạo ra các vùng mạng cá nhân (chảo) với mức độ bảo mật cao. Computer hardware equals the collection of physical elements that comprise a computer system: Phần cứng máy tính là các yếu tố vật chất tạo nên một hệ thống máy tính. Computer software, or just software, is a collection of computer programs and related data that provides the instructions for telling acomputer what to do and how to do it: Phần mềm máy tính thường gọi là phần mềm là các chương trình máy tính và dữ liệu liên quan cung cấp các hướng dẫn để máy tính phải làm gì và cách làm. Short Message Service (SMS) is a text messaging service component of phone, web, or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed line or mobile phone devices: Dịch vụ tin nhắn ngắn (SMS) là một tin nhắn văn bản của điện thoại, web, hoặc các hệ thống thông tin di 143 động, bằng cách sử dụng giao thức truyền thông tiêu chuẩn cho phép việc trao đổi tin nhắn văn bản ngắn giữa điện thoại cố định hoặc các thiết bị điện thoại di động. Storage Devices are the data storage devices that are used in the computers to store the data: Thiết bị lưu trữ là thiết bị lưu trữ dữ liệu được sử dụng trong các máy tính để lưu trữ các dữ liệu. 144 TÀI LIỆU THAM KHẢO 1. Betty Schrampfer Azar , 2001. Understanding and using English Grammar, The Youth Press 2. Jesson, J & Peacock, G, 2003, Starter Award in ICT: Next Steps, Cambridge University Press 3. Meredith, S, 2004, Starting Computers, Usborne Publishing Ltd 4. Raymond Murphy, 1994, English grammar in use, Nhà xuất bản Giáo dục. 5. Randolph Quirk & Sydney Greenbaum, 2008, A university Grammar of English, Nhà xuất bản Hải Phòng. 6. Santiago Remacha Esteras, 2003, English for computer users, Cambridge university press. 7. Thac Binh Cuong , 2000, English for IT and computer users, Ha Noi science and technology Press. 8. Trần Hữu Mạnh, 2008, Fundamentals of English Traditional Syntax, Nhà xuất bản Đại học Quốc Gia- Hà nội. 9. www.computerhope.com/jargon/.../contunit.ht... 10. www.apple.com/mac. 11. compnetworking.about.com/.../network_types

Các file đính kèm theo tài liệu này:

  • pdfgiao_trinh_tieng_anh_chuyen_nganh_cong_nghe_thong_tin_englis.pdf