Computer hardware equals the collection of physical elements that
comprise a computer system: Phần cứng máy tính là các yếu tố vật chất tạo
nên một hệ thống máy tính.
Computer software, or just software, is a collection of computer
programs and related data that provides the instructions for telling
acomputer what to do and how to do it: Phần mềm máy tính thường gọi là
phần mềm là các chương trình máy tính và dữ liệu liên quan cung cấp các
hướng dẫn để máy tính phải làm gì và cách làm.
Short Message Service (SMS) is a text messaging service component
of phone, web, or mobile communication systems, using standardized
communications protocols that allow the exchange of short text messages
between fixed line or mobile phone devices: Dịch vụ tin nhắn ngắn (SMS)
là một tin nhắn văn bản của điện thoại, web, hoặc các hệ thống thông tin di
146 trang |
Chia sẻ: huongthu9 | Lượt xem: 604 | Lượt tải: 0
Bạn đang xem trước 20 trang tài liệu Giáo trình Tiếng anh chuyên ngành công nghệ thông tin english for information technology, để xem tài liệu hoàn chỉnh bạn click vào nút DOWNLOAD ở trên
nsions are .txt, .pdf, .doc and .htm (or
.html). Most of the text files that you find on the Web have the
extension .htm, created with the hypertext markup language.
Graphics
Graphics on the Web can include pictures, photos, paintings, image-
maps and buttons. The most common formats are .gif ( a standard image
format developed by CompuServe) and .jpg or .jpeg ( created by the
Joint Photographic Experts’ Group)
Sounds
The Internet is a great place to find and hear hit songs, movie
soundtracks and recorded interviews. The most common formats are
these:
• Wav: wav files can be played with Sound Recorder included with
Windows
• .ra or .ram: RealAudio files can be heard with RealPlayer, a plug-
in you can download from the Web.
• .mp3: compresses music files that can be played with an MP3
player
Video and animation
You can see cartoons and movie clips on the Web, but you need the
appropriate software. Video files are usually stored in: .avi, .mov and
.mpg (or .mpeg) formats. To view MPEG videos you just need Video
for Windows. However, to create high-quality movie clips you need a
dedicated MPEG expansion card. You can also find animation and 3-D
words. The two standard tools to manipulated animated worlds are
VRML and Java. To view a virtual animation you need a program like
QuickTime VR.
Compressed files
When you download files, they’re probably compressed. Windows files
have a .zip extension. Macintosh files usually have a .sit extension and
are opened with StuffIt.
V. FURTHER READING
Multimedia
104
Multimedia is media and content that uses a combination of
different content forms. This contrasts with media that use only
rudimentary computer displays such as text-only or traditional forms of
printed or hand-produced material. Multimedia includes a combination
of text, audio, still images, animation, video, or interactivity content forms.
Multimedia is usually recorded and played, displayed, or accessed
by information content processing devices, such as computerized and
electronic devices, but can also be part of a live performance. Multimedia
devices are electronic media devices used to store and experience
multimedia content. Multimedia is distinguished from mixed media in fine
art; by including audio, for example, it has a broader scope. The term "rich
media" is synonymous for interactive multimedia. Hypermedia can be
considered one particular multimedia application.
105
CHAPTER 6. PROGRAMMING
UNIT 13
PROGRAM DESIGN
I. VOCABULARY
Assembly language
Assembler
Associate
binary code
complex
convert
Compiler
diagnosing
High – level language
mnemonic
Machine code
Problem – oriented
Object program
Source program
symbolic
version
hợp ngữ
bộ dịch hợp ngữ
Kết hợp, cộng tác
Mã lưỡng phân (nhị phân)
Phức tạp, rắc rối
Biến đổi, chuyển đổi
Bộ biên dịch, trình biên dịch
Chuẩn đoán, miêu tả đặc trưng
ngôn ngữ lập trình bậc cao
Trí nhớ, giúp trí nhớ
Mã máy
hướng vấn đề
chương trình đích
chương trình nguồn
Tượng trưng, biểu tượng
Bản dịch
106
II. LANGUAGE WORK
Infinitive constructions
The infinitive is used:
• after adjectives
- It is difficult to use machine code.
• after modal verbs with to : ought to, used to
- I ought to make a back-up copy.
- Using a computer is much easier than it used to be.
• after modal and auxiliary verbs without to : can, could, may, might,
shall, should, will, would, would rather, would rather, would sooner
- Unfortunately, computers can’t understand English.
- I ‘d rather buy a game than a spreadsheet.
III. READING COMPREHENSION
Task 1. Warm up
In pairs, try to think of an answer for the question.
What is programming ?
Look at the definition in the Glosary. Is it similar to yours?
Task 2. Complete the following definitions with the words and phrases in
the box.
The various parts of the program may occur in programs
language Binary numbers a given problem
1. Algorithm
The step – by – step specification of how to reach the solution
to
2. Flow chart
A diagram representing the logical sequence between
3. Coding
The translation of the logical steps into a programming
4. Machine code
107
The basic instructions understood by computers. The
processor operates on code which consists of .
5. Debugging
The techniques of detecting, diagnosing, and correcting errors
( or “bugs “ ) which.
Task 3. Read the text and find answers to these questions.
1. Do computers understand human languages?
2. What are the differences between low – level and high – level
languages?
3. What is an assembler?
4. What is the function of compilers?
5. What do you understand by the terms source program and object
program?
6. In the future, could computers be programmed in Spanish, French, or
Japanese?
Programming languages
Unfortunately, computers cannot understand ordinary spoken
English or any other natural language. The only language they can
understand directly is called machine code. This consists of the 1s and 0s
(binary code) that are processed by the CPU.
However, machine code as a means of communication is very
difficult to write. For this reason, we use symbolic languages that are easier
to understand. Then, by using a special program, these languages can be
translated into machine code. For example, the so – called assembly
languages use abbreviations such as ADD, SUB, MPY to represent
instructions. These mnemonic codes are like labels easily associated with
the items to which they refer.
Basic languages, where the program is similar to the machine code
version, are known as low – level languages. In these languages, each
instruction is equipvalent to a single machine code instruction, and the
program is converted into machine code by a special program called an
assembler. These languages are still quite complex and restricted to
particular machines.
108
To make the programs easier to write and overcome the problem of
intercommunication between different types of machines, higher – level
languages were designed such as BASIC, COBOL, FORTRAN, or Pascal.
These are all problem – oriented rather than machine- oriented. Program
written in one of these languages (known as source programs) are
converted into a lower- level language by means of a compiler (generating
the object- program). On compilation, each statement in a high – level
language is generally translated into many machine code instructions.
People communicate instructions to the computer in symbolic
languages and the easier this communication can be made, the wider the
application of computers will be. Scientists are already working on
Artificial Intelligence and the next generation of computers may be able to
understand human languages.
Instructions are written
In a high – level language
( e.g Pascal, BASIC, COBOL, Ada, C, Lisp )
This is known as the source program
.
Instructions are compiled and packaged
into a program. The software is ready to run
on the computer.
Task 4. Make sentences as in the example.
Example:
Not easy / write instructions in Pascal
Compiler
Compilers translate the
original code into a lower-level
language or machine code so
that the CPU
can understand it
109
It is not easy to write instructions in Pascal.
1 Advisable / test the program under different conditions.
2 Expensive / set up a data – processing area.
3 Unusual for a program / Work correctly the first time it is
tested.
4 Difficult for students / learn FORTRAN.
5 Important / consider the capabilities of the programming
language.
6 Quite easy / write instructions in BASIC.
IV. PRACTICE
Exercise 1. Now look again at the reading passage in Task 2. Underline
the infinitive constructions after modal verbs.
Example:
Unfortunately, computers cannot understand ordinary spoken
English
Exercise 2. Look at these pairs of examples and decide where there is
an “important “change in meaning.
1 a I remember shutting down the computer before I left the
room.
b Please, remember to buy the new program.
2 a They stopped to look at the flowchart.
b They stopped looking at the flowchart.
3 a I like studying C language.
b I like to study C language in the evening.
4 a It has started to rain.
b It has started to raining.
5 a He needs to work harder.
b This hard disk needs repairing.
110
V. FURTHER READING
Program Design Language
Program Design Language (or PDL, for short) is a method for designing
and documenting methods and procedures in software. It is related
to pseudocode, but unlike pseudocode, it is written in plain language
without any terms that could suggest the use of any programming language
or library.
PDL was originally developed by the company Caine, Farber &
Gordon and has been modified substantially since they published their
initial paper on it in 1975. It has been described in some detail by Steve
McConnell in his book Code Complete.
111
UNIT 14
LANGUAGES
I. VOCABULARY
Appliance Thiết bị, dụng cụ
Extensible Có thể mở rộng, kéo dài ra
Element Yếu tố, nguyên lý cơ bản
Fetch Tìm về, trào ra, bán được
Lucent Sáng chói, sáng ngời
Manufacture Sự chế tạo, sản xuất
Philosophy Triết học, triết lý
Portals Cổng, cửa
Recognition Sự công nhận, thừa nhận,
nhận ra
Synthesis Sự tổng hợp
Toolbox Hộp dụng cụ
Utility Tính thiết thực, thực tiễn, tiện
ích
II. LANGUAGE WORK
The passive
HELP box
The passive
The passive is formed with the verb to be in the correct tense and the
112
past participle of the main verb.
Instructions are processed by the CPU. The computer was invented by
Charles Babbage.
III. READING COMPREHENSION
Task 1. Warm-up
1. Make a list of as many computer languages as you can think of.
2. Do you know any languages used to interact with the Internet through
voice-recognition?
Task 2. Read the voice XML language Study this table and answer the
questions below.
Language Date Characteristics Uses
VXML or
voice XML
(Voice
extensible
markup
language)
Created by
a Working
Group of
four
companies-
AT and T,
lucent,
Motorola
and IBM
2000 Based on the XML
language
For input, Voice XML
uses voice recognition.
For output, it uses pre-
recorded audio content
and speech synthesis
(text-to-speech)
How do you access a
voice web portal? First,
you dial its phone
number. Then the call is
received by a telephone
server and the Voice
XML pages are fetched
via HTTP. Finally, you
get the required
information.
A typical Voice XML
page could be “sports.
vxml”.
Used to create voice-user
interfaces.
Make Internet content
accessible via voice and phone.
Instead of using a web browser
on a PC, you use the telephone
to access voice-equipped
websites via a Voice XML
interpreter (a voice browser)
Application:
-Voice portals (telephone
services where you can hear
information about sports, news,
traffic, ect.
- Voice-enables intranets
- Voice e-commerce
- Home appliances controlled
by voice.
1. What does VXML mean?
113
2. Who created voice XML?
3. When was it developed?
4. What technologies does it use for input and output?
5. What are the most suitable applications for voice XML?
6. What do you think are the benefits of having a voice Web?
PRACTICE
Exercise 1. Look at the HELP box and then complete these sentences with
a suitable verb form.
1. COBOL (use)for business applications.
2. Original programs (write)in a high-level language.
3. All computer languages (must translate)into binary commands.
4. The ADA language (develop)in 1979.
5. In the 1970s, new languages such as LISP and PROLOG
(design).for research into Artificial Intelligence.
6. A new version of Turbo Pascal (release)..just.
7. In the next century, computers (program).in natural languages like
English or French.
Exercise 2. How do you make the passive in your language?
Exercise 3. Read the passage and complete it with the verbs in brackets in
the correct form.
Visual BASIC
Visual BASIC is a programming language and an environment
(develop)by Microsoft in 1990. It (use) to create
applications for Windows operating systems.
The name “BASIC” (stand) .. for Beginner’s All-purpose
Symbolic Instruction Code. The original BASIC language (create)....in
1965 and adopted by many programmers and PC manufacturers because it
was user-friendly and easy to learn.
114
The adjective “Visual” refers to the technique used to create a
graphical user interface. Instead of (write) a lot of instructions to
describe interface elements, you just (add).pre-defined objects such
as buttons and dialog boxes, which can (choose)from a toolbox. It
(take) .. only a few minutes to create a Visual BASIC program. Using
the mouse, you simply (drag)and drop controls (e.g. option buttons,
text boxes, icons, menu bar, etc.) into the required position, and then define
their color, size and behavior.
Thanks to its object-oriented philosophy and interactive nature,
Visual BASIC (enable) the programmer to quickly create all sorts
of applications from small system utilities to database programs and
Internet server applications.
IV. FURTHER READING
Language
Language is the human capacity for acquiring and using complex
systems ofcommunication, and a language is any specific example of such
a system. The scientific study of language is called linguistics. It is
impossible to know precisely how many languages there are in the world,
and the number depends on a partly arbitrary distinction between languages
and dialects. However, estimates vary between around 6,000 and 7,000
languages in number. Natural languages are spoken or signed, but any
language can be encoded into secondary media using auditory, visual or
115
tactile stimuli, for example in graphic writing, braille, or whistling. This is
because human language is modality-independent. When used as a general
concept, "language" may refer to the cognitive ability to learn and use
systems of complex communication, or to describe the set of rules that
makes up these systems, or the set of utterances that can be produced from
those rules.
116
CHAPTER VII. COMPUTERS TOMORROW
UNIT 15
INTERNET ISSUE
I. VOCABULARY
alert Cảnh báo, báo động
attack Tấn công, ăn mòn
attachment Phụ tùng, đính/gắn kèm.
Break into Đột nhập
Bulletin Bản tin ( trình bày ngắn gọn)
Certificate Chứng nhận, chứng chỉ
Confidential Bí mật, riêng tư
Consultant Người tư vấn, cố vấn
Crucial Quyết định, cốt yếu, chủ yếu
Decryption Giải mã
Disable Phá hỏng, mất khả năng hoạt động
Download Tải xuống
encryption. Mã khóa
encode Mã hóa
Expose Phơi, bày, vạch trẩn
Hacker Người giỏi dùng, lập trình máy, tin
tặc
117
Illegally Bất hợp pháp, trái luật pháp
Intermediary Trung gian
Infiltrated Xâm nhập
Intruders Kẻ xâm phạm, xâm nhập
Lock khóa
Plain Khu vực rộng, phẳng.
Private Cá nhân, riêng tư
Propagate Phổ biến, truyền bá, truyền
Protection Bảo vệ
Security Sự an ninh, sự bảo đảm
Solution Giải pháp
Temporarily Một cách tạm thời
Transaction Giải quyết, thực hiện, giao dịch
(un)scrupulous Cẩn thận, tỉ mỉ, chi tiết
II. LANGUAGE WORK
HELP box
• Hacker: a person who obtains unauthorized access to computer data
• Cookies: small files used by Web servers to know if you have visited
their site before.
• Certificates: file that identify users and Web servers on the net, like
digital identification cards.
• Encryption: the process of encoding data so that unauthorized users
can’t read it.
• Decryption: the process of decoding encrypted data transmitted to
you
III. READING COMPREHENSION
Task 1. Warm-up
Try to answer these questions.
1. Is it technically possible for computer criminals to infiltrated into the
Internet and steal sensitive information?
.........................................................................................................................
2. What is a hacker?
.........................................................................................................................
118
3. Can viruses enter your PC from the internet?
.........................................................................................................................
Task 2. Read about security and privacy on the internet
There are a lot of benefits from an open system like the internet, but
we are also exposed to hackers who break into computer systems just for
fun, as well as to steal information or propagate viruses. So how do you go
about making online transactions secure?
Security on the Web
The question of security is crucial when sending confidential
information such as credit card numbers. For examples, consider the
process of bying a book on the Web. You have to type your credit card
number into an order form which passes from computer to computer on its
way to the online bookstore. If one of the intermediary computers is
infiltrated by hackers, your data can be copied. It is difficult to say how
often this happens, but it’s technically possible.
To avoid risks, you should set all security alerts to high on your Web
browser. Netscape communicator and Internet Explorer display a lock
when the Web page is secure and allow you to disable or delete “cookies”
If you use online bank services, make sure your bank uses digital
certificates. A popular security standard is SET (secue electronic
transactions)
Email privacy
Similarly, as your e-mail message travels across the net, it is copied
temporarily on many computers in between. This means it can be read by
unscrupulous people who illegally enter computer systems.
119
The ony way to protect a message is to put it in a sort of “envelope”,
that is, to encode it with some form of encryption. A system designed to
send e-mail privately is Pretty Good Privacy, a freeware program written
by Phil Zimmerman.
Network security.
Private networks connected to the Internet can be attacked by
intruders who attempt to take valuable information such as Social Security
numbers, bank accounts or research and business reports.
To protect crucial data, companies hire security consultants who
analyse the risks and provide security solutions. The most common
methods of protection are passwords for access control, encyryption and
decryption systems, and firewalls.
Virus Protection
Viruses can enter a PC through files from disks, the Internet or
bulletin board systems. If you want to protect your system, don’t open e-
mail attachments from strangers and take care when downloading files
from the Web. (Plain text e-mail alone can’t pass a virus)
Remember also to update your anti-virus software as often as
possible, since new viruses are being created all the time.
120
Task 3. Read the text and find answers to these questions
1. Why is security so important on the Internet?
.........................................................................................................................
.........................................................................................................................
2. What security features are offered by Netscape Communicator and
Interner Explorer?
.........................................................................................................................
.........................................................................................................................
3. What security standard is used by most banks to make online
transactions secure?
.........................................................................................................................
.........................................................................................................................
4. How can we protet and keep our e-mail private?
.........................................................................................................................
.........................................................................................................................
5. Which ways can a virus enter a computer system?
.........................................................................................................................
.........................................................................................................................
IV. PRACTICE
Exercise 1. Match the sentences on the left with the explanations on the
right
A B
1. update your anti-
virus software
a. make sure your bank uses digital certificates.
2. protect your system b. A popular security standard
3. The most common
methods of protection
c. since new viruses are being created all the time.
4. to protect a
message
d. don’t open e-mail attachments from strangers
5. To avoid risks e. passwords for access control, encyryption and
decryption systems, and firewalls
6. If you use online
bank services
f. to put it in a sort of “envelope”
7.SET (secue g. you should set all security alerts to high on your
121
electronic
transactions)
Web browser.
Exercise 2. Translate the sentences into Vietnamese
1. You have to type your credit card number into an order form which
passes from computer to computer on its way to the online bookstore. If
one of the intermediary computers is infiltrated by hackers, your data can
be copied.
.........................................................................................................................
.........................................................................................................................
.........................................................................................................................
.........................................................................................................................
2. To avoid risks, you should set all security alerts to high on your Web
browser. Netscape communicator and Internet Explorer display a lock
when the Web page is secure and allow you to disable or delete “cookies”
.........................................................................................................................
.........................................................................................................................
.........................................................................................................................
3. A system designed to send e-mail privately is Pretty Good Privacy, a
freeware program written by Phil Zimmerman.
.........................................................................................................................
.........................................................................................................................
4. Private networks connected to the Internet can be attacked by intruders
who attempt to take valuable information such as Social Security numbers,
bank accounts or research and business reports.
.........................................................................................................................
.........................................................................................................................
.........................................................................................................................
5. Viruses can enter a PC through files from disks, the Internet or bulletin
board systems. If you want to protect your system, don’t open e-mail
attachments from strangers and take care when downloading files from the
Web.
.........................................................................................................................
.........................................................................................................................
.........................................................................................................................
122
V. FURTHER READING
INTRODUCTION TO NETWORKING
A basic understanding of computer networks is requisite in order to
understand the principles of network security. In this section, we'll cover
some of the foundations of computer networking, then move on to an
overview of some popular networks. Following that, we'll take a more in-
depth look at TCP/IP, the network protocol suite that is used to run the
Internet and many intranets.
Once we've covered this, we'll go back and discuss some of the threats that
managers and administrators of computer networks need to confront, and
then some tools that can be used to reduce the exposure to the risks of
network computing.
123
UNIT 16
LANs AND WANs
Libraries use a WAN to keep records of loans and to supply information to
library users who have modems
I. VOCABULARY
Backup device thiết bị sao lưu
Desktop màn hình nền
Enable cho phép
Including chứa, bao hàm, bao gồm
Intermediary device thiết bị trung gian
Local area network – LAN mạng cục bộ
Network mạng máy tính, mạng
Network interface card thẻ giao tiếp mạng
Posting gửi thông báo
Resource tài nguyên
Share chia sẻ
124
Server máy chủ
Via Qua, theo đường, thông qua
Within trong vòng
Wide area network – WAN mạng diện rộng
II. LANGUAGE WORK
Ability: CAN
- Can is used to express possibility
E.g. You can buy a computer at the hardware store.
- Can is used to express ability:
E.g. Computer can save a lot of information.
- Can is used to express an acquired skill. In example can use = knows how
to use.
E.g. Maria can use the computer. She has been taking lessons for many
years
III. READING COMPREHENSION
LANs and WANs
A network is simply two or more computers linked together. It
allows users to share not only data files and software applications but also
hardware like printers and other computer resources such as fax.
Most networks link computers within a limited area – within a
department, an office or a building. These are called Local Area Networks,
or LANs. But networks can link computers across the world, so you can
share information with someone on the other side of the world as easily as
125
sharing with a person at the next desk. When networks are linked together
in this way they are called Wide Area Networks, or WANs.
Networks increase productivity by allowing workers to share
information easily without printing, copying, telephoning, or posting. They
are also save money by sharing peripherals such as printers.
Task 1. Answer the questions
1. What is a LANs?
.........................................................................................................................
.........................................................................................................................
2. What is a WAN?
.........................................................................................................................
.........................................................................................................................
3. What are the advantages of networks?
.........................................................................................................................
.........................................................................................................................
4. What is the difference between a Local Area Network and Wide
Area Network?
.........................................................................................................................
.........................................................................................................................
5. What are its hardware components?
.........................................................................................................................
.........................................................................................................................
Task 2. Now read the passage and find out if your answer were correct
WANs AND WORLDWIDE COMMUNICATIONS
For long-distance or worldwide communications computers and
LANs are usally connectec into a wide area network (WAN) to form a
single intergrated network. The largest WAN in existence is the Internet.
Networks can be linked together by either Telephone lines or fibre-
optic cables. For example, ISDN (intergrated services digital network) and
ADSL (Asymmetric Digital Subscriber Line) are an international standard
for transmitting digital text, sound, voice and video data over telephone
lines. On the other hand, FDDI (fibre distributed data interface) is an
optical- fibre network. It transmits data at great speed -100 magabits ore
126
second. A vaiation called FDDT transmits data at 200 Mbps. FDDI
networks are typically used as backbones for wide area networks.
Modern telecommunications use fibre-optic cables because data can
be transmitted at a very high speed through the extremely wide bandwidths
of glass fibres. The fibre system operates by transmitting light pulses at
high frequencies along the glass fibre. This offers considerables advantages
(i) the cables require little physical space (ii) They are safe because they
don’t carry electricity; (iii) they avoid electromagnetic interference.
Networks on different continents can also be connected via Satelite.
Computers are connected by a modem either to ordinary telephone wires or
fibre-optic cables, which are linked to a dish aerial. This aerial has a large
concave reflector for the reception and dending of signals. Then, when
signals are received by the satellite, they are amplifieds and sent on to
workstations in another part of the world.
Task 3. Answer these questions
1. How can computers be linked up over a long distance?
.........................................................................................................................
.........................................................................................................................
2. What are the advantages of optical- fibre cables over telephong lines?
.........................................................................................................................
.........................................................................................................................
3. What is the function of communications satellites?
.........................................................................................................................
.........................................................................................................................
127
IV. PRACTICE
Exercise 1. Identify these hardware components of the network.
a. ___________________ most networks have at least one central
computer which all the desktop computers connect to. This is the
most important computer on your network. It stores the data files and
application software programs that the users need to access or share
it with others.
b. ___________________ this is the desktop computer or notebook
computer on your desk. It is linked to the server, and can access rules
and applications on it. Each computer on the network has a device
called a network interface card which connects the computer to the
network. Many computers come with these cards fitted as standard.
c. ___________________ Once you have a network you can share any
number of these, including printers, scanners, CD-ROM drives, and
backup drives.
d. ___________________ Desktops typically connect via telephone-
type cabling to this intermediary device, which enables
communication between servers and desktops.
Exercise 2. Match from (1-10) with (a-j).
1. You place a floppy disk near a
magnet
a. It is not lost when you switch off
2. You press Print Screen b. The computer hang
3. You input the correct password c. The cursor moves to the left
4. You add memory to a computer d. You damage the drive
5. You move the mouse to the left e. You copy the screen
6. You store data in RAM f. You have access to the network
7. You use a faster modem g. You destroy the data
8. There is a memory fault h. It runs faster
9. You press the arrow key i. Your phone bill are lower
10. You move a CD-ROM drive with
the disk in place.
j. The cursor moves across the
screen
Exercise 3. Translate the sentences into Vietnamese
128
1. Most networks link computers within a limited area – within a
department, an office or a building. These are called Local Area Networks,
or LANs. But networks can link computers across the world, so you can
share information with someone on the other side of the world as easily as
sharing with a person at the next desk.
..
..
..
2. Networks increase productivity by allowing workers to share
information easily without printing, copying, telephoning, or posting. They
are also save money by sharing peripherals such as printers.
..
..
3. Networks can be linked together by either Telephone lines or fibre-optic
cables. For example, ISDN (intergrated services digital network) and
ADSL (Asymmetric Digital Subscriber Line) are an international standard
for transmitting digital text, sound, voice and video data over telephone
lines.
..
..
..
4. Modern telecommunications use fibre-optic cables because data can be
transmitted at a very high speed through the extremely wide bandwidths of
glass fibres.
..
5. Networks on different continents can also be connected via Satelite.
Computers are connected by a modem either to ordinary telephone wires or
fibre-optic cables, which are linked to a dish aerial.
129
..
..
V. FURTHER READING
Introduction to Network Types
LAN, WAN and Other Area Networks
One way to categorize the different types of computer network designs is
by their scope or scale. For historical reasons, the networking industry
refers to nearly every type of design as some kind of area network.
Common examples of area network types are:
• LAN - Local Area Network
• WLAN - Wireless Local Area Network
• WAN - Wide Area Network
• MAN - Metropolitan Area Network
• SAN - Storage Area Network, System Area Network, Server
Area Network, or sometimes Small Area Network
• CAN - Campus Area Network, Controller Area Network, or
sometimes Cluster Area Network
• PAN - Personal Area Network
130
• DAN - Desk Area Network
LAN and WAN were the original categories of area networks, while the
others have gradually emerged over many years of technology evolution.
Note that these network types are a separate concept from network
topologies such as bus, ring and star.
131
UNIT 17
NEW TECHNOLOGIES
I. VOCABULARY
Authentication xác thực, xác nhận là
đúng
Deliver Phân phối
Dialpad Bàn phím
E-commerce Thương mại điện tử
Eliminate loại trừ, loại ra, rút ra
Flip up Búng, khiếm nhã, bỡn
cợt
Gadget đồ dùng, bộ phận cải
tiến
Handheld xách tay
Head-mounted Đội trên đầu
Headset bộ ống nghe điện đài
Hybrid Lai, ghép
132
Illusionary ảo giác, ảo tưởng
Imaginary ảo, tưởng tượng
Immersed Ngâm, chìm
Incorporate Hợp nhất, kết hợp chặt
chẽ
Initiate đề sướng, khởi nguồn,
bắt đầu
Interact Tương tác
Propelled Đẩy đi, đẩy tới, chất nổ
Protocol Giao thức
Pop up Xuất hiện, xảy ra bất
ngờ
Reluctant Miễn cưỡng
Satellite Vệ tinh nhân tạo
Simulation Mô phỏng
Simultaneously một cách đồng thời
Transmit Truyền, phát
Vice versa Ngược lại
Wireless Không giây
3G (third- generation) thế hệ thứ ba
3D (three-dimensional) ba chiều
VR (virtual) Ảo
WAP (Wireless Application Protocol) Giao thức ứng dụng
không dây
PDA (personal digital assistant) Thiết bị hỗ trợ cá nhân
kỹ thuật số
II. LANGUAGE WORK
Making predictions
HELP box
• Future with will/shall
A computer program will be the world chess champion.
• Future contuous (will be + present participle)
In twenty years’ time, some people will be living in space, inside a
133
computerized colony.
• Future perfect ( will have + past participle)
By 2020, new technology will have revolutionized communications.
• Special structures
- Possibility (may/might/could)
Scientists may discover new electronic components.
- Probability (likely to)
Talking machines are likely to be built
- Certainly (certainly, definitely, certain to)
Working hours will definitely become shorter with the help of
computers. Prices are certain to go up.
III. READING COMPREHENSION
Task 1. Look at these pictures and match them with texts 1 to 4
New product
1. Not long ago, mobile phones could just transmit voice and SMS
messages. Now they can display Internet information thanks to the
Wireless Application Protocol or WAP.
Some hybrid models combine a phone with a PDA. They look like a
regular phone with a dialpad and a small screen on its front. But if you flip
up the front cover you find a larger screen that is touch-sensitive. Some
include a virtual keyboard which pops up when you want to enter email
text or a WAP address.
But the future is called “third-generation” (3G) mobiles. They transmit a
caller’s picture and voice simultaneously. UMTS mobile phones deliver
users information, e-commerce, games and videoconferencing via fixed,
wireless and satellite networks.
2. Internet TV sets allow you to surf the Web and have email while you are
watching TV, or vice versa. Imagine watching a film on TV and
simultaneously accessing a Web site where you get information on the
actors in the film. This is ideal for people who are reluctant to use PCs but
are interested in the Internet.
134
Web TV was the first company which brought Internet services to TV
viewers through a set – top computer box. Another option is WorldGate’s
technology, which offers the Internet through cable TV.
The model built by OEM Metec integrates a complete Windows PC in a
TV set. The next generation of Internet – enabled televisions will
incorporate a smart-card for home shopping, banking and other interactive
services.
a b
c d
3. Virtual reality lets people interact with artificial objects and
environments through three-dimensional computer simulation. In a VR
system, you are hooked to a computer through a controlling device, such as
a glove, and head-mounted displays give you the feeling of being propelled
into an artificial three-dimensional world. The computer brings to life
135
events in a distant, virtual world using databases or real-time objects and
sounds. Your senses are immersed in an illusionary, yet sensate, world.
VR can be applied to anything from video games, testing a motor vehicle,
visiting a virtual exhibition, to checking out imaginary kitchen designs.
4. Bluetooth is a standard wireless technology designed to connect mobile
phones computers and other devices, replacing direct cable links. Since it
uses high-frequency radio waves, the transfer of data and voice is very fast.
All data are protected by advanced methods of encryption and
authentication.
Bluetooth was initiate by Ericsson and the objective was to eliminate
cables between mobile phones, PC cards, headsets, ect. Today it is
supported by companies such as Nokia, IBM, Toshiba and Intel.
With Bluetooth, a handheld computer can be used to surf the Internet
wherever you are, or to transfer files with other participants in meetings.
Mobile phones will soon be used to control all sorts of gadgets in the
house, from TV sets to refrigerators.
• PDA Personal Digital Assistant which includes an address book, a
calendar, Internet access, ect.
• WAP Wireless Application Protocol which enables mobile phones to
access the Internet.
• IBM International Business Machines.
Task 2. Write a suitable caption under each picture.
Task 3. Look at the picture below and read the text. Then discuss these
questions in small groups and prepare a short report for the class.
1. What are the most important differences between handheld computers
(eg. palmtops, PDAs, ect.) and traditional compters?
.........................................................................................................................
.........................................................................................................................
2. What are the advantages and limitations of handheld computers?
.........................................................................................................................
.........................................................................................................................
136
Psion Series 5mX handheld
computers have a keyboard and
a touch-sensitive screen.
Although every light weight,
they have one month battery
capacity, 16 MB of RAM, a
windowing OS, a microphone
for sound recording and a full
range of application which lets
you sent e-mail and browse the
web
3. Should students be allowed to use handheld computers in class?
.........................................................................................................................
.........................................................................................................................
4. Do you agree with this statement: “Soon, handheld PCs will combine the
functions of traditional PCs, cellular phones and pocket-size organizers?
.........................................................................................................................
.........................................................................................................................
IV. PRACTICE
Exercise 1. Match the terms on the left with the explanations on the right.
1 Internet – enabled TV a Location on the Internet where a company puts
web pages
2 Website b Technology that allows users to see a computer
simulated world in which they can move.
3 Virtual reality c TV set used as an Internet device
4 WAP d Device that can handle multiple data types
including voice and video.
5 Wireless e Protocol that enables mobile phones to access
Internet information.
6 3G mobile phone f Without the use of cables.
137
Exercise 2. Look at the HELP box and then expand these sentences using
the future perfect tense.
1. In ten years time/a lot of people/connect their television to the telephone
line.
2. Portable PCs/replace/desktop PCs/in a few years’ time.
3. With the help of computers/doctors/find/cure/AIDS and cancer/by the
year 2010.
4. By this time next year/software manufactures/make/hundreds of new
programs.
5. by 2020/ post offices and bookshops/disappear.
6. By this time next year/I/Buy/handheld computer.
Exercise 3. Here are some predictions made by an intelligent
supercomputer. In small groups, write your own predictions.
* Work/jobs
Eg. By the year 2030 human labour in industry will have been replace by
robots.
Yours:
138
• Homes
Eg. Families will have robots to do the housework.
Yours:
Education/Schools
Eg. By the end of the next century, every student in every school in the
world will have a PC
Yours:
Money/Holidays
Eg. Cash will disapper
Yours:
Exercise 4. Translate the sentences into Vietnamese
1. Some hybrid models combine a phone with a PDA. They look like a
regular phone with a dialpad and a small screen on its front. But if you flip
up the front cover you find a larger screen that is touch-sensitive.
139
2. Internet TV sets allow you to surf the Web and have email while you are
watching TV, or vice versa. Imagine watching a film on TV and
simultaneously accessing a Web site where you get information on the
actors in the film.
3. In a VR system, you are hooked to a computer through a controlling
device, such as a glove, and head-mounted displays give you the feeling of
being propelled into an artificial three-dimensional world.
4. Bluetooth is a standard wireless technology designed to connect mobile
phones computers and other devices, replacing direct cable links. Since it
uses high-frequency radio waves, the transfer of data and voice is very fast.
5. With Bluetooth, a handheld computer can be used to surf the Internet
wherever you are, or to transfer files with other participants in meetings.
Mobile phones will soon be used to control all sorts of gadgets in the
house, from TV sets to refrigerators.
V. FURTHER READING
SPEED BOOST
140
Also pushing the wired-to-wireless envelope is the approval of the
802.11n wireless standard, coupled with capabilities that render it superior
to 802.11a, 802.11b and 802.11g. “Ratification has made the standard
mainstream, so end-users are comfortable going wireless even for mission-
critical applications, like office videoconferencing and retail inventory
management,” asserts Dilip Advani,productmanager,AirMagnet
Vendors and VARs say customers in many vertical markets favor the
improved throughput available with 802.11n Wi-Fi, which reportedly
offers four to six times the bandwidth available under 802.11 a/b/g
standards. Other advantages of 802.11n over its predecessors encompass
enhanced efficiency bolstered by MIMO (multiple input and multiple
output) technology, wherein multiple antennas are employed at the
network’s transmitter and receiver. MIMO accomplishes the boost via
higher spectral efficiency, which yields more bits per second per hertz of
bandwidth, and link reliability or diversity, which reduces fading.
Additionally, 802.11n has the potential to support more users per single
access point than its predecessors, with the extra promise of better
141
performance from less equipment, observes Joe Epstein, senior director of
technology, Meru Networks
142
PHỤ LỤC
A central processing unit (CPU), also referred to as a central
processor unit, is the hardware within a computer system
or smartphone which carries out the instructions of a computer program by
performing the basic arithmetical, logical, and input/output operations of
the system: Bộ xử lý trung tâm (CPU) là phần cứng trong một máy tính
hoặc điện thoại thông minh thực hiện các hướng dẫn của chương trình máy
tính bằng cách thực hiện các phép tính cơ bản, và nhập/ xuất dữ liệu của
hệ thống
A personal computer (PC) is a microcomputer designed for use by
one person at a time: máy tính cá nhân (PC) là máy vi tính được thiết kế để
một người sử dụng tại một thời điểm.
Bluetooth is a wireless technology standard for exchanging data over
short distances (using short-wavelength radio transmissions in the ISM
band from 2400–2480 MHz) from fixed and mobile devices, creating
personal area networks (PANs) with high levels of security: Bluetooth là
một chuẩn công nghệ không dây để trao đổi dữ liệu trên một khoảng cách
ngắn (bằng cách sử dụng truyền dẫn vô tuyến bước sóng ngắn trong băng
tần ISM từ 2400-2480 MHz) từ các thiết bị di động và cố định, tạo ra các
vùng mạng cá nhân (chảo) với mức độ bảo mật cao.
Computer hardware equals the collection of physical elements that
comprise a computer system: Phần cứng máy tính là các yếu tố vật chất tạo
nên một hệ thống máy tính.
Computer software, or just software, is a collection of computer
programs and related data that provides the instructions for telling
acomputer what to do and how to do it: Phần mềm máy tính thường gọi là
phần mềm là các chương trình máy tính và dữ liệu liên quan cung cấp các
hướng dẫn để máy tính phải làm gì và cách làm.
Short Message Service (SMS) is a text messaging service component
of phone, web, or mobile communication systems, using standardized
communications protocols that allow the exchange of short text messages
between fixed line or mobile phone devices: Dịch vụ tin nhắn ngắn (SMS)
là một tin nhắn văn bản của điện thoại, web, hoặc các hệ thống thông tin di
143
động, bằng cách sử dụng giao thức truyền thông tiêu chuẩn cho phép việc
trao đổi tin nhắn văn bản ngắn giữa điện thoại cố định hoặc các thiết bị
điện thoại di động.
Storage Devices are the data storage devices that are used in the
computers to store the data: Thiết bị lưu trữ là thiết bị lưu trữ dữ liệu được
sử dụng trong các máy tính để lưu trữ các dữ liệu.
144
TÀI LIỆU THAM KHẢO
1. Betty Schrampfer Azar , 2001. Understanding and using English
Grammar, The Youth Press
2. Jesson, J & Peacock, G, 2003, Starter Award in ICT: Next Steps,
Cambridge University Press
3. Meredith, S, 2004, Starting Computers, Usborne Publishing Ltd
4. Raymond Murphy, 1994, English grammar in use, Nhà xuất bản Giáo
dục.
5. Randolph Quirk & Sydney Greenbaum, 2008, A university Grammar
of English, Nhà xuất bản Hải Phòng.
6. Santiago Remacha Esteras, 2003, English for computer users,
Cambridge university press.
7. Thac Binh Cuong , 2000, English for IT and computer users, Ha Noi
science and technology Press.
8. Trần Hữu Mạnh, 2008, Fundamentals of English Traditional Syntax,
Nhà xuất bản Đại học Quốc Gia- Hà nội.
9. www.computerhope.com/jargon/.../contunit.ht...
10. www.apple.com/mac.
11. compnetworking.about.com/.../network_types
Các file đính kèm theo tài liệu này:
- giao_trinh_tieng_anh_chuyen_nganh_cong_nghe_thong_tin_englis.pdf