Computer hardware equals the collection of physical elements that
comprise a computer system: Phần cứng máy tính là các yếu tố vật chất tạo
nên một hệ thống máy tính.
Computer software, or just software, is a collection of computer
programs and related data that provides the instructions for telling
acomputer what to do and how to do it: Phần mềm máy tính thường gọi là
phần mềm là các chương trình máy tính và dữ liệu liên quan cung cấp các
hướng dẫn để máy tính phải làm gì và cách làm.
Short Message Service (SMS) is a text messaging service component
of phone, web, or mobile communication systems, using standardized
communications protocols that allow the exchange of short text messages
between fixed line or mobile phone devices: Dịch vụ tin nhắn ngắn (SMS)
là một tin nhắn văn bản của điện thoại, web, hoặc các hệ thống thông tin di
                
              
                                            
                                
            
 
            
                 146 trang
146 trang | 
Chia sẻ: huongthu9 | Lượt xem: 963 | Lượt tải: 0 
              
            Bạn đang xem trước 20 trang tài liệu Giáo trình Tiếng anh chuyên ngành công nghệ thông tin english for information technology, để xem tài liệu hoàn chỉnh bạn click vào nút DOWNLOAD ở trên
nsions are .txt, .pdf, .doc and .htm (or 
.html). Most of the text files that you find on the Web have the 
extension .htm, created with the hypertext markup language. 
Graphics 
Graphics on the Web can include pictures, photos, paintings, image-
maps and buttons. The most common formats are .gif ( a standard image 
format developed by CompuServe) and .jpg or .jpeg ( created by the 
Joint Photographic Experts’ Group) 
Sounds 
The Internet is a great place to find and hear hit songs, movie 
soundtracks and recorded interviews. The most common formats are 
these: 
• Wav: wav files can be played with Sound Recorder included with 
Windows 
• .ra or .ram: RealAudio files can be heard with RealPlayer, a plug-
in you can download from the Web. 
• .mp3: compresses music files that can be played with an MP3 
player 
Video and animation 
You can see cartoons and movie clips on the Web, but you need the 
appropriate software. Video files are usually stored in: .avi, .mov and 
.mpg (or .mpeg) formats. To view MPEG videos you just need Video 
for Windows. However, to create high-quality movie clips you need a 
dedicated MPEG expansion card. You can also find animation and 3-D 
words. The two standard tools to manipulated animated worlds are 
VRML and Java. To view a virtual animation you need a program like 
QuickTime VR. 
Compressed files 
When you download files, they’re probably compressed. Windows files 
have a .zip extension. Macintosh files usually have a .sit extension and 
are opened with StuffIt. 
V. FURTHER READING 
Multimedia 
 104 
Multimedia is media and content that uses a combination of 
different content forms. This contrasts with media that use only 
rudimentary computer displays such as text-only or traditional forms of 
printed or hand-produced material. Multimedia includes a combination 
of text, audio, still images, animation, video, or interactivity content forms. 
Multimedia is usually recorded and played, displayed, or accessed 
by information content processing devices, such as computerized and 
electronic devices, but can also be part of a live performance. Multimedia 
devices are electronic media devices used to store and experience 
multimedia content. Multimedia is distinguished from mixed media in fine 
art; by including audio, for example, it has a broader scope. The term "rich 
media" is synonymous for interactive multimedia. Hypermedia can be 
considered one particular multimedia application. 
 105 
CHAPTER 6. PROGRAMMING 
UNIT 13 
 PROGRAM DESIGN 
I. VOCABULARY 
Assembly language 
Assembler 
Associate 
binary code 
complex 
convert 
Compiler 
diagnosing 
High – level language 
mnemonic 
Machine code 
Problem – oriented 
Object program 
Source program 
symbolic 
version 
hợp ngữ 
bộ dịch hợp ngữ 
Kết hợp, cộng tác 
Mã lưỡng phân (nhị phân) 
Phức tạp, rắc rối 
Biến đổi, chuyển đổi 
Bộ biên dịch, trình biên dịch 
Chuẩn đoán, miêu tả đặc trưng 
ngôn ngữ lập trình bậc cao 
Trí nhớ, giúp trí nhớ 
Mã máy 
hướng vấn đề 
chương trình đích 
chương trình nguồn 
Tượng trưng, biểu tượng 
Bản dịch 
 106 
II. LANGUAGE WORK 
Infinitive constructions 
The infinitive is used: 
• after adjectives 
- It is difficult to use machine code. 
• after modal verbs with to : ought to, used to 
- I ought to make a back-up copy. 
- Using a computer is much easier than it used to be. 
• after modal and auxiliary verbs without to : can, could, may, might, 
shall, should, will, would, would rather, would rather, would sooner 
- Unfortunately, computers can’t understand English. 
- I ‘d rather buy a game than a spreadsheet. 
III. READING COMPREHENSION 
Task 1. Warm up 
In pairs, try to think of an answer for the question. 
What is programming ? 
Look at the definition in the Glosary. Is it similar to yours? 
Task 2. Complete the following definitions with the words and phrases in 
the box. 
The various parts of the program may occur in programs 
language Binary numbers a given problem 
1. Algorithm 
The step – by – step specification of how to reach the solution 
to 
2. Flow chart 
A diagram representing the logical sequence between 
3. Coding 
The translation of the logical steps into a programming 
4. Machine code 
 107 
The basic instructions understood by computers. The 
processor operates on code which consists of . 
5. Debugging 
The techniques of detecting, diagnosing, and correcting errors 
( or “bugs “ ) which. 
Task 3. Read the text and find answers to these questions. 
1. Do computers understand human languages? 
2. What are the differences between low – level and high – level 
languages? 
3. What is an assembler? 
4. What is the function of compilers? 
5. What do you understand by the terms source program and object 
program? 
6. In the future, could computers be programmed in Spanish, French, or 
Japanese? 
Programming languages 
Unfortunately, computers cannot understand ordinary spoken 
English or any other natural language. The only language they can 
understand directly is called machine code. This consists of the 1s and 0s 
(binary code) that are processed by the CPU. 
However, machine code as a means of communication is very 
difficult to write. For this reason, we use symbolic languages that are easier 
to understand. Then, by using a special program, these languages can be 
translated into machine code. For example, the so – called assembly 
languages use abbreviations such as ADD, SUB, MPY to represent 
instructions. These mnemonic codes are like labels easily associated with 
the items to which they refer. 
Basic languages, where the program is similar to the machine code 
version, are known as low – level languages. In these languages, each 
instruction is equipvalent to a single machine code instruction, and the 
program is converted into machine code by a special program called an 
assembler. These languages are still quite complex and restricted to 
particular machines. 
 108 
To make the programs easier to write and overcome the problem of 
intercommunication between different types of machines, higher – level 
languages were designed such as BASIC, COBOL, FORTRAN, or Pascal. 
These are all problem – oriented rather than machine- oriented. Program 
written in one of these languages (known as source programs) are 
converted into a lower- level language by means of a compiler (generating 
the object- program). On compilation, each statement in a high – level 
language is generally translated into many machine code instructions. 
 People communicate instructions to the computer in symbolic 
languages and the easier this communication can be made, the wider the 
application of computers will be. Scientists are already working on 
Artificial Intelligence and the next generation of computers may be able to 
understand human languages. 
Instructions are written 
In a high – level language 
( e.g Pascal, BASIC, COBOL, Ada, C, Lisp ) 
This is known as the source program 
 
. 
 
Instructions are compiled and packaged 
into a program. The software is ready to run 
on the computer. 
Task 4. Make sentences as in the example. 
Example: 
Not easy / write instructions in Pascal 
Compiler 
Compilers translate the 
original code into a lower-level 
language or machine code so 
that the CPU 
can understand it 
 109 
It is not easy to write instructions in Pascal. 
1 Advisable / test the program under different conditions. 
2 Expensive / set up a data – processing area. 
3 Unusual for a program / Work correctly the first time it is 
tested. 
4 Difficult for students / learn FORTRAN. 
5 Important / consider the capabilities of the programming 
language. 
6 Quite easy / write instructions in BASIC. 
IV. PRACTICE 
Exercise 1. Now look again at the reading passage in Task 2. Underline 
the infinitive constructions after modal verbs. 
Example: 
Unfortunately, computers cannot understand ordinary spoken 
English 
Exercise 2. Look at these pairs of examples and decide where there is 
an “important “change in meaning. 
1 a I remember shutting down the computer before I left the 
room. 
 b Please, remember to buy the new program. 
2 a They stopped to look at the flowchart. 
 b They stopped looking at the flowchart. 
3 a I like studying C language. 
 b I like to study C language in the evening. 
4 a It has started to rain. 
 b It has started to raining. 
5 a He needs to work harder. 
 b This hard disk needs repairing. 
 110 
V. FURTHER READING 
Program Design Language 
Program Design Language (or PDL, for short) is a method for designing 
and documenting methods and procedures in software. It is related 
to pseudocode, but unlike pseudocode, it is written in plain language 
without any terms that could suggest the use of any programming language 
or library. 
PDL was originally developed by the company Caine, Farber & 
Gordon and has been modified substantially since they published their 
initial paper on it in 1975. It has been described in some detail by Steve 
McConnell in his book Code Complete. 
 111 
UNIT 14 
LANGUAGES 
I. VOCABULARY 
Appliance Thiết bị, dụng cụ 
Extensible Có thể mở rộng, kéo dài ra 
Element Yếu tố, nguyên lý cơ bản 
Fetch Tìm về, trào ra, bán được 
Lucent Sáng chói, sáng ngời 
Manufacture Sự chế tạo, sản xuất 
Philosophy Triết học, triết lý 
Portals Cổng, cửa 
Recognition Sự công nhận, thừa nhận, 
nhận ra 
Synthesis Sự tổng hợp 
Toolbox Hộp dụng cụ 
Utility Tính thiết thực, thực tiễn, tiện 
ích 
II. LANGUAGE WORK 
The passive 
HELP box 
The passive 
The passive is formed with the verb to be in the correct tense and the 
 112 
past participle of the main verb. 
Instructions are processed by the CPU. The computer was invented by 
Charles Babbage. 
III. READING COMPREHENSION 
Task 1. Warm-up 
1. Make a list of as many computer languages as you can think of. 
2. Do you know any languages used to interact with the Internet through 
voice-recognition? 
Task 2. Read the voice XML language Study this table and answer the 
questions below. 
Language Date Characteristics Uses 
VXML or 
voice XML 
(Voice 
extensible 
markup 
language) 
Created by 
a Working 
Group of 
four 
companies-
AT and T, 
lucent, 
Motorola 
and IBM 
2000 Based on the XML 
language 
For input, Voice XML 
uses voice recognition. 
For output, it uses pre-
recorded audio content 
and speech synthesis 
(text-to-speech) 
How do you access a 
voice web portal? First, 
you dial its phone 
number. Then the call is 
received by a telephone 
server and the Voice 
XML pages are fetched 
via HTTP. Finally, you 
get the required 
information. 
A typical Voice XML 
page could be “sports. 
vxml”. 
Used to create voice-user 
interfaces. 
Make Internet content 
accessible via voice and phone. 
Instead of using a web browser 
on a PC, you use the telephone 
to access voice-equipped 
websites via a Voice XML 
interpreter (a voice browser) 
Application: 
-Voice portals (telephone 
services where you can hear 
information about sports, news, 
traffic, ect. 
- Voice-enables intranets 
- Voice e-commerce 
- Home appliances controlled 
by voice. 
1. What does VXML mean? 
 113 
2. Who created voice XML? 
3. When was it developed? 
4. What technologies does it use for input and output? 
5. What are the most suitable applications for voice XML? 
6. What do you think are the benefits of having a voice Web? 
PRACTICE 
Exercise 1. Look at the HELP box and then complete these sentences with 
a suitable verb form. 
1. COBOL (use)for business applications. 
2. Original programs (write)in a high-level language. 
3. All computer languages (must translate)into binary commands. 
4. The ADA language (develop)in 1979. 
5. In the 1970s, new languages such as LISP and PROLOG 
(design).for research into Artificial Intelligence. 
6. A new version of Turbo Pascal (release)..just. 
7. In the next century, computers (program).in natural languages like 
English or French. 
Exercise 2. How do you make the passive in your language? 
Exercise 3. Read the passage and complete it with the verbs in brackets in 
the correct form. 
Visual BASIC 
Visual BASIC is a programming language and an environment 
(develop)by Microsoft in 1990. It (use)  to create 
applications for Windows operating systems. 
The name “BASIC” (stand) .. for Beginner’s All-purpose 
Symbolic Instruction Code. The original BASIC language (create)....in 
1965 and adopted by many programmers and PC manufacturers because it 
was user-friendly and easy to learn. 
 114 
The adjective “Visual” refers to the technique used to create a 
graphical user interface. Instead of (write) a lot of instructions to 
describe interface elements, you just (add).pre-defined objects such 
as buttons and dialog boxes, which can (choose)from a toolbox. It 
(take) .. only a few minutes to create a Visual BASIC program. Using 
the mouse, you simply (drag)and drop controls (e.g. option buttons, 
text boxes, icons, menu bar, etc.) into the required position, and then define 
their color, size and behavior. 
Thanks to its object-oriented philosophy and interactive nature, 
Visual BASIC (enable)  the programmer to quickly create all sorts 
of applications from small system utilities to database programs and 
Internet server applications. 
IV. FURTHER READING 
Language 
Language is the human capacity for acquiring and using complex 
systems ofcommunication, and a language is any specific example of such 
a system. The scientific study of language is called linguistics. It is 
impossible to know precisely how many languages there are in the world, 
and the number depends on a partly arbitrary distinction between languages 
and dialects. However, estimates vary between around 6,000 and 7,000 
languages in number. Natural languages are spoken or signed, but any 
language can be encoded into secondary media using auditory, visual or 
 115 
tactile stimuli, for example in graphic writing, braille, or whistling. This is 
because human language is modality-independent. When used as a general 
concept, "language" may refer to the cognitive ability to learn and use 
systems of complex communication, or to describe the set of rules that 
makes up these systems, or the set of utterances that can be produced from 
those rules. 
 116 
CHAPTER VII. COMPUTERS TOMORROW 
UNIT 15 
 INTERNET ISSUE 
I. VOCABULARY 
alert Cảnh báo, báo động 
attack Tấn công, ăn mòn 
attachment Phụ tùng, đính/gắn kèm. 
Break into Đột nhập 
Bulletin Bản tin ( trình bày ngắn gọn) 
Certificate Chứng nhận, chứng chỉ 
Confidential Bí mật, riêng tư 
Consultant Người tư vấn, cố vấn 
Crucial Quyết định, cốt yếu, chủ yếu 
Decryption Giải mã 
Disable Phá hỏng, mất khả năng hoạt động 
Download Tải xuống 
encryption. Mã khóa 
encode Mã hóa 
Expose Phơi, bày, vạch trẩn 
Hacker Người giỏi dùng, lập trình máy, tin 
tặc 
 117 
Illegally Bất hợp pháp, trái luật pháp 
Intermediary Trung gian 
Infiltrated Xâm nhập 
Intruders Kẻ xâm phạm, xâm nhập 
Lock khóa 
Plain Khu vực rộng, phẳng. 
Private Cá nhân, riêng tư 
Propagate Phổ biến, truyền bá, truyền 
Protection Bảo vệ 
Security Sự an ninh, sự bảo đảm 
Solution Giải pháp 
Temporarily Một cách tạm thời 
Transaction Giải quyết, thực hiện, giao dịch 
(un)scrupulous Cẩn thận, tỉ mỉ, chi tiết 
II. LANGUAGE WORK 
HELP box 
• Hacker: a person who obtains unauthorized access to computer data 
• Cookies: small files used by Web servers to know if you have visited 
their site before. 
• Certificates: file that identify users and Web servers on the net, like 
digital identification cards. 
• Encryption: the process of encoding data so that unauthorized users 
can’t read it. 
• Decryption: the process of decoding encrypted data transmitted to 
you 
III. READING COMPREHENSION 
Task 1. Warm-up 
Try to answer these questions. 
1. Is it technically possible for computer criminals to infiltrated into the 
Internet and steal sensitive information? 
......................................................................................................................... 
2. What is a hacker? 
......................................................................................................................... 
 118 
3. Can viruses enter your PC from the internet? 
......................................................................................................................... 
Task 2. Read about security and privacy on the internet 
There are a lot of benefits from an open system like the internet, but 
we are also exposed to hackers who break into computer systems just for 
fun, as well as to steal information or propagate viruses. So how do you go 
about making online transactions secure? 
Security on the Web 
The question of security is crucial when sending confidential 
information such as credit card numbers. For examples, consider the 
process of bying a book on the Web. You have to type your credit card 
number into an order form which passes from computer to computer on its 
way to the online bookstore. If one of the intermediary computers is 
infiltrated by hackers, your data can be copied. It is difficult to say how 
often this happens, but it’s technically possible. 
To avoid risks, you should set all security alerts to high on your Web 
browser. Netscape communicator and Internet Explorer display a lock 
when the Web page is secure and allow you to disable or delete “cookies” 
If you use online bank services, make sure your bank uses digital 
certificates. A popular security standard is SET (secue electronic 
transactions) 
Email privacy 
Similarly, as your e-mail message travels across the net, it is copied 
temporarily on many computers in between. This means it can be read by 
unscrupulous people who illegally enter computer systems. 
 119 
The ony way to protect a message is to put it in a sort of “envelope”, 
that is, to encode it with some form of encryption. A system designed to 
send e-mail privately is Pretty Good Privacy, a freeware program written 
by Phil Zimmerman. 
Network security. 
Private networks connected to the Internet can be attacked by 
intruders who attempt to take valuable information such as Social Security 
numbers, bank accounts or research and business reports. 
To protect crucial data, companies hire security consultants who 
analyse the risks and provide security solutions. The most common 
methods of protection are passwords for access control, encyryption and 
decryption systems, and firewalls. 
Virus Protection 
Viruses can enter a PC through files from disks, the Internet or 
bulletin board systems. If you want to protect your system, don’t open e-
mail attachments from strangers and take care when downloading files 
from the Web. (Plain text e-mail alone can’t pass a virus) 
Remember also to update your anti-virus software as often as 
possible, since new viruses are being created all the time. 
 120 
Task 3. Read the text and find answers to these questions 
1. Why is security so important on the Internet? 
.........................................................................................................................
......................................................................................................................... 
2. What security features are offered by Netscape Communicator and 
Interner Explorer? 
.........................................................................................................................
......................................................................................................................... 
3. What security standard is used by most banks to make online 
transactions secure? 
.........................................................................................................................
......................................................................................................................... 
4. How can we protet and keep our e-mail private? 
.........................................................................................................................
......................................................................................................................... 
5. Which ways can a virus enter a computer system? 
.........................................................................................................................
......................................................................................................................... 
IV. PRACTICE 
Exercise 1. Match the sentences on the left with the explanations on the 
right 
A B 
1. update your anti-
virus software 
a. make sure your bank uses digital certificates. 
2. protect your system b. A popular security standard 
3. The most common 
methods of protection 
c. since new viruses are being created all the time. 
4. to protect a 
message 
d. don’t open e-mail attachments from strangers 
5. To avoid risks e. passwords for access control, encyryption and 
decryption systems, and firewalls 
6. If you use online 
bank services 
f. to put it in a sort of “envelope” 
7.SET (secue g. you should set all security alerts to high on your 
 121 
electronic 
transactions) 
Web browser. 
Exercise 2. Translate the sentences into Vietnamese 
1. You have to type your credit card number into an order form which 
passes from computer to computer on its way to the online bookstore. If 
one of the intermediary computers is infiltrated by hackers, your data can 
be copied. 
.........................................................................................................................
.........................................................................................................................
.........................................................................................................................
......................................................................................................................... 
2. To avoid risks, you should set all security alerts to high on your Web 
browser. Netscape communicator and Internet Explorer display a lock 
when the Web page is secure and allow you to disable or delete “cookies” 
.........................................................................................................................
.........................................................................................................................
......................................................................................................................... 
3. A system designed to send e-mail privately is Pretty Good Privacy, a 
freeware program written by Phil Zimmerman. 
.........................................................................................................................
......................................................................................................................... 
4. Private networks connected to the Internet can be attacked by intruders 
who attempt to take valuable information such as Social Security numbers, 
bank accounts or research and business reports. 
.........................................................................................................................
.........................................................................................................................
......................................................................................................................... 
5. Viruses can enter a PC through files from disks, the Internet or bulletin 
board systems. If you want to protect your system, don’t open e-mail 
attachments from strangers and take care when downloading files from the 
Web. 
.........................................................................................................................
.........................................................................................................................
......................................................................................................................... 
 122 
V. FURTHER READING 
INTRODUCTION TO NETWORKING 
A basic understanding of computer networks is requisite in order to 
understand the principles of network security. In this section, we'll cover 
some of the foundations of computer networking, then move on to an 
overview of some popular networks. Following that, we'll take a more in-
depth look at TCP/IP, the network protocol suite that is used to run the 
Internet and many intranets. 
Once we've covered this, we'll go back and discuss some of the threats that 
managers and administrators of computer networks need to confront, and 
then some tools that can be used to reduce the exposure to the risks of 
network computing. 
 123 
UNIT 16 
 LANs AND WANs 
Libraries use a WAN to keep records of loans and to supply information to 
library users who have modems 
I. VOCABULARY 
Backup device thiết bị sao lưu 
Desktop màn hình nền 
Enable cho phép 
Including chứa, bao hàm, bao gồm 
Intermediary device thiết bị trung gian 
Local area network – LAN mạng cục bộ 
Network mạng máy tính, mạng 
Network interface card thẻ giao tiếp mạng 
Posting gửi thông báo 
Resource tài nguyên 
Share chia sẻ 
 124 
Server máy chủ 
Via Qua, theo đường, thông qua 
Within trong vòng 
Wide area network – WAN mạng diện rộng 
II. LANGUAGE WORK 
Ability: CAN 
- Can is used to express possibility 
E.g. You can buy a computer at the hardware store. 
- Can is used to express ability: 
E.g. Computer can save a lot of information. 
- Can is used to express an acquired skill. In example can use = knows how 
to use. 
E.g. Maria can use the computer. She has been taking lessons for many 
years 
III. READING COMPREHENSION 
LANs and WANs 
A network is simply two or more computers linked together. It 
allows users to share not only data files and software applications but also 
hardware like printers and other computer resources such as fax. 
Most networks link computers within a limited area – within a 
department, an office or a building. These are called Local Area Networks, 
or LANs. But networks can link computers across the world, so you can 
share information with someone on the other side of the world as easily as 
 125 
sharing with a person at the next desk. When networks are linked together 
in this way they are called Wide Area Networks, or WANs. 
Networks increase productivity by allowing workers to share 
information easily without printing, copying, telephoning, or posting. They 
are also save money by sharing peripherals such as printers. 
Task 1. Answer the questions 
1. What is a LANs? 
.........................................................................................................................
......................................................................................................................... 
2. What is a WAN? 
.........................................................................................................................
......................................................................................................................... 
3. What are the advantages of networks? 
.........................................................................................................................
......................................................................................................................... 
4. What is the difference between a Local Area Network and Wide 
Area Network? 
.........................................................................................................................
......................................................................................................................... 
5. What are its hardware components? 
.........................................................................................................................
......................................................................................................................... 
Task 2. Now read the passage and find out if your answer were correct 
WANs AND WORLDWIDE COMMUNICATIONS 
For long-distance or worldwide communications computers and 
LANs are usally connectec into a wide area network (WAN) to form a 
single intergrated network. The largest WAN in existence is the Internet. 
Networks can be linked together by either Telephone lines or fibre-
optic cables. For example, ISDN (intergrated services digital network) and 
ADSL (Asymmetric Digital Subscriber Line) are an international standard 
for transmitting digital text, sound, voice and video data over telephone 
lines. On the other hand, FDDI (fibre distributed data interface) is an 
optical- fibre network. It transmits data at great speed -100 magabits ore 
 126 
second. A vaiation called FDDT transmits data at 200 Mbps. FDDI 
networks are typically used as backbones for wide area networks. 
Modern telecommunications use fibre-optic cables because data can 
be transmitted at a very high speed through the extremely wide bandwidths 
of glass fibres. The fibre system operates by transmitting light pulses at 
high frequencies along the glass fibre. This offers considerables advantages 
(i) the cables require little physical space (ii) They are safe because they 
don’t carry electricity; (iii) they avoid electromagnetic interference. 
Networks on different continents can also be connected via Satelite. 
Computers are connected by a modem either to ordinary telephone wires or 
fibre-optic cables, which are linked to a dish aerial. This aerial has a large 
concave reflector for the reception and dending of signals. Then, when 
signals are received by the satellite, they are amplifieds and sent on to 
workstations in another part of the world. 
Task 3. Answer these questions 
1. How can computers be linked up over a long distance? 
.........................................................................................................................
......................................................................................................................... 
2. What are the advantages of optical- fibre cables over telephong lines? 
.........................................................................................................................
......................................................................................................................... 
3. What is the function of communications satellites? 
.........................................................................................................................
......................................................................................................................... 
 127 
IV. PRACTICE 
Exercise 1. Identify these hardware components of the network. 
a. ___________________ most networks have at least one central 
computer which all the desktop computers connect to. This is the 
most important computer on your network. It stores the data files and 
application software programs that the users need to access or share 
it with others. 
b. ___________________ this is the desktop computer or notebook 
computer on your desk. It is linked to the server, and can access rules 
and applications on it. Each computer on the network has a device 
called a network interface card which connects the computer to the 
network. Many computers come with these cards fitted as standard. 
c. ___________________ Once you have a network you can share any 
number of these, including printers, scanners, CD-ROM drives, and 
backup drives. 
d. ___________________ Desktops typically connect via telephone-
type cabling to this intermediary device, which enables 
communication between servers and desktops. 
Exercise 2. Match from (1-10) with (a-j). 
1. You place a floppy disk near a 
magnet 
a. It is not lost when you switch off 
2. You press Print Screen b. The computer hang 
3. You input the correct password c. The cursor moves to the left 
4. You add memory to a computer d. You damage the drive 
5. You move the mouse to the left e. You copy the screen 
6. You store data in RAM f. You have access to the network 
7. You use a faster modem g. You destroy the data 
8. There is a memory fault h. It runs faster 
9. You press the arrow key i. Your phone bill are lower 
10. You move a CD-ROM drive with 
the disk in place. 
j. The cursor moves across the 
screen 
Exercise 3. Translate the sentences into Vietnamese 
 128 
1. Most networks link computers within a limited area – within a 
department, an office or a building. These are called Local Area Networks, 
or LANs. But networks can link computers across the world, so you can 
share information with someone on the other side of the world as easily as 
sharing with a person at the next desk. 
..
..
.. 
2. Networks increase productivity by allowing workers to share 
information easily without printing, copying, telephoning, or posting. They 
are also save money by sharing peripherals such as printers. 
..
.. 
3. Networks can be linked together by either Telephone lines or fibre-optic 
cables. For example, ISDN (intergrated services digital network) and 
ADSL (Asymmetric Digital Subscriber Line) are an international standard 
for transmitting digital text, sound, voice and video data over telephone 
lines. 
..
..
.. 
4. Modern telecommunications use fibre-optic cables because data can be 
transmitted at a very high speed through the extremely wide bandwidths of 
glass fibres. 
.. 
5. Networks on different continents can also be connected via Satelite. 
Computers are connected by a modem either to ordinary telephone wires or 
fibre-optic cables, which are linked to a dish aerial. 
 129 
..
.. 
V. FURTHER READING 
Introduction to Network Types 
LAN, WAN and Other Area Networks 
One way to categorize the different types of computer network designs is 
by their scope or scale. For historical reasons, the networking industry 
refers to nearly every type of design as some kind of area network. 
Common examples of area network types are: 
• LAN - Local Area Network 
• WLAN - Wireless Local Area Network 
• WAN - Wide Area Network 
• MAN - Metropolitan Area Network 
• SAN - Storage Area Network, System Area Network, Server 
Area Network, or sometimes Small Area Network 
• CAN - Campus Area Network, Controller Area Network, or 
sometimes Cluster Area Network 
• PAN - Personal Area Network 
 130 
• DAN - Desk Area Network 
LAN and WAN were the original categories of area networks, while the 
others have gradually emerged over many years of technology evolution. 
Note that these network types are a separate concept from network 
topologies such as bus, ring and star. 
 131 
UNIT 17 
 NEW TECHNOLOGIES 
I. VOCABULARY 
Authentication xác thực, xác nhận là 
đúng 
Deliver Phân phối 
Dialpad Bàn phím 
E-commerce Thương mại điện tử 
Eliminate loại trừ, loại ra, rút ra 
Flip up Búng, khiếm nhã, bỡn 
cợt 
Gadget đồ dùng, bộ phận cải 
tiến 
Handheld xách tay 
Head-mounted Đội trên đầu 
Headset bộ ống nghe điện đài 
Hybrid Lai, ghép 
 132 
Illusionary ảo giác, ảo tưởng 
Imaginary ảo, tưởng tượng 
Immersed Ngâm, chìm 
Incorporate Hợp nhất, kết hợp chặt 
chẽ 
Initiate đề sướng, khởi nguồn, 
bắt đầu 
Interact Tương tác 
Propelled Đẩy đi, đẩy tới, chất nổ 
Protocol Giao thức 
Pop up Xuất hiện, xảy ra bất 
ngờ 
Reluctant Miễn cưỡng 
Satellite Vệ tinh nhân tạo 
Simulation Mô phỏng 
Simultaneously một cách đồng thời
Transmit Truyền, phát 
Vice versa Ngược lại 
Wireless Không giây 
3G (third- generation) thế hệ thứ ba 
3D (three-dimensional) ba chiều 
VR (virtual) Ảo 
WAP (Wireless Application Protocol) Giao thức ứng dụng 
không dây 
PDA (personal digital assistant) Thiết bị hỗ trợ cá nhân 
kỹ thuật số 
II. LANGUAGE WORK 
Making predictions 
HELP box 
• Future with will/shall 
A computer program will be the world chess champion. 
• Future contuous (will be + present participle) 
In twenty years’ time, some people will be living in space, inside a 
 133 
computerized colony. 
• Future perfect ( will have + past participle) 
By 2020, new technology will have revolutionized communications. 
• Special structures 
- Possibility (may/might/could) 
Scientists may discover new electronic components. 
- Probability (likely to) 
Talking machines are likely to be built 
- Certainly (certainly, definitely, certain to) 
Working hours will definitely become shorter with the help of 
computers. Prices are certain to go up. 
III. READING COMPREHENSION 
Task 1. Look at these pictures and match them with texts 1 to 4 
New product 
1. Not long ago, mobile phones could just transmit voice and SMS 
messages. Now they can display Internet information thanks to the 
Wireless Application Protocol or WAP. 
Some hybrid models combine a phone with a PDA. They look like a 
regular phone with a dialpad and a small screen on its front. But if you flip 
up the front cover you find a larger screen that is touch-sensitive. Some 
include a virtual keyboard which pops up when you want to enter email 
text or a WAP address. 
But the future is called “third-generation” (3G) mobiles. They transmit a 
caller’s picture and voice simultaneously. UMTS mobile phones deliver 
users information, e-commerce, games and videoconferencing via fixed, 
wireless and satellite networks. 
2. Internet TV sets allow you to surf the Web and have email while you are 
watching TV, or vice versa. Imagine watching a film on TV and 
simultaneously accessing a Web site where you get information on the 
actors in the film. This is ideal for people who are reluctant to use PCs but 
are interested in the Internet. 
 134 
Web TV was the first company which brought Internet services to TV 
viewers through a set – top computer box. Another option is WorldGate’s 
technology, which offers the Internet through cable TV. 
The model built by OEM Metec integrates a complete Windows PC in a 
TV set. The next generation of Internet – enabled televisions will 
incorporate a smart-card for home shopping, banking and other interactive 
services. 
 a b 
c d 
3. Virtual reality lets people interact with artificial objects and 
environments through three-dimensional computer simulation. In a VR 
system, you are hooked to a computer through a controlling device, such as 
a glove, and head-mounted displays give you the feeling of being propelled 
into an artificial three-dimensional world. The computer brings to life 
 135 
events in a distant, virtual world using databases or real-time objects and 
sounds. Your senses are immersed in an illusionary, yet sensate, world. 
VR can be applied to anything from video games, testing a motor vehicle, 
visiting a virtual exhibition, to checking out imaginary kitchen designs. 
4. Bluetooth is a standard wireless technology designed to connect mobile 
phones computers and other devices, replacing direct cable links. Since it 
uses high-frequency radio waves, the transfer of data and voice is very fast. 
All data are protected by advanced methods of encryption and 
authentication. 
Bluetooth was initiate by Ericsson and the objective was to eliminate 
cables between mobile phones, PC cards, headsets, ect. Today it is 
supported by companies such as Nokia, IBM, Toshiba and Intel. 
With Bluetooth, a handheld computer can be used to surf the Internet 
wherever you are, or to transfer files with other participants in meetings. 
Mobile phones will soon be used to control all sorts of gadgets in the 
house, from TV sets to refrigerators. 
• PDA Personal Digital Assistant which includes an address book, a 
calendar, Internet access, ect. 
• WAP Wireless Application Protocol which enables mobile phones to 
access the Internet. 
• IBM International Business Machines. 
Task 2. Write a suitable caption under each picture. 
Task 3. Look at the picture below and read the text. Then discuss these 
questions in small groups and prepare a short report for the class. 
1. What are the most important differences between handheld computers 
(eg. palmtops, PDAs, ect.) and traditional compters? 
.........................................................................................................................
......................................................................................................................... 
2. What are the advantages and limitations of handheld computers? 
.........................................................................................................................
......................................................................................................................... 
 136 
Psion Series 5mX handheld 
computers have a keyboard and 
a touch-sensitive screen. 
Although every light weight, 
they have one month battery 
capacity, 16 MB of RAM, a 
windowing OS, a microphone 
for sound recording and a full 
range of application which lets 
you sent e-mail and browse the 
web 
3. Should students be allowed to use handheld computers in class? 
.........................................................................................................................
......................................................................................................................... 
4. Do you agree with this statement: “Soon, handheld PCs will combine the 
functions of traditional PCs, cellular phones and pocket-size organizers? 
.........................................................................................................................
......................................................................................................................... 
IV. PRACTICE 
Exercise 1. Match the terms on the left with the explanations on the right. 
1 Internet – enabled TV a Location on the Internet where a company puts 
web pages 
2 Website b Technology that allows users to see a computer 
simulated world in which they can move. 
3 Virtual reality c TV set used as an Internet device 
4 WAP d Device that can handle multiple data types 
including voice and video. 
5 Wireless e Protocol that enables mobile phones to access 
Internet information. 
6 3G mobile phone f Without the use of cables. 
 137 
Exercise 2. Look at the HELP box and then expand these sentences using 
the future perfect tense. 
1. In ten years time/a lot of people/connect their television to the telephone 
line. 
2. Portable PCs/replace/desktop PCs/in a few years’ time. 
3. With the help of computers/doctors/find/cure/AIDS and cancer/by the 
year 2010. 
4. By this time next year/software manufactures/make/hundreds of new 
programs. 
5. by 2020/ post offices and bookshops/disappear. 
6. By this time next year/I/Buy/handheld computer. 
Exercise 3. Here are some predictions made by an intelligent 
supercomputer. In small groups, write your own predictions. 
* Work/jobs 
Eg. By the year 2030 human labour in industry will have been replace by 
robots. 
Yours: 
 138 
• Homes 
Eg. Families will have robots to do the housework. 
Yours: 
Education/Schools 
Eg. By the end of the next century, every student in every school in the 
world will have a PC 
Yours: 
Money/Holidays 
Eg. Cash will disapper 
Yours: 
Exercise 4. Translate the sentences into Vietnamese 
1. Some hybrid models combine a phone with a PDA. They look like a 
regular phone with a dialpad and a small screen on its front. But if you flip 
up the front cover you find a larger screen that is touch-sensitive. 
 139 
2. Internet TV sets allow you to surf the Web and have email while you are 
watching TV, or vice versa. Imagine watching a film on TV and 
simultaneously accessing a Web site where you get information on the 
actors in the film. 
3. In a VR system, you are hooked to a computer through a controlling 
device, such as a glove, and head-mounted displays give you the feeling of 
being propelled into an artificial three-dimensional world. 
4. Bluetooth is a standard wireless technology designed to connect mobile 
phones computers and other devices, replacing direct cable links. Since it 
uses high-frequency radio waves, the transfer of data and voice is very fast. 
5. With Bluetooth, a handheld computer can be used to surf the Internet 
wherever you are, or to transfer files with other participants in meetings. 
Mobile phones will soon be used to control all sorts of gadgets in the 
house, from TV sets to refrigerators. 
V. FURTHER READING 
 SPEED BOOST 
 140 
Also pushing the wired-to-wireless envelope is the approval of the 
802.11n wireless standard, coupled with capabilities that render it superior 
to 802.11a, 802.11b and 802.11g. “Ratification has made the standard 
mainstream, so end-users are comfortable going wireless even for mission-
critical applications, like office videoconferencing and retail inventory 
management,” asserts Dilip Advani,productmanager,AirMagnet 
Vendors and VARs say customers in many vertical markets favor the 
improved throughput available with 802.11n Wi-Fi, which reportedly 
offers four to six times the bandwidth available under 802.11 a/b/g 
standards. Other advantages of 802.11n over its predecessors encompass 
enhanced efficiency bolstered by MIMO (multiple input and multiple 
output) technology, wherein multiple antennas are employed at the 
network’s transmitter and receiver. MIMO accomplishes the boost via 
higher spectral efficiency, which yields more bits per second per hertz of 
bandwidth, and link reliability or diversity, which reduces fading. 
Additionally, 802.11n has the potential to support more users per single 
access point than its predecessors, with the extra promise of better 
 141 
performance from less equipment, observes Joe Epstein, senior director of 
technology, Meru Networks 
 142 
PHỤ LỤC 
A central processing unit (CPU), also referred to as a central 
processor unit, is the hardware within a computer system 
or smartphone which carries out the instructions of a computer program by 
performing the basic arithmetical, logical, and input/output operations of 
the system: Bộ xử lý trung tâm (CPU) là phần cứng trong một máy tính 
hoặc điện thoại thông minh thực hiện các hướng dẫn của chương trình máy 
tính bằng cách thực hiện các phép tính cơ bản, và nhập/ xuất dữ liệu của 
hệ thống 
A personal computer (PC) is a microcomputer designed for use by 
one person at a time: máy tính cá nhân (PC) là máy vi tính được thiết kế để 
một người sử dụng tại một thời điểm. 
Bluetooth is a wireless technology standard for exchanging data over 
short distances (using short-wavelength radio transmissions in the ISM 
band from 2400–2480 MHz) from fixed and mobile devices, creating 
personal area networks (PANs) with high levels of security: Bluetooth là 
một chuẩn công nghệ không dây để trao đổi dữ liệu trên một khoảng cách 
ngắn (bằng cách sử dụng truyền dẫn vô tuyến bước sóng ngắn trong băng 
tần ISM từ 2400-2480 MHz) từ các thiết bị di động và cố định, tạo ra các 
vùng mạng cá nhân (chảo) với mức độ bảo mật cao. 
Computer hardware equals the collection of physical elements that 
comprise a computer system: Phần cứng máy tính là các yếu tố vật chất tạo 
nên một hệ thống máy tính. 
Computer software, or just software, is a collection of computer 
programs and related data that provides the instructions for telling 
acomputer what to do and how to do it: Phần mềm máy tính thường gọi là 
phần mềm là các chương trình máy tính và dữ liệu liên quan cung cấp các 
hướng dẫn để máy tính phải làm gì và cách làm. 
Short Message Service (SMS) is a text messaging service component 
of phone, web, or mobile communication systems, using standardized 
communications protocols that allow the exchange of short text messages 
between fixed line or mobile phone devices: Dịch vụ tin nhắn ngắn (SMS) 
là một tin nhắn văn bản của điện thoại, web, hoặc các hệ thống thông tin di 
 143 
động, bằng cách sử dụng giao thức truyền thông tiêu chuẩn cho phép việc 
trao đổi tin nhắn văn bản ngắn giữa điện thoại cố định hoặc các thiết bị 
điện thoại di động. 
Storage Devices are the data storage devices that are used in the 
computers to store the data: Thiết bị lưu trữ là thiết bị lưu trữ dữ liệu được 
sử dụng trong các máy tính để lưu trữ các dữ liệu. 
 144 
TÀI LIỆU THAM KHẢO 
1. Betty Schrampfer Azar , 2001. Understanding and using English 
Grammar, The Youth Press 
2. Jesson, J & Peacock, G, 2003, Starter Award in ICT: Next Steps, 
Cambridge University Press 
3. Meredith, S, 2004, Starting Computers, Usborne Publishing Ltd 
4. Raymond Murphy, 1994, English grammar in use, Nhà xuất bản Giáo 
dục. 
5. Randolph Quirk & Sydney Greenbaum, 2008, A university Grammar 
of English, Nhà xuất bản Hải Phòng. 
6. Santiago Remacha Esteras, 2003, English for computer users, 
Cambridge university press. 
7. Thac Binh Cuong , 2000, English for IT and computer users, Ha Noi 
science and technology Press. 
8. Trần Hữu Mạnh, 2008, Fundamentals of English Traditional Syntax, 
Nhà xuất bản Đại học Quốc Gia- Hà nội. 
9. www.computerhope.com/jargon/.../contunit.ht... 
10. www.apple.com/mac. 
11. compnetworking.about.com/.../network_types 
            Các file đính kèm theo tài liệu này:
 giao_trinh_tieng_anh_chuyen_nganh_cong_nghe_thong_tin_englis.pdf giao_trinh_tieng_anh_chuyen_nganh_cong_nghe_thong_tin_englis.pdf