[go: up one dir, main page]

100% found this document useful (1 vote)
2K views149 pages

English For Students of Computer Sciecne

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views149 pages

English For Students of Computer Sciecne

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 149

English for Students of

Computer Science 1
Parigul Nabizadah

Editors:

Dr. Suzanne Griffin


Lisa Roegner
Toufiq Sarwarzada

Herat 2013

Project made possible by a grant from the United States Embassy Kabul
Herat University Press

English for Students of Computer Science 1

Authors: Parigul Nabizadah


Edited by: Dr. Suzanne Griffin, Lisa Roegner, Toufiq Sarwarzada
First Edition: 2013
Cover Design: Hekmatullah Sarwarzada
Interior Design: Hekmatullah Sarwarzada
Printed by: Silver Star Printing Co.

Published by Herat University


Ghol Urdu Street, Herat, Afghanistan

Project made possible by a grant from the United States Embassy Kabul

All rights reserved. No part of this book may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, electronic, mechanical,
photocopy, recording, or otherwise, without prior permission of the publisher.

For more information about the book send your inquiries to:
heratespproject@gmail.com
Preface

Introduction to the Herat University English for Specific Purposes Textbooks

The Herat English for Specific Purposes (ESP) textbooks are the first series of ESP
textbooks produced for Afghan university students in Afghanistan. The Herat ESP
Project was initiated in 2012 by a request of Herat University Chancellor Mir Ghulam
Osman Barez Hosseini to the Public Affairs Section of the United States Consulate
in Herat. The first ESP textbooks were completed and published under the leadership
of Chancellor Dr. Abdul Zahir Mohtasebzadeh. English language instructors in two
departments of Herat University - the English Language and Literature Department and
the English Language and Computer Learning Center produced the textbooks under the
guidance of Senior English Language Specialist Dr. Suzanne M. Griffin, ESP Editor
Mr. Toufiq Sarwarzada and English Language Fellow Lisa Roegner.

The project was initiated because Herat University English instructors and their
students had discovered that commercially available ESP textbooks were inadequate to
the needs of Afghan students in specific departments of the university. English instructors
began developing their skills as ESP materials writers in spring 2012, through a series of
workshops and individual mentoring sessions that focused on developing lesson plans
with sufficient detail to guide the classroom lessons for future ESP instructors. The goal
of their work was to help Herat University undergraduate students successfully read
the textbooks, journal articles and online resources written in English in nine discipline
areas: Computer Science, Economics, Engineering, Humanities, Journalism, Medicine,
Public Administration, Sciences and Sociology.

In autumn 2012 ten instructors combined their efforts and worked in teams to
develop their lessons into textbook materials while four instructors continued to
develop textbook materials individually. The instructors’ work was guided by a
leadership team that consisted of the department heads of the English Language and
Literature Department and the English Language Center, as well as the ESP Section
head and the ESP textbook editor in the English Language and Literature Department
and led by the American English Language Specialist. The English Department Head
of Herat Education University actively participated in the workshops and later joined
the leadership team. The project goal is to produce four books in each discipline area
by 2014.

The spring and autumn activities--workshops, consultant contracts for the English
Language Specialist and printing of the first textbooks--were supported by two grants
from English Language Programs Office in the Public Affairs Section of the United
States Embassy, Kabul. The second grant was administered by the United States
Consulate in Herat.
Dr. Suzanne Griffin
ACKNOWLEDGEMENTS

Special thanks are due to the following persons for support of the Herat University ESP
Project:

Chancellor Mir Ghulam Osman Barez Hosseini, Herat University (2009- Oct. 2012)
Chancellor Dr. Abdul Zahir Mohtasebzadeh (Oct. 2012- )
Stephen Hanchey, English Language Programs (ELP) Officer, Public Affairs Section
(PAS) United States (US) Embassy, Kabul
Professor M. Hanif Hamid - ELP Office, PAS, US Embassy Kabul
Mr. Bradford Hanson, US Consul, Herat (2011- Oct. 2012)
Ms. Lisa Roegner, English Language Fellow at Herat University and Herat Education
University - ESP Textbook Editor
Dr. Suzanne Griffin, Project Director, Senior English Language Specialist Consultant to
US Embassy, Kabul

Heads of the English Language and Literature Department:


Mr. Abdul Wahab Shams 2011- Summer 2012
Ms. Muzhgan Azizi Autumn 2012
Ms. Homaira Baher 2013

Professor Yarmand, English Department Head, Herat Education University


Mr. Najibullah Habibi, English Language Center Director, Herat University
Table of Contents Page

Unit 1. What are computers and how they work? 6

Unit 2. Types of Computers 13

Unit 3. Central Processing Unit 19

Unit 4. What is a Mainboard? 25

Unit 5. Workstations 32

Unit 6. Servers 38

Unit 7. Types of Computer Viruses 45

Unit 8. Open Source Software 52

Unit 9. Peer-to-Peer Network versus Server-based Networks 60

Unit 10. What is Programming? 68

Unit 11. What Operating Systems Do 76

Unit 12. What is a Database? 84

Unit 13. Machine Languages, Assembly Languages and High-Level Languages 91

Unit 14. Java, World Wide Web, and Beyond 98

Unit 15. Unix vs. Linux 105

Unit 16. The Internet 111

Unit 17. Social Networking 118

Unit 18. Computer Threat: Hackers 125

Unit 19. Logical Ports and Firewalls 133

Unit 20. Password Protection and Password Management 141


1 What are computers and
how they work?

Introduction to the Lesson

Discuss the following questions with your classmates:

1. Have you ever used a computer?


2. Is it easy to type a text by computer or by hand?
3. Do you know what the software and hardware are?
4. Do you know what memory is? Is there any relation between a human’s memory and
a computer’s?

Unit 1 What are computers and how they work? 6


Vocabulary

Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language:
No. Words English Synonyms / definitions NL Meaning
1 Electronic Pertaining to electronics
Man-made device of interconnected parts
2 Machine
that work together to perform a task
3 Mathematical Concerning mathematics, arithmetical
4 Calculation Computation , estimate
5 Logical Based on logic, simulated
6 Quickly Fast
7 Comparison Similarity, likeness
8 Mistake an error
9 Result Outcome
10 To store To supply, to stock
11 Forever Always
12 To reason To think, to consider logically
13 Consist Be made of
14 Between Among
15 To perform to, to act
16 Operation Act of operating; working, performance
17 Relation Connection
18 Physical Bodily
19 Spirit Soul
20 Permanent Lasting, enduring
21 Temporary Impermanent, passing
22 Storage Memory (computer)
24 Last End, persist
25 Long Extended, far reaching
26 To switch on To turn on
27 To switch off To turn off
28 Special Important
29 To operate To act, function
30 Central Main, principal
31 Brain Mind

Unit 1 What are computers and how they work? 7


32 To maintain To keep in existence
33 To send To propel, to launch
34 Device Hardware component
35 Such as Like, as an example of
36 Important Significant
Activity
Complete each sentence with a word from the box.

consists show mistake(s) quickly machine(s)

1. Computers don’t make any ………………………. in calculations.


2. Robots are intelligent………………………………….that can work automatically.
3. How does a computer ………………..the actions to the user?
4. A computer…………………………..of three main parts.
5. We cannot write as…………………………as computers.

Listening

Activity
Listen to the recording twice and then write about a computer mouse in your own words.

Computer Mouse

Activity
Exchange your books with your partners. Listen again and try to make corrections on
your partner’s answers.

Reading

What are computers and how they work?

A computer is an electronic machine that makes mathematical calculations and


logical comparisons quickly without any mistakes. Computers take information
(called data), process it, and show the results of the processing. They can store the
results forever. For these reasons, computers have become a part of our lives.

Computers consist of two parts, hardware and software. Hardware is the


Unit 1 What are computers and how they work? 8
physical parts of the computer. Software is the programs in the computer. Software
uses hardware to perform operations for the computer user. The relation between
hardware and software is like the relation between our body and our spirit.

Computers can store information in two different ways: in permanent storage


(for example, on a disk or a CD), and in temporary storage, also called the
computer’s memory, or RAM. Data in temporary storage only lasts as long as the
computer is switched on. This is why the storage is called temporary. When you
switch on a computer, first a special piece of software called the operating system is
copied (loaded) from permanent storage to the RAM.

The computer gets data from an input device such as a keyboard, mouse, hard
disk, or scanner, and makes all the calculations and the comparisons in the central
processing unit (CPU). The CPU is like the computer’s brain. It uses the RAM to
maintain the data. When the CPU has processed the data, it sends the results to an
output device such as a monitor, hard disk, or printer. When you switch a computer
off, the computer copies any important data in the RAM back to permanent storage.
The users can access the saved data forever. For these reasons, computers have
become a part of our lives.
Copyright (Ay, Osman. And et.al. (2003). Introduction to Computers. Istanbul – Turkey: Zambak Typesetting & Design.)

After you Read

Activity
Make meaningful English sentences using the following words.

maintain special memory switch off operate

1. ……………………………………………………………………………………………….....................................
2. ……………………………………………………………………………………………….....................................
3. ……………………………………………………………………………………………….....................................
4. ……………………………………………………………………………………………….....................................
5. ……………………………………………………………………………………………….....................................

Activity

Write the definitions of the following computer terms based on the reading passage.

1. A computer is a ……………………………………………………………………………..............................
2. A memory is ………………………………………………………………………………................................
3. Operating system is …………………………………………………………………………..........................

Unit 1 What are computers and how they work? 9


Understanding the Text

Activity
True or False? Read the sentences and mark T or F.
1. We cannot store the data permanently in our computer. .................
2. Any mathematical calculation can be done by computer. .................
3. There is no difference between the hardware and software of .................
computer.
4. This passage mostly focuses on storing data by a computer. .................
5. The brain of a human being helps him to think and similarly the CPU .................
of a computer helps it to process.
6. The output devices are helpful for inserting data in a computer. .................
7. RAM can process the data and send them to output devices to perform .................
the action.
8. With the help of permanent storage you can see your saved .................
information any time you want.

Activity

Consider the information in the reading passage. Then work with a partner to answer
the questions below.

1. How useful are computers in today’s life?


2. Explain the relationship between software and hardware.
3. How does a computer store data?
4. What is the role of CPU in a computer?
5. How does a computer get the information?
6. How does a computer send the data?
7. What is the difference between input and output devices?

Reading skill

Scanning
When you need to find specific information in a text, you don’t need to read
every word. Instead, you can move your eyes quickly over the text to find the
information. This is called scanning.

Activity
Read the questions below. Then scan (don’t read) the following paragraph to find the
answers.

Unit 1 What are computers and how they work? 10


Questions Answers
1. How many functions do TV cards have?
2. What is a TV decoder useful for?
3. What is a TV tuner good for?

TV Card

TV cards usually have two functions, TV decoding and TV tuning. The TV decoder
transfers the picture that is on the screen to a TV. This is sometimes useful for business
presentations. The TV tuner allows you to watch TV channels on the monitor so that
your monitor becomes like a TV.

Grammar - Writing
Pronoun +Be + Noun Pronouns
Singular Plural I Forms of be
Pronoun + Be + Noun Pronoun + Be + Noun You am
I am a student We are students He is
You are a student You are students She are
She is a student They are students It
He is a student We
It is a country They

Activity
Complete each sentence by circling a word in parentheses.

1. That keyboard is so interesting, but ….. (He, she, it) is very old.
2. You …. (is, are) so careful about playing games by computer.
3. My laptop (is, are) the best one among all in the world!
4. Software and hardware ………(is, are) very important for computers.
5. I ……(are, am, is) a computer specialist.

Activity
Make five sentences using subjective pronouns with be + nouns.

1. ……………………………………………………………………………………... .
2. ……………………………………………………..……………………………… .
3. ……………………………………………………..……………………………… .
4. ………………………………………………………..…………………………… .
5. ………………………………………………………….………………………… .
Unit 1 What are computers and how they work? 11
Discussion and Writing

Activity
Pair Work: List three examples for hardware and three examples for software.

Software Hardware
Example: Windows XP Example: keyboard
1. 1.
2. 2.
3. 3.

Activity
Group Work: Read the examples of hardware and software aloud in the class and
then share your information about them.

Activity
Homework: Choose one of the examples of hardware/software (talked in the
class), search the internet for the information about software or hardware and
then write about the information.

Unit 1 What are computers and how they work? 12


2 Types of Computers

Introduction to the Lesson

Discuss the following questions with your classmates:

1. How many types of computers do you know about? Name them.


2. Does each type of computer work the same?

Unit 2 Types of Computers 13


Vocabulary

Activity
Three of the words in each group are synonyms. Cross out the word that has an
opposite meaning (antonym).

Example: sad upset happy sorrowful

1. Quickly rapidly fast slow


2. Expensive cheap costly precious
3. Large big small huge
4. Super excellent worst extraordinary
5. Powerful effectual forceful harmful

Activity
Based on exercise 1, write the synonyms and antonyms of the given words in the chart
below.

No. Words English Synonyms English Antonyms


1 Powerful
2 expensive
3 large
4 Super
5 Rapidly

Activity
Match the meaning of words in column A with the words in column B:

A B
1. Incredibly common
2. Forecast inquiry
3. Military unbelievably
4. research army
5. weather predict
6. usual medium
7. capacity company
8. insurance climate
9. organization guarantee
10. mid – sized function
Unit 2 Types of Computers 14
Listening

Dictation
Listen to the recording carefully and write every word you hear. Don’t add something
of your own!

Palmtop computers

Activity
Listen again and correct your mistakes.

Activity
Exchange your books with your partners. Listen again and correct your partner’s
mistakes.
After you Read

Scanning
Scan the passage and complete the information below.

Title of the article: ..................................................................


A mainframe computer does…………………. And shows …………….on a…………. .
Both mainframe computers and…………………are powerful and………………….
Supercomputers are often used by……………. They are also used for weather forecasting
and…………….. An IBM PC and Apple Macintosh are two kinds of………………… .

Reading

Types of Computer

Mainframe Computers
A mainframe computer is a big, powerful, and expensive computer. Many people
can use the power of a mainframe computer at the same time, using either a PC
(personal computer) or a ‘dumb terminal’. A PC performs a lot of processing itself.
A dumb terminal uses the mainframe computer to do all the processing, and just
Unit 2 Types of Computers 15
shows the results on a screen. Large organizations, for example banks and insurance
companies, use mainframe computers.

Minicomputers
Like mainframe computers, minicomputers are very powerful and expensive.
Mainframes and minicomputers are used for almost the same things. Mid-sized
companies use minicomputers.

Supercomputers
A supercomputer is an incredibly powerful computer with a very big capacity for
processing data. Supercomputers are often used by the military. They are also used
for research and for things such as weather forecasting, where a huge amount of data
has to be processed rapidly.

Microcomputers
Microcomputers are usually used by one person at a time. An IBM PC and Apple
Macintosh are two kinds of microcomputer. There are desktop, laptop, palmtop,
pocket, and tablet models of microcomputers.

(Ay, Osman. And et.al. (2003). Introduction to Computers. Istanbul – Turkey: Zambak Typesetting & Design.)

After you Read

True or False?
Read the sentences and mark T or F.

1. A dumb terminal never uses the mainframe computer to do all the processing. .................
2. Microcomputers are usually used by many people at a time.
3. A supercomputer is an incredibly powerful computer often used by .................
the military. .................
4. Mainframe computers are mostly used by large organizations such
as banks, insurance companies, etc. .................
Activity
For each item below, circle the best answer(s).

1. A ………………………… is good for forecasting the weather.


a. mainframe computer
b. microcomputer
c. supercomputer

2. Desktop, laptop, and pocket are models of ………………… .


a. minicomputer
b. microcomputer
c. supercomputer
Unit 2 Types of Computers 16
3. A main frame computer and …………………. are used for almost the same thing.
a. minicomputer
b. supercomputer
c. microcomputer

Grammar - Writing

Using Adjectives Adjectives


Adjective + noun Powerful
Mid-sized companies use minicomputers Expensive
To be + adjective Large
Mainframe computers are very powerful Mid – sized
Personal computers are not expensive Super
huge

Activity
Put the following words in correct order to make meaningful sentences.

1. computers / laptop/, /are/, / portable/ palmtop/ and/.


……………………………………………………………………………………....................................................
2. very /to/ it/ by/easy/computer/is/search/data/specific/for/.
……………………………………………………………………………………....................................................
3. very/ expensive/ powerful/ minicomputers/ and/ are/.
……………………………………………………………………………………....................................................
4. used/not/small – sized/ in/ banks/computers/are/the/.
……………………………………………………………………………………....................................................
5. personal/use/computers/you/home/do/at/?
……………………………………………………………………………………....................................................

Activity
Make sentences with the adjectives given:

Inexpensive, super, big, modern, updated

1. ……………………………………………………………………………………...............................................
2. ……………………………………………………………………………………...............................................
3. ……………………………………………………………………………………...............................................
4. ……………………………………………………………………………………...............................................
5. ……………………………………………………………………………………...............................................

Unit 2 Types of Computers 17


Discussion and Writing

Activity
Pair Work. Discuss with your partner about four types of computers that you read
about in the text. Try to list the similarities and differences among them.

Example:
Student A: Is there any similarity between mainframe and super computers?
Student B: Of course, both are powerful with big capacity.

Activity
Homework: Compare the minicomputer with the microcomputer in a few sentences by
writing their similarities and differences.

Unit 2 Types of Computers 18


3 Central Processing Unit

Introduction to the Lesson

Discuss the following questions with your classmates:

1. Do you know how important the CPU is in a computer?


2. How many components does a CPU have?

Unit 3 Central Processing Unit 19


Vocabulary

Activity
In the chart below, English synonyms or definitions are given, write their meanings in
your native language.
No. Words English Synonyms / definitions NL Meaning
To recover, to find information and display it as
1 To retrieve
output
2 Instruction Direction, guideline
3 To execute To perform, run a computer program
4 Component Parts
5 To control To rule, to command
6 To coordinate To arrange in proper order
7 Action Perform
8 Numeric Consisting of numbers
9 Addition Adding
10 Subtraction Deduction
Process of calculating the result of one number
11 Multiplication
multiplied by another.
12 Division Act of separating into parts
13 Internal Interior,
14 To emit To send out
15 Pulse Beat
16 Constant Continuous, steadfast
17 Synchronize Operate simultaneously;
18 Pace Speed of progress
19 Speed Quickness; velocity
20 To execute To perform, to run a computer program
21 measurement calculation of size or extent
22 Equal same, identical
23 Continuously ceaseless
24 manufacturer owner of a manufactory
Activity
Make grammatically correct sentences with the words from the box below.

addition internal synchronize speed component

1. .....................................................................................................................................
Unit 3 Central Processing Unit 20
2. .....................................................................................................................................
3. .....................................................................................................................................
4. .....................................................................................................................................
5. .....................................................................................................................................

Listening

Activity
Listen to the recording carefully and fill in the blanks from the words below:

Modify information stands CD- RW video


Software equipped rewritten CD read - only

CDs and DVDs


CD …………. for compact disk. There are two types of ………….. drives: CD-R and CD-RW. A
CD-R is for …………. permanent storage; the user cannot ………….. its contents once they
are recorded. A …………… can be used like a hard disk and can be both read and……………...
A single CD can hold up to 700 MB. Most …………… is distributed through CD-ROMs. Most
new PCs are ………….. with a CD-RW drive that can work with both CD-R and CD-RW. DVD
stands for digital versatile disc or digital …………… disk. DVDs and CDs look alike, and you
can use either to store data. A DVD can hold more ……………… than a CD. A standard DVD’s
storage capacity is 4.7 GB.

Activity
Exchange your books with your classmates. Listen again and correct your classmates’
mistakes.

Scanning

Scan the reading passage and then fill in the blanks.

1. In fact, the …………. is the brain of a computer.


2. There are millions of ……………………… in semiconductor chip of recent CPUs.
3. The clock speed of a computer is usually stated in ……………………………… .
Reading

Central Processing Unit


The central processing unit (CPU) is the computer’s brain. It retrieves
instructions from memory and executes them. The CPU usually has two
components: a control unit and an arithmetic/logic unit. The control unit controls
and coordinates the actions of the other components. The arithmetic/logic unit
Unit 3 Central Processing Unit 21
performs numeric operations (addition, subtraction, multiplication, division) and
logical operations (comparisons).

Today’s CPU is built on a small silicon semiconductor chip having millions of


transistors. Every computer has an internal clock, which emits electronic pulses
at a constant rate. These pulses are used to control and synchronize the pace of
operations. The higher the clock speed, the more instructions are executed in a
given period of time. The unit of measurement of clock speed is the hertz (Hz),
with 1 hertz equaling 1 pulse per second.

The clock speed of a computer is usually stated in megahertz (MHz) (1 MHz


is 1 million Hz). CPU speed has been improved continuously. Intel’s Pentium
3 Processor runs at about 500 megahertz and Pentium 4 Processor at about 3
gigahertz.

The main CPU manufacturers today are Intel (8086, 80486, Pentium, Pentium
Pro, Pentium-II, Pentium-III, and Pentium-IV processors). MHz).

(Liang, Y. Daniel. (2011). Introduction to Java Programming. New Jersey.)

After you Read

True or False?
Read the sentences and mark T or F.

1. The control unit performs numeric and logical operations. .................


2. Old CPUs were built on bigger silicon semiconductor chip than .................
today’s CPU.
.................
3. Pentium 4 Processor runs at about 3 megahertz (MHz).
4. If the clock speed becomes higher, more instructions will be .................
executed in a given period of time.

Reading Skill
Asking yourself questions while you read
As you read it helps to stop and ask yourself questions to check your
comprehension.
Example questions:
• Do I understand this?
• Do I know what this word or technical term mean?
• What information do I remember?
• Do I need to read this again?

Unit 3 Central Processing Unit 22


Activity
Read the first paragraph of the passage and answer the following questions.
1. Do I understand the information in this paragraph?
2. Do I know what CPU means?
3. Do I need to read this again?

Activity
Read the Second paragraph of the passage and answer the following questions.

1. Do I understand the information in this paragraph?


2. Do I know what an internal clock does?
3. Do I need to read this again?

Grammar - Writing

Form and Basic Meaning of the Simple Present Tense


Singular Plural Notice: The verb after she , he it (third
First person I talk we talk person singular) has a final –s: talks.
Second person you talk you talk
Third person she talks they talk
He talks
It rains
1. I eat breakfast every morning The simple present tense expresses
2. Ahmad speaks English every day habits. For example, eating breakfast is a
usual activity.
a. Do you study your lessons every night? Do and does are called “helping verbs.”
b. She doesn’t want to try hard. They are used in questions and negatives.
In third person singular, there is no –s on
the main verb; the final -s is part of does.

Activity
Change the following statements in questions and then into negative forms:

1. I play some computer games every Friday


2. She really wants to be a programmer in future.
3. My mother likes learning how to type.
4. They come to the office to copy the papers.
5. We write new songs on the CD every day.

Unit 3 Central Processing Unit 23


Activity
Write the process of how you turn your computer on and down in complete sentences.
Use simple present.

Discussion and Writing

Activity
Group Work. Make groups of four students. Ask and answer the questions below.

1. How many CD drivers are there?


2. What is a CD – R used for?
3. What is a DVD used for?
4. What is the function of a CD – RW?
5. What are new PCs equipped with?
6. What do a CD and a DVD stand for?
7. How much data can be stored in a CD? And in a DVD?

Activity
Homework:
Based on the information you exchanged in the class about CD and DVD, write brief
information about any of them. Try to use your own words!

Unit 3 Central Processing Unit 24


4 What is a Mainboard?

Introduction to the Lesson

Discuss the following questions with your classmates:

1. Have you ever thought about the inside of you pc?


2. Do you know what the mainboard of your computer is?
3. Why is the mainboard so important in a computer?
4. What is the most important function of the mainboard?
Unit 4 What is a Mainboard? 25
Vocabulary

Activity
In the chart below, the words’ English synonyms or definitions are given; write their meanings
in your native language.
No. Words English Synonyms / definitions NL Meaning
1 Cable Thick rope of steel or other metal
2 Inside Within; in
3 To connect
To join, to link
4 To situate
To locate
5 To attachTo fasten
6 Via By way of, by means of
7 Directly Clearly
8 Nowadays In these times
9 To contain
To include
10 To allow To let
11 Socket Hollow part, cavity
12 To extendTo stretch, to enlarge
13 Feature Characteristic, quality
14 Capability
Ability, skill
15 To hold Contain; keep
16 To locatePlace, situate
17 Potable Movable
18 Commonly Usually
19 To enableTo make capable
20 Password Code word
21 Error Mistake
Sound which the computer makes in order to
22 Waning beep
attract the user's attention
24 Plug Electrical connector
25 device Hardware component which can send or receive data

Activity
Fill in the blanks using the words given.

device error plug connect Cables enable

1. If your computer show an……………. while opening a file, it means something is wrong with it.
2. Installing antivirus software …………………the computers to be protected.
Unit 4 What is a Mainboard? 26
3. A network interface card allows computers to communicate with each other through
………………. .
4. Before switching your computer on, you should …………. it to the electricity.
5. A printer is a ………………….by which you can print as much as data you want.

Listening

Activity
Listen to the people talking about Video Card, Sound Card and Network Interface Cards
and fill the blanks.

1. A ……………… card converts digital sound signals to analog sound signals and sends
them to the ………………. so that you can hear sounds.
2. A …………..… card converts the digital signals in a computer to a special format that
can be displayed on a …………………. .
3. A ……………………….card allows computers to communicate with each other through
………………………… .

Activity
Listen again and write the answers the questions.

1. Is it possible to use a TV as a screen for your computer? If yes, how?


………………………………………………………………………………………………………………………………………
2. How can you record your voice by your computer?
………………………………………………………………………………………………………………………………………
3. What is speech recognition and what does it do?
………………………………………………………………………………………………………………………………………
4. What are network interface cards used for?
………………………………………………………………………………………………………………………………………

Activity
Exchange your books with your partners. Listen again and try to make correction on
your partner’s answers.

After you Read

Scan the reading passage and then answer the following questions.

1. What are all computer components connected to?


2. What does ROM – BIOS stand for?
3. Where are Serial Ports located?
Unit 4 What is a Mainboard? 27
Reading Passage

Mainboard

The main board (also called the mother board, or system board) is the
biggest board inside your system unit. All the main components of your
computer connect to the mainboard. The CPU is normally situated on your
mainboard along with all the other electronic components. All the other
boards (cards) in your computer connect to the mainboard. Other items, such
as the hard disk, are attached to the mainboard either directly or via cables.
Mainboards are getting smaller and smaller as the components become more
integrated. Nowadays, if you open up a system unit it can look quite empty.

The ROM-BIOS (Read Only Memory-Basic Input Output System) chip is a


special microchip on your computer’s mainboard. It contains software that
allows your computer to work with your operating system. For example, it
copies your operating system into RAM when you switch on your computer.

Buses are data paths on the motherboard that connect the CPU to the
different parts of the mother board, such as the chips and cable connections.
Expansion slots are sockets on the mainboard which allow you to extend the
computer’s features and capabilities.

Expansion slots hold expansion cards (such as a video card, sound card,
or network card) and connect them to the buses. Laptops and other portable
computers use special expansion slots called PCMCIA slots, which accept small
expansion cards called PC Cards.

Serial ports are sockets located at the back of your computer that allow you
to connect items such as modems to the computer. Serial ports are commonly
labeled COM1 or COM2.

Parallel ports are sockets located at the back of your computer that enable
you to connect items such as printers to the computer. Parallel ports are
commonly labeled LPT1 or LPT2.

PS/2 keyboard and mouse ports are used to connect a keyboard and mouse to the
mainboard. A battery on the mainboard is needed to store some important information (such
as the date and time, and maybe a user password) while your computer is switched off.

An internal speaker connected to the mainboard allows your computer to


send you error or warning beeps while it is running.

Unit 4 What is a Mainboard? 28


The USB (Universal Serial Bus) is quite a new item inside a PC. USB ports
are located at the back of the system unit. They allow you to plug in devices
designed for the USB such as scanners, digital cameras, and printers.

The bus arbitrator (chipset) is an integrated circuit on the motherboard.


It controls how the mainboard buses are used. If two different devices try to
use the same bus at the same time, there can be a problem. The bus arbitrator
prevents this problem.

(Ay, Osman. And et.al. (2003). Introduction to Computers. Istanbul – Turkey: Zambak Typesetting & Design.)

After you Read

True or False?
Read the sentences and mark T or F.
1. A few of the main components of your computer connect to the .................
mainboard
2. ROM - BIOS copies your operating system into RAM when you .................
switch on your computer.
3. Serial ports are sockets located in front of your computer that .................
allow you to connect items such as printers, scanners to the
computer. .................
4. The USB stands for( Universal Silver Business).
5. An internal speaker connected to the mainboard helps you hear .................
music sounds while playing a video file.

Activity
Consider the information in the reading passage. Work with a partner to answer the
questions below.

1. Why is the mainboard called the motherboard?


2. Where is CPU located?
3. What are all boards in your computer connected to?
4. What is the function of ROM – BIOS in your computer?
5. What are buses and what do they do?
6. Where are Parallel ports located and what are their functions?

Unit 4 What is a Mainboard? 29


Grammar - Writing

Wh
Examples Explanatory Answers No short answer!
Questions:
What 1. What are parallel ports? They are sockets. Yes/ No
When 2. When did you learn I learned typing in Yes they do./
Why typing? 2001. No, they don’t.
Where 3. Why mainboard is called Because it is the
Whose motherboard? biggest part in your
Who 4. Where serial ports are unit system.
Whom located in your computer?
Whose They are located at
How the back of computer.

Activity
Change the following statements into questions using the given wh – question words.

1. The USB (Universal Serial Bus) is quite a new item inside a PC.
What…………………………………………………………………………………….?

2. My father usually sends his application letters to different organizations through


Gmail.
How…………………………………………………………………………………….?

3. I often forget my computer password because it is too long.


Why……………………………………………………………………………………?

4. Ali memorizes 10 computer terms every night.


When…………………………………………………………………………………...?

5. My friend taught me how to install anti- virus software in my computer.


Who…………………………………………………………………………………….?

Discussion and Writing

Activity
Pair Work. Suppose you are buying a computer from a computer store and your
partner is the seller. Ask a lot of questions about different types of computer
available in the store, their prices, their manufacturing companies, and their features
(such as memory storage, capacity, battery life and display quality) . Try to use Wh –
questions!

Unit 4 What is a Mainboard? 30


Example:

Seller: How can I help you?


Buyer: I am looking for a high quality computer.
Seller: What type?
Buyer: Hmm…

Activity
Home Work. Write about the conversation (buying a computer) that you had with
your partner in the class. Don’t forget to mention every detail-- especially the result of
shopping.

Unit 4 What is a Mainboard? 31


5 Workstations

Introduction to the Lesson

Discuss the following questions with your classmates:

1. Do you know what the workstation is?


2. How workstations differ from personal computers?
3. Have you ever used a workstation?
Unit 5 Workstations 32
Vocabulary

Activity
In the chart below, the words’ English synonyms or definitions are given; write their
meanings in your native language:

No. Words English Synonyms / definitions NL Meaning


1 Primarily Principally, mainly
You use exclusively to refer to situations that
2 Exclusively involve only the things mentioned, and nothing
else.
System of input and output devices connected to
3 Console
a main computer
If something is reserved for a particular person or
4 Reserve
purpose, it is kept especially for that person or purpose.
5 Individual human being; particular person
To say that something shows all the most usual
6 Typically
characteristics of a particular type of thing.
7 Require Demand, need
8 Fairly Means to quite a large degree, reasonable
11 Frequently Regularly, often
12 Audio Pertaining to hearing, auditory
A device that is used to make sounds louder or to
13 Microphone
record them on a tape recorder.
High –
14 High volume which can be contained or received
capacity
15 Removable May be removed
If things vary, they change or are different in size,
16 Vary
amount, or degree.
Act of creating a three-dimensional picture
17 Rendering
according to a model within a computer
A simulation is an attempt to solve a problem by
18 Simulation
representing it mathematically, often using a computer.
You use likewise when you are comparing two
19 Likewise
things and saying that they are similar.
Cutting –
20 Modern, updated
edge
21 Dictate Command, order
copying of data in order for retrieval in the event
22 Backup
of a malfunction
Unit 5 Workstations 33
Activity
Write meaningful English sentences with the words from the box.

vary backup audio likewise removable

1. …………………………………………………………………………………………….
2. …………………………………………………………………………………………….
3. …………………………………………………………………………………………….
4. …………………………………………………………………………………………….
5. …………………………………………………………………………………………….

Listening

Activity
Dictation: Listen to the recording carefully and write every word you hear. Don’t
add something of your own!
Microphone

Activity
Exchange your papers with your partners. Listen again and try to make corrections on
your partner’s papers.Scanning: Scan the passage and then check Yes or No for the
following questions.

1. Is workstation type of a computer?


2. Does the workstation include an audio hardware?
3. Do workstations have network connection?

Reading

Workstations

A workstation is a computer that is used primarily or exclusively from that


computer’s own console (the keyboard and monitor attached directly to the
computer). Workstations are sometimes also referred to as desktop computer,
although some people apply the latter term to somewhat lower – performance
computer s without network connection, reserving the term “workstation “for
systems with network connection.
Unit 5 Workstations 34
Because they are used by individuals, workstations typically require fairly
good input /output devices – a large display (typically 17 – inch or larger) a high
quality keyboard, and a good 3 – button mouse. (Lunix ,unlike windows, use all
three buttons, so a two button mouse is suboptimal). Workstations also frequently
include audio hardware (a sound card, speakers, and sometimes a microphone)
and high capacity removable media drives (Zip or LS -120 drives perhaps CD –R or
CD- RW burners, and often a DVD-ROM drive).

CPU speed, memory, and hard disk requirements vary from one application to
another. A low – end workstation that’s to be used for simple tasks such as word
processing can get by with less of each of these values than is available on new
computers today.

A high – end workstation that will be used for video rendering, heavy – duty
scientific simulations, or the like may need the fastest CPU, the most RAM, and the
biggest hard disk available. Likewise, low – end workstations are likely to have
less cutting – edge network hardware than are high – end workstations, and the
differing hard disk requirements dictate less in the way of backup hardware for
the low – end workstation.

(Smith, Roderick W. (2004) Linux +. SYBEX Inc. 1151 Marina Villiage. )

After you Read

True or False?
Read the sentences and check T or F.
1. In this article two types of workstation were introduced. .................
2. A workstation requires a display smaller than 8 inch. .................
3. According to this article, a two – button mouse is suboptimal for .................
windows.
4. A low – end workstation is used for video rendering and scientific .................
simulation.
Activity
For each item below, circle the best answer(s).

1. Workstations typically require…………………………………………


a. Good input/output devices
b. High – quality keyboard
c. Good 3 – button mouse
d. All above

Unit 5 Workstations 35
2. The fastest CPU, the most RAM and biggest hard disk are needed for……………………
a. Disk top computers
b. High – end workstations
c. Low – end workstations
d. None of the above

3. The low - end workstation and high – end workstation ………………………


a. both work the same
b. have different hard disk requirements
c. have different usages
d. b and c

Grammar - Writing

Adverbs of Manner
Adverbs of Manner are adjectives that almost always end with –ly, though some are
also irregular. Except good that its adverb form is changed to well, other irregular
adverbs of manner have the same form with their adjective form.

Examples of regular adverbs of manner: Example of Irregular adverbs of manner:

Frequently Happily fast late


Quietly Certainly good early
Slowly daily well hard

Role and Placement of Adverbs of manner


1. An adverb for manner is usually placed after the verb. It tells us how the action or
activity was performed.
Example: The computer configured the program slowly.

2. An adverb for manner is placed before an adjective. It modifies the quality or


character of the adjective.
Example: He is extraordinarily good at typing.

3. Adverbs of manner comes before another adverb to modify it,


Example: He hacked his friends email address extremely confidently.

4. A manner adverb is placed before a clause to expresses the attitude of the speaker
on content of the clause.
Example: Illegally, he broke the program code and downloaded the eBooks.

Unit 5 Workstations 36
Activity
Reread the text of this chapter and list at least four adverbs of manner and four
adjectives.

Adverbs of manner Adjectives


1. .................................. 1. ..................................
2. .................................. 2. ..................................
3. .................................. 3. ..................................
4. .................................. 4. ..................................

Activity
Now, change the listed adjectives into adverbs of manner and then make sentences
with all these eight adverbs in your notebooks.

Discussion & Writing

Activity
Group work: As you are studying computer, you may know how to install windows or
Ubuntu programs in your computer. Sit in a group and try to explain the process of
installing one of these programs. Each student should explain only one process!

Activity
Writing. As you are discussing, one of the group members should write down the
process.

Activity
Now exchange the written process of installing the program with other groups in order
to be corrected.

Activity
It is time to read the processes aloud in front of the class.

Activity
Homework: Write a few sentences about your group discussion. How did it go? Did
you really know how to install these programs or did you learn them from group
discussion?

Unit 5 Workstations 37
6 Servers

Introduction to the Lesson

Discuss the following questions with your classmates:

1. Do you know what a computer server is?


2. What facilities can the servers provide for computer users?
3. How many servers type can you name?

Unit 6 Servers 38
Vocabulary

Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language.

No. Words English Synonyms / definitions NL Meaning


When two people or things have just been
1 Latter mentioned, you refer to the second one as the
latter.
2 Appropriate Suitable or acceptable for a particular situation
Something that is desirable is worth having or
4 Desirable
doing.
5 Enhanced Increased
If something tends to happen, it usually happens
6 Tend
or it often happens.
7 Multiple things that consist of many parts
A notch is a small V shaped cut in the surface or
8 Notch
edge of something.
9 Dedicated Special
Something that prevents something else from
11 Buffer
being harmed.
12 Obtain Get, achieve
Something that is modest is quite small in size or
13 Modest
amount
A series of events that are considered as a single
14 Continuum
process
15 Extraordinary Extremely important

Activity
Fill in the blanks with the words given.

Obtains multiple enhanced extraordinary

1. Today’s technology has changed our life and ………………… our living facilities faster.
2. There were a lot of questions with …………………choices in yesterday’s computer exam
in our course.
3. IBM Company is producing ………………………modern and improved computers.
4. The memory of a computer………………….. the data from input devices.

Unit 6 Servers 39
Listening

Activity
Listen to the recording carefully and fill the blanks from the words below:

client commands user advantage follows

How does Usenet NEWS work?


Usenet NEWS works as a client/server system. The ………….. runs a program on their local
computer (or host) known as a Usenet NEWS client. The………….. handles the user interface
and takes…………….. of the capabilities of the local computer. The client translates user
requests into …………..for the Usenet NEWS server, which ……….. nntp (network news
transfer protocol) rules for distributing postings.
Activity
Exchange your papers with your partners. Listen again and try to make corrections on
your partner’s papers.

Before you Read

Scan the first paragraph of this passage and then define the server in your own words.

Server is ..............................................................................................................................
........................................................................................................................................... .
Reading

Servers

The word server can mean one of two things: a program that responds to network
requests from other computers, or the computer on which the server program runs.
When designing a computer, the latter is the appropriate definition. Servers usually have
little or no need for user – oriented features such as large monitor or sound cards. Most
servers make heavy use of their hard disks, however, so large and high performance
are desirable in servers. For the same reason, Small Computer System Interface (SCSI)
disks are preferred to Advanced Technology Attachment (ATA) disks, also known as
Enhanced Integrated Device Electronics (EIDE) disks – SCSI disks tend to perform better,
particularly when multiple disks are present on a single computer. Likewise, servers by
definition rely on the network, and busy servers may need top – notch network cards, and
perhaps special dedicated network connection outside of the computer itself.

Small servers such as those handling a few users in a small office, don’t need
much in the way CPU speed or RAM, but larger servers demand more of these
quantities, especially RAM. Linux automatically buffers disk accesses, meaning that

Unit 6 Servers 40
Linux keeps recent disk accesses in memory, and reads more than it requested from
disk. These practices mean that when subsequent requests come in, Linux can
deliver them from memory, which is faster than going back to the disk to obtain the
data. Thus a server with lots of RAM can often outperform an otherwise similar
server with only a modest amount of RAM.

It is important to realize that server needs fall along a continuum; a very low –
demand Web site might not require a very powerful computer, but a very popular
Web site might need an extraordinary powerful system. Many other types of
servers are also available, including Usenet news servers, database servers, time
servers, and more. News and database servers are particularly likely to require
very large hard disks.

(Smith, Roderick W. (2004) Linux +. SYBEX Inc. 1151 Marina Villiage. )

After you Read

True or False?
Read the sentences and check T or F.

1. SCSI disks are better than EIDE disks for better performance. .................
2. Sound cards and big monitors are two important components of .................
servers.
3. Special dedicated network connections are needed for small servers. .................
4. The speed of RAM can be the same both in small servers and the .................
large ones.
5. Linux has the ability to deliver subsequent requests from memory, .................
and need more data from disk.

Activity
Consider the issues. Work with a partner to answer the questions below.

1. How do the servers use their hard disks?


2. What is SCSI?
3. What is ATA?
4. How does the SCSI differ from ATA?

Grammar - Writing

Suffix –ize (Changing Nouns and Adjective to Verb)


Suffix Noun Verb Adjective Verb
- ize Computer to computerize Legal to legalize
Organ to organize Critic to criticize
Unit 6 Servers 41
Activity
Change the following nouns and adjectives into verbs using the suffix – ize.

Noun Verb Adjective Verb

1. Real .......................... 2. Immoral ..........................


3. Author .......................... 4. Familiar ..........................

Activity
Now, use the 8 above words into proper English sentences.

1. …………………………………………………………………………………………..
2. …………………………………………………………………………………………..
3. ………………………………………………………………………………………….
4. ………………………………………………………………………………………….
5. ………………………………………………………………………………………….
6. ………………………………………………………………………………………….
7. ………………………………………………………………………………………….
8. ………………………………………………………………………………………….

Reading Skill

Skimming
When you skim a reading selection, you read it quickly to learn about its
content and organization. You don’t read every word. Instead your eyes
move very quickly over the selection, trying to find general information (e.g.,
the topic of a reading).

Activity
Read the two questions below. Then, take one minute to skim the reading below for
the answers.

1. What is the topic of the following reading selection?


2. What do you think about the author’s purpose of writing this information about
world Time Server?

Unit 6 Servers 42
Current local time and date in every time zone worldwide!

Are you about to make an International long distance phone call? Are you
planning a trip to a foreign destination? Are you preparing for a web cast or online
meeting? Are you looking for a free clock for your own web site or blog? Just want
to know what time it is?

The Internet can bring you closer to the world, but with time zones and daylight
saving time rules, World Time Server is here to help by providing accurate time
information when you need it!

World Time Server shows current time and date in cities and countries in all
time zones, automatically adjusted for local Daylight Saving Time rules. Convert
times from one location to another or even check current international weather
conditions.

Why use World Time Server?


1. World time server has the right time for more places than just major cities!
Every time zone is represented, but instead of limiting our time data to a select list
of cities, we start with country borders to define our time locations. Where needed,
we add more detail to divide countries into their proper state/province/territory
borders. We even document smaller exceptions as necessary to cover the places
other sites avoid!

2. World time server uses our own self-maintained database with accurate
adjustments for Daylight Saving Time or Summer Time. With no official resource
to get this data (such as the UN), many Fortune 500 companies depend on our
vigilant research and our contacts with governments, embassies, newspapers to
keep up with the ever-changing Daylight Saving Time rules for zones around the
world. You can depend on us, too!

3. World time server has the best world time converter. Pick the one exact place
and exact time your event will occur and we'll give you a link to email or post on
your website. Everyone who follows the link gets to pick their home location to
compare their time directly with yours. No big list of world cities to distract anyone,
no math required. If you aren't sure of the best time to hold your next event or
meeting, try our cool Meeting Planner.

We even have a mobile version of available for your iPhone, Android or other
smaller screen devices so you can still use our site anywhere when the full site
won't do.

(http://www.worldtimeserver.com)

Unit 6 Servers 43
Activity
Now, share your answers with a partner. Was it difficult to answer these questions in a
minute? How can skimming help you become a more effective reader?

Discussion & Writing

Group work: Go around the class and find students who are working as admins in your
faculty or some students who have information about faculty servers. Then ask him/her
some questions.

Example questions:
1. Do you have any information about the servers available in your faculty?
2. What are they for? And what important role do servers play in an academic place?
3. What type of computer servers are available in your faculty?
4. What problems the computer users of your faculty might face if the servers don’t work?
5. .......................................................................................................................................
6. .......................................................................................................................................

Activity
Homework: Based on the listening, reading and discussion sections of this chapter and
something from your own information, write a few informative sentences about servers
and the problems you have in your faculty due to the lack of sufficient servers in your
university.

Unit 6 Servers 44
7 Types of Computer Viruses

Introduction to the Lesson

Discuss the following questions with your classmates:

1. What are the problems that viruses create for computers?


2. How can you protect your computer from viruses?
3. What would you do if your typed and well – prepared homework was corrupted by viruses?

Unit 7 Types of Computer Viruses 45


Vocabulary

Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language.

No. Words English Synonyms / definitions NL Meaning


1 To classify To group, to sort
2 Several Some, few
3 To infect To corrupt
Computer program designed to perform a
4 Application
specific task for a user or other application
program or hardware which simulates an
5 Clone
original product
6 Character Letter or symbol
The extent of something is its length, area, or
7 Extent
size.
8 Typical Standard
9 To execute To perform
10 To reject To refuse, to decline
11 To corrupt To spoiled
12 Goal Aim
13 Structure Building, construction
14 Particular Special
15 Vice versa The opposite
16 Require Demand, need
17 Method Way, procedure
18 Major Main
19 To seek To search
20 Knowledge Wisdom, education
21 Detailed Itemized, containing details
22 Hide Place out of sight
24 To infiltrate Permeate, pass in or through
25 To lengthen To make longer
26 To concentrate To focus, to pay attention
27 To associate To share company, to connect
28 Virtually In essence, almost
29 Regardless of Without thinking about

Unit 7 Types of Computer Viruses 46


30 To leap To jump
31 Further More, in addition
32 Refinement Purification
33 Immediately Right away
34 To detect To discover
35 Existence Living, state of existing

Activity
Fill in the blanks with the following words. You may need to add verb endings or plurals.

Detect method major immediately execute

1. All programs are ………………………… by central processing unit.


2. Some viruses can be ……………… .
3. We need to learn some………………… to photo shop.
4. In order to get rid of viruses, instead of executing, you should……………………..reject them.
5. …………….extents for all programs are EXE, SYS and COM.

Listening

Activity
Dictation: Listen to the recording carefully and write every word you hear. Don’t add
something of your own!
What Are the Functions of Antivirus Software?

Activity
Listen again and correct your mistakes.

Activity
Exchange your books with your partners. Listen again and correct your partner’s
mistakes.

Unit 7 Types of Computer Viruses 47


After you Read

Scanning
Scan the passage and then fill in the blanks.

1. The most common type of ……………. can infect any application ………………… .
2. The goal of a computer virus is to ……………………… by the computer.
3. Viruses can attach themselves to specific ……………….. in order to be hidden.
Reading

Types of Computer Viruses

Computer viruses can be classified into several different types. The first and
most common type is the virus which infects any application program. On IBM
PC’s and clones running under PC-DOS or MS-DOS, most programs and data
which do not belong to the operating system itself are stored as files. Each file has
a file name eight characters long, and an extent which is three characters long.
A typical file might be called “TRUE.TXT”, where “TRUE” is the name and “TXT”
is the extent. The extent normally gives some information about the nature of a
file—in this case “TRUE.TXT” might be a text file. Programs must always have an
extent of “COM”, “EXE”, or “SYS”. Under DOS, only files with these extents can be
executed by the central processing unit. If the user tries to execute any other type
of file, DOS will generate an error and reject the attempt to execute the file.

Since a virus’ goal is to get executed by the computer, it must attach itself to a COM,
EXE or SYS file. If it attaches to any other file, it may corrupt some data, but it won’t
normally get executed, and it won’t reproduce. Since each of these types of executable
files has a different structure, a virus must be designed to attach itself to a particular
type of file. A virus designed to attack COM files cannot attack EXE files, and vice
versa, and neither can attack SYS files. Of course, one could design a virus that would
attack two or even three kinds of files, but it would require a separate reproduction
method for each file type.

The next major type of virus seeks to attach itself to a specific file, rather than
attacking any file of a given type. Thus, we might call it an application-specific
virus. These viruses make use of a detailed knowledge of the files they attack to
hide better than would be possible if they were able to infiltrate just any file. For
example, they might hide in a data area inside the program rather than lengthening
the file. However, in order to do that, the virus must know where the data area is
located in the program, and that differs from program to program.

This second type of virus usually concentrates on the files associated to DOS, like
COMMAND.COM, since they are on virtually every PC in existence. Regardless of
Unit 7 Types of Computer Viruses 48
which file such a virus attacks, though, it must be very, very common, or the virus
will never be able to find another copy of that file to reproduce in, and so it will not
go anywhere. Only with a file like COM- MAND.COM would it be possible to begin
leaping from machine to machine and travel around the world.

The final type of virus is known as a “boot sector virus.” This virus is a further
refinement of the application-specific virus, which attacks a specific location on a
computer’s disk drive, known as the boot sector. The boot sector is the first thing
a computer loads into memory from disk and executes when it is turned on. By
attacking this area of the disk, the virus can gain control of the computer immediately,
every time it is turned on, before any other program can execute. In this way, the virus
can execute before any other program or person can detect its existence.

(Ludwig. Mark A. (1996) The Black Book of Computer Viruses. American Eagle Publication, Inc. Show Low, Arizona (1996).

After you Read

True or False?
Read the sentences and mark (√ ) T or F.
1. If a virus attaches to any file, it may corrupt some data, and it will .................
normally get executed, and it won’t reproduce.
2. A virus must be attached to a COM, EXE or SYS file in order to be .................
executed by the computer.
3. The boot sector virus doesn’t attack a specific location of the boot .................
sector of computer.
4. A virus’ goal is to get executed by the computer. .................

Activity
Consider the information in the reading passage. Work with a partner to answer the
questions below.

1. What extents are important for the computer programs and why?
2. How should a virus be designed in order to be executed by CPU?
3. Is it possible for a virus to travel around the world? If yes, how?

Grammar - Writing

Adjectives Nouns
ness- kind kindness
ity- active activity
ism- ideal idealism

Unit 7 Types of Computer Viruses 49


Affixes
Prefix Root Suffix Example
im Measure - Able immeasurable
im Possible - ity impossibility
re act - ion reaction

Activity
Add the suffixes -ness, -ity and –ism to the following adjectives in order to change them
into nouns.

Adjectives Nouns Adjectives Nouns


Quiet .................. curious ..................
Human .................. sad ..................
Stupid .................. happy ..................
Favorite .................. sleepy ..................
Real .................. prior ..................

Activity
Exchange your papers to your partners and check each other’s mistakes.

Activity
Check the dictionary for correct spelling and using correct suffixes.

Discussion and Writing

Activity
Group work: Go around the class find at least three students who have recently had
trouble with virus in their PCs. Ask them questions from the chart and add three
questions of your own. Then write their answers and their names into the chart.

Questions Answers Students’ names


1. Have you ever lost your
prepared homework file due to
computer viruses?

2. What did you do then?

3. How do you usually protect


your computer from computer
viruses?

Unit 7 Types of Computer Viruses 50


4. What do you think about virus
designers? Why do they program
viruses?

5. .........................................?
6. .........................................?
7. .........................................?

Activity
Homework: Write about the information you noted in the chart given by the students
in activity 1. Then add your own feelings about losing some important data corrupted
by viruses.

Unit 7 Types of Computer Viruses 51


8 Open Source Software

Introduction to the Lesson

Discuss the following questions with your classmates.

1. Do you know what open source is?


2. Who uses open source and how?
3. Why open source is free?

Unit 8 Open Source Software 52


Vocabulary

Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language.

No. Words English Synonyms / definitions NL Meaning


If a word or expression refers to something, it
1. To refer
is used as a name for it
2 To release To make something available
3 License official permission
4 To protect To defend, to save from harm
5 Derivative obtained from another source, derived,
6 Available ready for use
7 Concept idea, thought
8 Restriction limitation
9 Community people living in the same area
10 Dedicated devoted to
11 Collaborative cooperative
12 Evolutionary developmental
13 Commercial pertaining to business
14 Vendor Salesman
15 To inspect To check
16 To explore To travel to unknown regions; to investigate
17 To extent enlarge, lengthen
18 Basic fundamental
19 Provision supply with stock
20 Discrimination partiality, unequal treatment
21 To fiddle Engage in
payment given for regularly scheduled
22 Subscription
performances
24 Premium amount paid for insurance; prize
25 To modify Change, adjust
26 Purpose Goal, aim
27 Recognition identification
28 Collaboration Working together
29 Incremental pertaining to profit
30 Constant Firm, steadfast

Unit 8 Open Source Software 53


31 Evolution Development
32 Blog on-line shared diary, Weblog
Activity
Three of the words in each group are synonyms. Cross out the word that has an
opposite meaning (antonym).

Example: ensure make certain guarantee make uncertain

1. modified changed unchanged adapted


2. certain unspecific definite sure
3. essential unnecessary fundamental needed
4. obtain achieve lose acquire
5. precise exact accurate inaccurate
6. prohibit allow prevent forbid
7. additional extra needed supplemental
8. amazing boring surprising astonishing
9. freedom liberty independence jail

Activity
Based on exercise 1, write the synonyms and antonyms of the given words in the chart below.
No. Words English Synonyms English Antonyms
1 Author
2 Certain
3 Publish
4 Essential
5 Obtain
6 Precise
7 Concept
8 Purpose
9 Amazing
10 Freedom

Listening and Writing

Activity
Listen to the recording twice and then write the summary of what you get about the
given topic by using your own words.

Open Source for IT Professionals

Unit 8 Open Source Software 54


Activity
listen again and check your classmates’ summaries.

Before you Read

Activity
Scan the first and second paragraphs of the reading passage and then mark Yes or No
boxes for the following questions.

1. Is there any source code under a license for open source software?
2. Is the original writer’s right of open source software protected?
3. Is there any difference between commercial software and open source?
Reading

Open Source Software

Open source usually refers to software that is released with source code under
a license that ensures the derivative works will be available as source code,
protects certain rights of the original authors, and prohibits restrictions on how
the software can be used or who can use it. “Answering the question what is open
source?” used to be a lot simpler than it is today. Open source began as, and for the
most part still is, software created by a community of people who are dedicated to
working together in a highly collaborative and evolutionary way.

Open Source vs. Commercial Software


The most important difference between software created by the open source
communities and commercial software sold by vendors is that open source
software is published under licenses that ensure that the source code is available
to everyone to inspect, change, download, and explore as they wish. This is the
essential meaning of open source: the source code--the language in which the
software is written and the key to understanding how the software works--can be
obtained and improved by anyone with the right skills. More precise definitions
extend this basic concept by adding provisions concerning derivative works, the
rights to use the software for any purpose, the rights of the original author, and
prohibitions against discrimination.

How Open Source Software Is Developed


For those new to the idea of open source or unfamiliar with the way software
gets developed, here's how it works most of the time:
• One or more developers--meaning people who have the skills to create
software--get an idea about creating software to solve a problem.
Unit 8 Open Source Software 55
• The developers start writing code to create a solution. This is frequently called
"scratching an itch."
• The developers put this code where other developers can find out about it,
download it, and play with it. There are many locations, such as SourceForge.com,
where people post their projects.
• Usually the source code is published under one of several popular open source
licenses that ensure that the source code and any derivative works remain open
source.
• Through an informal process of sharing ideas, fiddling with each others'
code, and trial and error, the software gets better and better, sometimes changing
direction to solve new problems as new people discover the software.
• At some point, the software gets finished or doesn't. It becomes popular, stays
obscure, or fades away. Programs like Linux and Apache have had thousands of
contributors. Other projects have been created by one or two people.
• As time goes on, developers come and go, and projects become active or
dormant.

A huge amount of amazing software has been created through this loose process.
While much of open source development has focused on creating tools for software
developers, an increasing amount of effort is being put into creating programs to solve
less technical problems like publishing blogs or keeping track of skydiving activity.

Users of software
For users of software who have the skills to download and install software,
open source means choice and freedom. The choice comes from the huge amount
of programs available. Some programs like Firefox (the smoking-hot browser from
Mozilla.org) or OpenOffice.org (a suite of word processing, spreadsheet, and related
programs) can be downloaded and used by just about anybody. Other open source
projects such as Babeldoc or Axkit are mostly useful for software developers. None
of this open source software costs money. Some programs charge subscriptions for
support, updates, documentation, or premium versions, but most of those are usable
without paying a fee. The freedom comes from the fact that the source code is available.
If you want to change something, then you can, if you have the right skills. Only a
handful of the people who download and use open source ever actually change it. Most
use it as intended, but they have the freedom to modify it if they want.

Developers and Engineers


For developers and engineers, open source has many additional meanings. To
those who found a successful project, open source can mean fame, recognition, and
sometimes even money from consulting or other sources. Other developers see in
open source a masterful software development methodology founded on the virtues
of collaboration, incremental evolution, and working code. For most developers, open
source is a both a source of tools to help solve problems and a constant source of
exciting new things to learn.
(Woods. Don, Gautam Guliani. (2005) Open Source for the Enterpise, O’Reilly Media July (2005). Web.
Unit 8 Open Source Software 56
Post Reading Exercises

True or False?
Read the sentences and mark T or F.
1. Source code and the legal license are two important factors for open .................
source software.
2. There is no difference between software created by open source and .................
commercial software.
3. Open source software can be used for any purposes. .................
4. After creating software to solve a problem, the developers start to .................
write a code to create a solution.

Activity
For each item below, circle the best answer.

1. Open source is releases with …………………………………………


a. Password
b. Source code
c. license

2. An open source license ………………………………………………


a. ensures the availability of the derivative works as source code:
b. Protects certain rights of the original authors.
c. a & b

3. The open source began to be created by ………………………………………


a. A group of men
b. A group of women
c. A group of people

7. The developers put the open source code where other people …………………
a. Cannot find about it
b. Can download it
c. Can buy it

8. For developers and engineers who found a successful project, open source
means…………………………
a. fame,
b. recognition and money
c. a &b

Unit 8 Open Source Software 57


Reading Skill

Topic and Main Idea


A topic is the subject or general idea of a piece of writing. To identify the topic of a
reading, ask: What is the reading about?

A main idea is the writer’s message about the topic. Typically writers organize their
writing around one or two main idea. To identify the main idea of a reading, ask:
What is the most important thing(s) the writer says about the topic?

Example from chapter 1


Topic:
What Is a Computer and how does it Work?
Main ideas:
1. A computer makes mathematical calculations and logical comparisons quickly
without any mistakes.
2. Computers can store information in both permanent and temporary storage.

Activity
Reread reading passage of Chapter 7. Then write the topic and the main idea(s) of the passage.
Topic: ...................................
Main idea(s):

Activity
Write the main idea of the Topic “Users of Software” from this unit.
Topic: Users of Software
Main idea:

Grammar - Writing
Prefixes: un-, im-, in-, ir-
You can change the meaning of many adjectives by adding a prefix that
means not: un-, im-, in-, ir-. Ex: portable means not producing a profit or not
portable
Prefix Roots (adjectives) Example
un profitable unprofitable
im mobile immobile
in complete incomplete
ir replaceable irreplaceable
Unit 8 Open Source Software 58
Activity
Add prefixes from the chart to the following adjective in order to change their
meanings from positive to negative.

Regular ...................
convenient ...................
possible ...................
Comfortable ...................
healthy ................... permanent ...................
Responsible ...................
active ...................
dependent ...................
Experienced ...................
successful ...................
important ...................

Activity
Exchange your papers with your classmates. Check them and then check the dictionary
to be sure about your corrections.

Discussion & Writing

Activity
Add three questions about open source of your own to the following questions then
discuss them with your partners.

1. Have you ever used open source software?


2. What are the advantages and disadvantages of open source?
3. How do you get the software that you need?
4. Are you interested to program any software in future?
5. ................................................................................................?
6. ................................................................................................?
7. ................................................................................................?
Activity
Homework: Based on the information you exchanged with your classmates,
write the advantages and disadvantages of open source software in a few
sentences.

The process of Developing Open Source Software

Unit 8 Open Source Software 59


Peer-to-Peer Network versus
9 Server-based Networks

Introduction to the Lesson

Discuss the following questions with your classmates.

1. Do you access Internet at university or home?


2. What are different ways that one can access to the internet?
3. Do you know what a server is and what its function is?
4. Which type of network is more extended: peer- to peer network or server – based?

Unit 9 Peer-to-Peer Network versus Server-based Networks 60


Vocabulary

Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language:
No. Words English Synonyms / definitions NL Meaning
To give a lot of time and effort to it because you
1 Dedicate
think it is important.
If you share something with another person,
2 To share
you both use it or have some of it.
3 To consider To think about
4 To participate To take part in
5 Client Customer
6 Satisfy Gratify
7 Account Formal business agreement
8 Firm Company
9 Employee Worker
11 Capability Ability
12 Advantage Benefit
13 To centralize Centered
14 Concurrent Parallel
15 Eventually Finally
16 To implement Execute
17 To onfigure To assemble a computer system
Management, Administration is the range of
activities connected with the organization
18 Administration
or supervision of a company, institution, or
country.
19 Throughout All over
20 To lead To direct
21 Complicate to make it more difficult to understand or deal with.
22 Apparent obvious
Permit, If you give someone permission to do
24 Permission something, you say that they are allowed to do
it.
25 Application Request
25 To cooperate To work together
27 Numerous Consisting of a great number
Unit 9 Peer-to-Peer Network versus Server-based Networks 61
Activity
Use the following words in proper sentences.

apparent application capability client configure

1. …………………………………………………………………………………………....................................... .
2. …………………………………………………………………………………………....................................... .
3. …………………………………………………………………………………………....................................... .
4. …………………………………………………………………………………………....................................... .
5. …………………………………………………………………………………………....................................... .
Listening

Activity
Listen to the people talking about Internet, Intranet and Extranet. Try to fill in the
blanks using given words.

external information company world extranet internet – type

1. If you wish to expose …………….. to everyone in the …………., then you would build an
Internet-type application.
2. An application is considered to be on the company’s intranet if it is using ………………
protocols such as HTTP or FTP but the application is available only within the ………....... .
3. An ……………..cannot be used by anyone else …………. to the company except for those
selected individuals.
Activity
Listen again and mark Yes or No boxes. Yes / No
 
1. Is it possible to transfer funds to the bank without going there?
2. Is the information on a company’s intranet accessible to persons on the Internet?  
3. Can you create an extranet by extending your intranet?  
Activity
Exchange your books with your partners. Listen again and try to make correction on
your partner’s answers.
Before you Read
Scanning
Scan the reading passage and then fill in the blanks.
1. A peer – to – peer network needs a ………………………… in order to share information.
2. A server- based network needs …………………………….. in the purpose of sharing information.
3. One difference between peer-to-peer network and server based network is ……………
………………………………………………......................................................................................... .
4. Another difference is………………………………………………………………………........................... .
Unit 9 Peer-to-Peer Network versus Server-based Networks 62
Reading

Peer-to-Peer Network versus Server-based Networks

Peer-to-Peer Network
A peer-to-peer network has no dedicated servers; instead, a number of
workstations are connected together for the purpose of sharing information or
devices. When there is no dedicated server, all workstations are considered equal;
any one of them can participate as the client or the server. Peer-to-peer networks are
designed to satisfy the networking needs of home networks or of small companies
that do not want to spend a lot of money on a dedicated server but still want to
have the capability to share information or devices. For example, a small accounting
firm with three employees that needs to access customer data from any of the three
systems or print to one printer from any of the three systems may not want to spend
a lot of money on a dedicated server. A small peer-to-peer network will allow these
three computers to share the printer and the customer information with one another.

Most of the modern operating systems such as Windows XP and Windows Vista
already have built-in peer-to-peer networking capabilities, which is why building a
peer-to-peer network would be a “cheap” network solution. The disadvantage of a
peer-to-peer network is the lack of centralized administration—with peer-to-peer
networks, you need to build user accounts and configure security on each system.

It is important to note that peer-to-peer networks are designed for fewer than
10 systems, and with Microsoft client operating systems such as Windows XP
Professional, only 10 concurrent network connections to those clients are allowed.
This means that if you have 15 or 20 employees, you eventually will need to
implement a server-based network.

Server-Based Networks
A big disadvantage of peer-to-peer networking is that you can’t do your day-to-
day administration in a single place. With peer-to-peer networking, user accounts
typically are created on all the systems, and data files are stored throughout all the
systems. This leads to a more complicated environment and makes your job harder as
a network administrator. Usually after four or five systems have been networked, the
need for a dedicated server to store all of the user accounts and data files becomes
apparent—this is a server-based network. The advantage of a server-based network
is that the data files that will be used by all of the users are stored on one server. This
will help you by giving you a central point to set up permissions on the data files, and
it will give you a central point from which to back up all of the data in case data loss
should occur. With a server-based network, the network server stores a list of users
who may use network resources and usually holds the resources as well.

Unit 9 Peer-to-Peer Network versus Server-based Networks 63


The server in a server-based network may provide a number of different services.
The services it will offer to the network usually are decided by the server’s role. There
are a number of different roles that a server could play on a network such as: file and
print servers, application servers, web servers, directory servers. File and print servers
control and share printers and files among clients on the network. They also check the
access control list (ACL) of each resource before allowing a user to access a file or use
a printer. Application servers are servers that run some form of special program on
the server, company’s e-mail server for example. Web servers are servers that run the
Hypertext Transfer Protocol (HTTP) and are designed to publish information on the
Internet or the corporate intranet. Examples of web server software are Microsoft’s
Internet Information Services that runs on Windows or Apache web server software
that runs on UNIX/Linux, Novell NetWare, and Windows. Directory servers hold a list
of the user accounts that are allowed to log on to the network. This list of user accounts
is stored in a database (known as the directory database) and can store information
about these user accounts such as address, city, phone number, and fax number.

It is important to note that a server can have numerous roles at the same time. A
server can be a file and print server, as well as an application server, or it can be file,
print, and directory server all at the same time. Because a single server can perform
multiple roles, a company will not need to purchase an additional server every time
a new product (or feature) is implemented on the network, and this fact reduces the
cost of a server-based network.

(Clarke. Glen E., (2009) Comp TIA Network + : Mc Graw- Hill Companies, United States)

After you Read

True or False?
Read the sentences and mark T or F.
1. A group of servers are needed for a peer- to- peer network in order .................
to share information and devices.
2. A server –based network will allow some computers to share the .................
printer and the customer information with one another.
3. Peer-to-peer networks are designed to satisfy the home and small .................
companies’ networking needs.
4. The data files that will be used by all of the users stored on all .................
systems in a
server – based networks.
5. Building a peer-to-peer network wouldn’t be a “cheap” network .................
solution.
6. A single server can perform multiple roles. .................
7. Web servers run some form of special program on the server. .................

Unit 9 Peer-to-Peer Network versus Server-based Networks 64


Activity
Based on the information in the text, work with your partner to answer the following
questions.

1. How useful is peer-to-peer network for small companies?


2. How many systems can be connected to each other by peer- to-peer network?
3. What is the advantage of a server – based network?
Noun Verb Adjective Adverb
complication Complicating/
complicated
Dedicate
informative
Considerably
Access
Satisfy
Added
design
Importantly
Participate
Application

Grammar - Writing

Some Parts of Speech (Word Forms)


Most words have four forms (noun, verb, adjective, and adverb), but not all of
them. To improve your vocabulary, it is good to learn different forms of a word.

Noun Verb Adjective Adverb


Administration
Administrate
Administrator/ Administrative Administratively
Administer
Administer
Operation
Operate Operative Operatively
Operator
Permission Permit Permissive Permissively
Account, accounting Account Accountable accountably
Employment,
Employee, Employ Employable
Employer

Unit 9 Peer-to-Peer Network versus Server-based Networks 65


Activity
Write missing forms of given words into the chart below. Then check them by looking
in a dictionary. Remember that all words don’t have four forms!

Activity
Choose the correct form of the word in parentheses to complete each sentence.

1. The Internet is an ………..….. (informative, information, informatively) resource for


scholars.
2. Would you like to be a ……………(participation, participant, participating) in computer
competition on July 23, 20013?
3. Do you ………………(access, accusable, accessibility) to the Internet in order to send you
today’s lectures by mail?
4. You had better write about the ………………..(important, importance, importantly) of
computers in today’s life.
5. I don’t know how to ………………(addition, add, adding) more languages to my computer.

Discussion & Writing

Pair work: Add four more questions about the passage to the following questions then
discuss them with your partners.

1. What roles do the workstations play in peer-to-peer networks?


2. How does peer-to-peer network differs from server-based network?
3. What is the function of file and print server?
4. .......................................................................................................................................
5. .......................................................................................................................................
6. .......................................................................................................................................
7. .......................................................................................................................................

Example:
Student A: What roles do the workstations play in peer –to-peer network?
Student B: the workstations….

Writing

Paragraph Writing
What are the elements of a paragraph?
1. A paragraph has a topic sentence that states the main idea.
2. All of the sentences (supporting sentences) in a paragraph are about one topic.
3. The last sentence, or concluding sentence, brings the paragraph to a logical
conclusion.

Unit 9 Peer-to-Peer Network versus Server-based Networks 66


Example:
A modem is a device that connects your computer to the telephone system for having
Internet connections. A modem converts digital data on your computer into analog
signals that can be sent over a telephone line. It also converts the analog signals that it
receives into digital data…
General topic: Introducing Modem
Topic Sentence: A modem is a device that connects your computer to the telephone system.

Activity
Reread the first paragraph of this chapter reading passage. Then write its topic
sentence.

Activity
Reread the second and third paragraphs of the chapter one reading passage. Then
write their topic sentences
Second paragraph of chapter one topic sentence:

Third paragraph of chapter one topic sentence:

Activity
Homework. Write a topic sentence for the topic “The Function of Keyboard”.

Unit 9 Peer-to-Peer Network versus Server-based Networks 67


10 What is Programming?

Introduction to the Lesson

Discuss the following questions with your classmates.

1. Do you know what the native language of your computer is?


2. What is the difference between a program and a computer program?

Unit 10 What is Programming? 68


Vocabulary

Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language.

No. Words English Synonyms / definitions NL Meaning


Intuitive ideas or feelings tell you that something
1. Intuitive is the case although you have no evidence or
proof.
2 Concept idea, thought
A series of things or events is a number of them
3 Series
that come one after the other.
Instructions that tell you what to do or how to
5 Direction
get to a place.
A list of ingredients and a set of instructions
6 Recipe
telling you how to cook something.
7 Granted admittedly
Eloquent people express themselves well in
8 Eloquent
speech or writing.
9 Arcane Secret, hidden
11 Architecture Design of a computer and its components
12 To figure out To determine, decide
13 Associated connected; united
14 To interact To act on each other
Someone who is painstaking does things
15 Painstaking
extremely thoroughly.
Something that is large and heavy and therefore
16 Cumbersome
Difficult to carry, wear, or handle.
17 Myriad composed of a countless number of items
If you translate something that someone has said or
18 To translate
written, you say it or write it in a different language.
19 Cryptic Secret, hidden
20 Esoteric Confidential
21 In addition Also
22 Effective Efficient
24 Mitigate lessen the impact or intensity of
25 To convert To change
26 value numerical quantity
Unit 10 What is Programming? 69
Activity
Complete each sentence with a word from the box.

converts instructions concept mitigate effective

1. You need a set of ………………………… while configuring a program in your pc.


2. Installing antivirus software is an ………………….. job for security of your computer.
3. A video card ……………… the digital signals in a computer to a special format that can
be displayed on a monitor.
4. A compiler can ………………….. the computer’s program translation problems.
5. Programming is counted as a very natural and intuitive………………….. .

Listening

Activity
Dictation: Listen to the recording carefully and write every word you hear. Don’t add
something of your own!

C++

Activity
Exchange your books with your partners. Listen again and try to make corrections on
your partner’s answers.

Before you Read

Scanning
Scan the passage and then name some computer programming languages you found in
the reading.

Example:
1. Assembly language
2. ……………………
3. ……………………
4. …………………...
5. …………………...
Unit 10 What is Programming? 70
Reading

What Is Programming?

Programming is a very natural and intuitive concept. A program is nothing more


than a series of statements written in a specific language. Programs are everywhere
and even the technophobes of the world use programs every day. Driving directions,
cooking recipes, football plays, and DNA are all types of programs. A typical program for
driving directions might look something like this:

Start out down Main Street headed east. Continue on Main Street until you see a
drugstore on your right. If the street is blocked because of construction, turn right there
at 15th Street, turn left on Pine Street, and then turn right on 16th Street. Otherwise,
you can just continue and make a right on 16th Street. Continue on 16th Street, and
turn left onto Destination Road. Drive straight down Destination Road for 5 miles, and
then you'll see the house on the right. The address is 743 Destination Road.

Anyone who knows English can understand and follow these driving directions,
since they’re written in English. Granted, they’re not eloquent, but each instruction is
clear and easy to understand, at least for someone who reads English.

But a computer doesn’t natively understand English; it only understands machine


language. To instruct a computer to do something, the instructions must be written
in its language. However, machine language is arcane and difficult to work with—it
consists of raw bits and bytes, and it differs from architecture to architecture. To write
a program in machine language for an Intel x86 processor, you would have to figure
out the value associated with each instruction, how each instruction interacts, and
myriad low-level details. Programming like this is painstaking and cumbersome, and it
is certainly not intuitive.

What’s needed to overcome the complication of writing machine language is a


translator. An assembler is one form of machine-language translator—it is a program
that translates assembly language into machine-readable code. Assembly language is
less cryptic than machine language, since it uses names for the different instructions
and variables, instead of just using numbers. However, assembly language is still far
from intuitive. The instruction names are very esoteric, and the language is architecture
specific. Just as machine language for Intel x86 processors is different from machine
language for Sparc processors, x86 assembly language is different from Sparc assembly
language. Any program written using assembly language for one processor’s architecture
will not work on another processor’s architecture. If a program is written in x86 assembly
language, it must be rewritten to run on Sparc architecture. In addition, in order to write
an effective program in assembly language, you must still know many low-level details of
the processor architecture you are writing for.

Unit 10 What is Programming? 71


These problems can be mitigated by yet another form of translator called a
compiler. A compiler converts a high-level language into machine language. High-level
languages are much more intuitive than assembly language and can be converted into
many different types of machine language for different processor architectures. This
means that if a program is written in a high-level language, the program only needs
to be written once; the same piece of program code can be compiled into machine
language for various specific architectures. C, C++, and Fortran are all examples of
high-level languages.

A program written in a high-level language is much more readable and English-


like than assembly language or machine language, but it still must follow very strict
rules about how the instructions are worded, or the compiler won’t be able to
understand it.

(Erickson. Jon. (2008). Hacking: The Art of Exploitation. USA.)

After you Read

True or False?
Read the sentences and mark T or F.
1. A computer knows natively machine language as well as English language. .................
2. Machine language consists of raw bits and bytes and is similar to all .................
architectures.
3. A translator help decrease the problems related to writing machine .................
language.
4. Assembly language is different from English language. .................

Activity
For each item below, circle the best answer.

1. A program is a series of statements written in……………………….language.


a. English
b. any
c. specific
d. b & c

2. The native language of a computer is ………………… language.


a. English
b. machine
c. Spanish
d. all above

Unit 10 What is Programming? 72


3. All the followings are the examples of high – level languages of computer
programming except …………… .
a. C
b. C++
c. Assembly
d. Fortran

Grammar - Writing
Infinitive with” to” : used as Subject and Object
The “to infinitive” can be used as subject and object in sentences. To instruct, to
teach, to program, etc. are all infinitives with to.

1. As subject: To write a computer program, you must follow some instructions.


2. As object: You must follow some instructions in order to write a computer program.

Activity
Use the following infinitives as subject in proper sentences:

to direct to interact to support

1. …………………………………………………………………………………………….......................................
2. …………………………………………………………………………………………….......................................
3. …………………………………………………………………………………………….......................................

Activity
Use the following infinitives as object in proper sentences:

to mitigate to program to decrease

1. …………………………………………………………………………………………….......................................
2. …………………………………………………………………………………………….......................................
3. …………………………………………………………………………………………….......................................

Activity
Reread the passage and find examples of the infinitives used as subjects and objects.

As subject:
1. …………………………………………………………………………………………….......................................
2. …………………………………………………………………………………………….......................................

As object:
1. …………………………………………………………………………………………….......................................
2. …………………………………………………………………………………………….......................................
Unit 10 What is Programming? 73
Discussion & Writing

Group work: Go around the class and find a person who wants to be a computer
programmer in future. Then ask him/her some questions.

Example:
Student A: Do you want to be a computer programmer in future?
Student B: Yeah, it is my interest.
Student A: so, what are the most important things that you should first acquire about
programming?
Student B: Actually, the first important thing is…

Writing

Supporting sentences:
Supporting sentences are facts and details related to the topic that support the
topic sentence or main idea of a paragraph.

Example:
A modem is a device that connects your computer to the telephone system for having
Internet connections. A modem converts digital data on your computer into analog
signals that can be sent over a telephone line. It also converts the analog signals that it
receives into digital data. If you want to connect to the Internet using a telephone line,
you will need a modem.

General topic: Introducing Modem


Topic Sentence: A modem is a device that connects your computer to the telephone
system for having Internet connections.
Supporting sentences:
1. A modem converts digital data on your computer into analog signals that can be sent
over a telephone line.
2. It also converts the analog signals that it receives into digital data.
Activity
Reread the first paragraph of this chapter reading passage. Then write its topic
sentence and supporting sentences.

Topic sentence: ................................................................................................................


Supporting Sentences: ......................................................................................................

1. ................................................................................................................
2. ................................................................................................................
3. ................................................................................................................
Unit 10 What is Programming? 74
Activity
Reread the first paragraph of the chapter 4 reading passage. Then write its topic
sentence and supporting sentences.

Topic sentence: ................................................................................................................


Supporting sentences: .....................................................................................................

1. ................................................................................................................
2. ................................................................................................................
3. ................................................................................................................

Activity
Homework: Write supporting sentences for the topic “The Function of Keyboard” that
you had already done in previous homework.

Unit 10 What is Programming? 75


11 What Operating Systems Do

Introduction to the Lesson

Discuss the following questions with your classmates:

1. Do you know what an operating system is?


2. What is its function?
3. What important role does it play for your personal computers?

Unit 11 What Operating Systems Do 76


Vocabulary

Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language.
No. Words English Synonyms / definitions NL Meaning
The central and most important part of something,
1 Basis
from which it can be further developed.
An intermediary is a person who passes messages
2 Intermediary
between two people or groups.
3 Amazing Surprising
An aspect of something is one of the parts of its
4 Aspect
character or nature
Something that is varied consists of things of
5 Varied
different types, sizes, or qualities.
To To complete, finish; perform, execute
6
accomplish
7 Task A piece of work that must be done.
8 Primarily Principally, mainly
9 To optimize To produce maximum results; improve efficiency
11 Utilization Putting to practical use
Complex things have many different parts and are
12 Complex
hard to understand
The interface between two subjects or systems is
13 Interface the area in which they affect each other or have
links with each other.
14 Roughly Approximately
The resources of a country, organization, system or
15 Resource
person are the things they have and can use.
The organization and methods involved in
16 Government
governing a country or state.
To monopolize something means to control it
17 Monopolize completely and prevent other people having a
share in it.
To make something as great in amount or
18 To maximize
importance as you can.
19 Assure To be sure
If you have something at your disposal, you can
20 Disposal
use it at any time.

Unit 11 What Operating Systems Do 77


21 Intimately Privately, secretly
If something is allocated to a particular person or
22 Allocate for a particular purpose, it is given to that person
or used for that purpose.
A person who uses something for a particular
23 Allocator
purpose.
If people or things are numerous, there are a lot of
24 Numerous
them.
25 Conflicting Difference between some thing
26 Emphasize showing the importance of something
Activity
Write proper sentences using the following words

Allocate utilization interface optimize accomplish

1. …………………………………………………………………………….....................................................…
2. …………………………………………………………………………….....................................................…
3. …………………………………………………………………………….....................................................…
4. …………………………………………………………………………….....................................................…
5. …………………………………………………………………………….....................................................…
Listening

Activity
Dictation: Listen to the recording carefully and write every word you hear. Don’t add
something of your own!

UNIX

Activity
Exchange your books with your partners. Listen again and try to make corrections on
your partner’s answers.
Unit 11 What Operating Systems Do 78
Before you Read

Scanning
Scan the first paragraph of the reading passage and then complete the information
below.

Operating system….
• manages the computer hardware,
• provides …………………………………………………………………..
• acts ………………………………………………………………………....

A computer system can be divided into four parts:


1. ………………………..
2. ………………………..
3. ………………………..
4. ………………………..
5. ………………………..
Reading

What Operating Systems Do

An operating system is a program that manages the computer hardware. It also provides
a basis for application programs and acts as an intermediary between the computer user
and the computer hardware. An amazing aspect of operating systems is how varied they
are in accomplishing these tasks. Mainframe operating systems are designed primarily
to optimize utilization of hardware. Personal computer (PC) operating systems support
complex games, business applications, and everything in between. Operating systems for
handheld computers are designed to provide an environment in which a user can easily
interface with the computer to execute programs. Thus, some operating systems are
designed to be convenient, others to be efficient, and others some combination of the two. A
computer system can be divided roughly into four components: the hardware, the operating
system, the application programs, and the users.

The hardware—the central processing unit (CPU), the memory, and the input/
output (I/O) devices—provides the basic computing resources for the system. The
application programs—such as word processors, spreadsheets, compilers, and
web browsers—define the ways in which these resources are used to solve users'
computing problems. The operating system controls and coordinates the use of the
hardware among the various application programs for the various users.

We can also view a computer system as consisting of hardware, software, and


data. The operating system provides the means for proper use of these resources
in the operation of the computer system. An operating system is similar to a
Unit 11 What Operating Systems Do 79
government. Like a government, it performs no useful function by itself. It simply
provides an environment within which other programs can do useful work. To
understand more fully the operating system's role, we next explore operating
systems from two viewpoints: that of the user and that of the system.

1. User View
The user's view of the computer varies according to the interface being used. Most
computer users sit in front of a PC, consisting of a monitor, keyboard, mouse, and system
unit. Such a system is designed for one user to monopolize its resources. The goal is
to maximize the work (or play) that the user is performing. In this case, the operating
system is designed mostly for ease of use, with some attention paid to performance
and none paid to resource utilization—how various hardware and software resources
are shared. Performance is, of course, important to the user; but rather than resource
utilization, such systems are optimized for the single-user experience.

In other cases, a user sits at a terminal connected to a mainframe or


minicomputer. Other users are accessing the same computer through other
terminals. These users share resources and may exchange information. The
operating system in such cases is designed to maximize resource utilization—to
assure that all available CPU time, memory, and I/O are used efficiently and that no
individual user takes more than her fair share.

In still other cases, users sit at workstations connected to networks of other


workstations and servers. These users have dedicated resources at their disposal,
but they also share resources such as networking and servers—file, compute,
and print servers. Therefore, their operating system is designed to compromise
between individual usability and resource utilization. Recently, many varieties of
handheld computers have come into fashion. Most of these devices are standalone
units for individual users. Some are connected to networks, either directly by wire
or (more often) through wireless modems and networking. Because of power,
speed, and interface limitations, they perform relatively few remote operations.
Their operating systems are designed mostly for individual usability, but
performance per amount of battery life is important as well.

2. System View
From the computer's point of view, the operating system is the program most
intimately involved with the hardware. In this context, we can view an operating
system as a resource allocator. A computer system has many resources that may be
required to solve a problem: CPU time, memory space, file-storage space, I/O devices,
and so on. The operating system acts as the manager of these resources. Facing
numerous and possibly conflicting requests for resources, the operating system must
decide how to allocate them to specific programs and users so that it can operate
the computer system efficiently and fairly. As we have seen, resource allocation is
especially important where many users access the same mainframe or minicomputer.
Unit 11 What Operating Systems Do 80
A slightly different view of an operating system emphasizes the need to control
the various I/O devices and user programs. An operating system is a control
program. A control program manages the execution of user programs to prevent
errors and improper use of the computer. It is especially concerned with the
operation and control of I/O devices.
(Silber. Schatz, Peter Bare Galvin and Greg Galvin and Greg Gagne. (2005) Operating System Concept. USA. John Wiley and sons, Inc.)

After you Read

True or False?
Read the sentences and mark T or F. Operating system acts as an intermediary.

1. between the computer software and hardware. .................


2. The operating system provides the means for proper use of .................
hardware, software, and data in the operation of the computer system.
3. Unlike a government, operating system performs no useful function by itself, .................
but provides an environment within which other programs can do useful work.
4. Operating system controls the operation of I/O devices. .................

Activity
Consider the information in the reading passage. Work with a partner to answer the
questions below.

1. How operating systems differently do some certain tasks for personal, handheld and
mainframe computers?
2. What services operating system provide for computer users?
3. What does operating system do as resource allocator?
4. When an operating system is called as a control program?
5. Is it possible for computer hardware to work without designing an operating system?

Grammar - Writing

Suffixes (Changing verbs to nouns)


Suffixes Verbs Nouns Suffixes Verbs Nouns
al- To arrive The arrival ance- To refer The reference
ence- To accept The acceptance
ure- To depart The departure ation- To inform The information
y- To arm The army sion- To decide The decision
ment- To agree The er- To teach The teacher
agreement or- To direct The director

Unit 11 What Operating Systems Do 81


Activity
Change the following verbs to nouns by adding given suffixes.

-al -ure -y -ment -ance -ence -ation -sion -er -or

Verbs Nouns
1. To allocate The .......................................
2. To govern The .......................................
3. To combine The .......................................
4. To divide The .......................................
5. To manage The .......................................
6. To perform The .......................................
7. To deliver The .......................................
8. To fail The .......................................
9. To deny The .......................................
10. To attend The .......................................
Activity
Exchange your books with your classmates’ papers and then try to make corrections on
them. See a dictionary to be sure about mistakes.

Discussion & Writing

Role play: Suppose you are a computer system and your partner is an operating system.
Now, what are your expectations from operating system to do for you? Ask him/
her about your expectations and possible new services from him/her. Then list new
services done by operating systems in future and read them aloud in the class.

Writing

Paragraph (Concluding sentence):


The concluding sentence of a paragraph is the restatement of the topic sentence.
There is no new idea which doesn’t exist in the whole paragraph!

Example:
A modem is a device that connects your computer to the telephone system for having
Internet connections. A modem converts digital data on your computer into analog
signals that can be sent over a telephone line. It also converts the analog signals that it
receives into digital data. If you want to connect to the Internet using a telephone line,
you will need a modem.

General topic: Introducing Modem


Topic Sentence: A modem is a device that connects your computer to the telephone
system for having Internet connections.
Unit 11 What Operating Systems Do 82
Supporting sentences:
1. A modem converts digital data on your computer into analog signals that can be sent
over a telephone line.
2. It also converts the analog signals that it receives into digital data.

Concluding Sentence(s): If you want to connect to the Internet using a telephone line,
you will need a modem.

Activity
Read the following paragraph. Then write a general topic and a good concluding
sentence for it.

Computers are excellent machines to help students. Before computers, students had
to do their school work on typewriters. Typewrites did not allow students to make
major changes easily, so they had to use special correction fluid to fix mistakes. Today
computers let students move information around without retyping it and correct errors
with little effort.

Activity
Conclude the paragraph about (The Function of Keyboard) that you have written as previous
homework with a proper and relevant concluding sentence.

Activity
Homework: Write a paragraph about the following topic.

The importance of Operating System

Unit 11 What Operating Systems Do 83


12 What is a Database?

Introduction to the Lesson

Discuss the following questions with your classmates.

1. How do you store your data in your computer?


2. Have you ever used database software?
3. How data and databases are related to each other?

Unit 12 What is a Database? 84


Vocabulary

Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language.
No. Words English Synonyms / definitions NL Meaning
1 Critical Important, crucial
Something that is considered to be useful or
2 Asset
helpful to a person or group
3 Practically functionally, usefully
4 Robust Strong
5 Available Ready for use
Something that is present or noticed throughout
6 Pervasive
a place or thing.
7 Presence State of being
8 Location Place, site
9 Advent Coming, arrival
11 Repository Plentiful source
Something or someone that is efficient does a job
12 Efficient
well and successfully, without wasting time or energy.
13 Maintenance Act of maintaining, repairs
14 Tabular Arranged in rows and columns
15 Interchangeably In an interchangeable manner
16 Corresponding One thing is similar or related to another
17 To update To bring up to date, modernize
18 Inconsistent Incompatible, contradictory
19 Inadvertently Mistakenly, unintentionally
The interface between two subjects or systems
20 Interface is the area in which they affect each other or
have links with each other.
Copying of data in order for retrieval in the
21 Backup
event of a malfunction
22 To restore To return to a previous condition
The recovery of something that was lost or
24 Recovery
stolen is the fact of getting it back
25 Backbone Physical infrastructure of the Internet
26 Breadth Width; broadness
27 Essentially Basically, mainly

Unit 12 What is a Database? 85


Activity
Match the definitions from column B with the words in column A.

A # B
1. Consumer g
......... a. A large, round object in space that moves around a
2. Commerce ......... star
3. Planet ......... b. People or things that can be trusted to work well or
4. Requirements ......... to behave in the way that you want them to.
5. Reliable ......... c. Having many dimensions, of many measurements
6. Domain ......... d. The activity of buying and selling things on a large
7. Multidimensional ......... scale.
8. Hierarchical ......... e. Arranged according to rank
9. Retrieve ......... f. Something that you must have or do in order to do
10. Commerce ......... what you want
g. A person who buys goods or uses services
h. To get something back
i. The activity of buying and selling things on a large
scale
j. Division of the Internet according to country and
type of organization

Listening

Activity
Listen to the people talking about Data Architect. Try to fill in the blanks using the given
words.

data Modeler Existing enterprise architecture databases

Data Architect
A data architect is responsible for designing an ………………. that supports the
organization's ……………….. and future needs for data management. The architecture
should cover……….., data integration and the means to get to the …….. . Usually the data
architect achieves his goals by setting ………………..data standards. A Data Architect is
also referred to as a Data ………... This is in spite of the fact that the role involves much
more than just creating data models.

Activity
Exchange your books with your partners. Listen again and try to make correction on
your partner’s answers.

Unit 12 What is a Database? 86


Before you Read

Scanning
Scan the passage and then answer the following questions:

1. What is database?
2. Why is a database software needed?
3. What is database management system?

Reading

What is a Database?
Data is one of the most critical assets of any business. It is used and collected
practically everywhere, from businesses trying to determine consumer patterns
based on credit card usage, to space agencies trying to collect data from other
planets. Data, as important as it is, needs robust, secure, and highly available
software that can store and process it quickly. The answer to these requirements is
a solid and a reliable database. Database software usage is pervasive, yet it is taken
for granted by the billions of daily users worldwide. Its presence is everywhere-
from retrieving money through an automatic teller machine to badging access at a
secure office location.

Since its advent, databases have been among the most researched knowledge
domains in computer science. A database is a repository of data, designed to support
efficient data storage, retrieval and maintenance. Multiple types of databases exist
to suit various industry requirements. A database may be specialized to store binary
files, documents, images, videos, relational data, multidimensional data, transactional
data, analytic data, or geographic data to name a few.

Data can be stored in various forms, namely tabular, hierarchical and graphical forms.
If data is stored in a tabular form then it is called a relational database. When data is
organized in a tree structure form, it is called a hierarchical database. Data stored as
graphs representing relationships between objects is referred to as a network database.

What is a database management system?


While a database is a repository of data, a database management system, or
simply DBMS, is a set of software tools that control access, organize, store, manage,
retrieve and maintain data in a database. In practical use, the terms database,
database server, database system, data server, and database management systems
are often used interchangeably.

Why do we need database software or a DBMS? Can we not just store data in
simple text files for example? The answer lies in the way users access the data and
the handle of corresponding challenges. First, we need the ability to have multiple
Unit 12 What is a Database? 87
users insert, update and delete data to the same data file without "stepping on each
other's toes". This means that different users will not cause the data to become
inconsistent, and no data should be inadvertently lost through these operations. We
also need to have a standard interface for data access, tools for data backup, data
restore and recovery, and a way to handle other challenges such as the capability to
work with huge volumes of data and users. Database software has been designed to
handle all of these challenges.

The most mature database systems in production are relational database


management systems (RDBMS’s).RDBMS's serve as the backbone of applications in
many industries including banking, transportation, health, and so on. The advent of
Web-based interfaces has only increased the volume and breadth of use of RDBMS,
which serve as the data repositories behind essentially most online commerce.

(Sharma Neeraj ,etal. (2010). Database Fundamentals. Canada. IBM Corporation.)

After you Read

True or False?
Read the sentences and mark T or F.

1. Data can be robust and secured by database software.


2. Only one type of databases exists to suit various industry requirements.
3. If data is stored in a tabular form then it is called a hierarchical database.
4. Database management systems are known as the most mature database systems.

Activity
For each item below, circle the best answer.

1. Data stored as graphs representing relationships between objects is referred to as a


…………… .
a. relational database
b. hierarchical database
c. network database
d. all above

2. A database may be specialized to store …………………… .


a. documents and images
b. binary files
c. multidimensional and geographic data
d. All above

Unit 12 What is a Database? 88


3. DBMS is a set of software tools that ………………………. in a database.
a. don’t organize data
b. control data
c. manage and store data
d. b &c

Grammar - Writing

Suffixes (Changing Nouns to Adjectives)


Suffixes Nouns Adjectives Suffixes Nouns Adjectives
-ish The child Childish -ary The moment Momentary
-y The dirt Dirty -like The life Lifelike
-ly The order Orderly -ic The base Basic
-al The dimension Dimensional -less The power Powerless
-ous The advantage Advantageous -ful The power Powerful

Activity
Change the following nouns to adjectives using given suffixes. To be sure about the
correct spilling, check a dictionary.

-ish -y -ly -al -ous -ary -like -ic -less -ful

Nouns Adjectives

1. The color ..............................


2. The worth ..............................
3. The self ..............................
4. The photograph ..............................
5. The computer ..............................
6. The nerve ..............................
7. The compliment ..............................
8. The wealthy ..............................
9. The universe ..............................
10. The cost ..............................

Activity
Reread the reading passage and write any adjective which has the suffixes you studied
in this chapter. Then write their noun forms, too.
For example: critical the noun form is critic.

Unit 12 What is a Database? 89


Reading Skill

Supporting main idea


Writers usually focus on one or two main ideas in a piece of writing. They
support their main ideas with details. These details help the reader understand
and appreciate the writer’s main idea.

Activity
Look back at the reading and find at least three details that support the main idea given below.

Main Idea
A database is a repository of data, designed to support efficient data storage, retrieval
and maintenance.
Supporting Details
1. ......................................................................................................................................
2. ......................................................................................................................................
3. ......................................................................................................................................

Activity
Look back at the reading in chapter 9 and find at least one main idea and three details
that support the main idea given below.
Main Idea

Supporting Details
1. ......................................................................................................................................
2. ......................................................................................................................................
3. ......................................................................................................................................

Discussion & Writing

Activity
Pair Work: Make a conversation with your partner asking questions about using database software.

Example:
Student A: What do you think about database software?
Student B: Well. It is ease of work, especially with managing and storing data.
Student A: what types of data can you store by database software?
Student B: Different types like…

Activity
Homework: For what purpose do you use database software? Write a short paragraph
about the way you use it.
Unit 12 What is a Database? 90
13 Machine Languages, Assembly
Languages and High-Level Languages

Introduction to the Lesson

Discuss the following questions with your classmates.

1. Do you know what the computer language is?


2. How many computer languages can you name?

Unit 13 Machine Languages, Assembly Languages and High-Level Languages 91


Vocabulary

Activity
In the chart below, the words’ English synonyms or definitions are given; write their
meanings in your native language:

No. Words English Synonyms / definitions NL Meaning


Clear and detailed information on how to do
1 Instruction
something.
2 Various Different
Existing between two stages (or points,
3 Intermediate
things, etc.)
4 Ultimately In the end, eventually
5 To instruct To teach
6 Elementary Basic, fundamental
Relying on, needing (the help or support of
8 Dependent
another)
7 Particular Special
9 Cumbersome Something difficult to carry, wear, or handle
11 Illustrated Exemplified; clarified
12 Tedious Tiresome, boring
13 Abbreviation Shortened form of a word or words
14 To represent To show, symbolize
15 Basis Foundation, base
16 To convert To change, to alter
17 Incomprehensible Impossible to understand
18 Rapidly Quickly, fast
19 To advent To entrance; coming
20 To accomplish Complete, execute
21 Substantial Important; considerable
22 Notation System of symbols used to mark something
23 Standpoint Point of view, outlook
24 Feature Characteristic
25 Error Mistake
26 Efficiently Without waste (of time, resources, etc.)
A version of something is a form of it in
27 Version which some details are different from earlier
or later forms.

Unit 13 Machine Languages, Assembly Languages and High-Level Languages 92


Activity
Write proper English sentences using the words given.

Instruct basis advent version illustrate

1. ……………………………………………………………………………………….............................................
2. ……………………………………………………………………………………….............................................
3. ……………………………………………………………………………………….............................................
4. ……………………………………………………………………………………….............................................
5. ……………………………………………………………………………………….............................................

Listening and Writing

Activity
Listen to the recording carefully, then write the topic and the answers of the following
questions.

Topic: ........................................

Questions:
1. What is BASIC and when was it developed?
.......................................................................................................................................... .
2. What was the primary purpose of BAISC?
.......................................................................................................................................... .
3. What is Microsoft’s Visual Basic?
.......................................................................................................................................... .
4. When was it introduced?
.......................................................................................................................................... .
5. Why is Visual Basic so popular?
.......................................................................................................................................... .

Activity
Exchange your bookswith your partners. Listen again and try to make corrections on
your partner’s answers.
Before you Read

Scanning
Read the three questions below. Then, take two minutes to skim the reading below for
the answers.

1. What general types of computer languages are introduced in the passage?


2. How these general types of computer languages differ from each other?
3. Which type is widely used by computer programmers?
Unit 13 Machine Languages, Assembly Languages and High-Level Languages 93
Reading

Machine Languages, Assembly Languages and High-Level Languages


Programmers write instructions in various programming languages, some directly
understandable by computers and others requiring intermediate translation steps.
Hundreds of computer languages are in use today. These may be divided into three
general types:

1. Machine languages
2. Assembly languages
3. High-level languages

Any computer can directly understand only its own machine language. Machine
language is the “natural language” of a computer and as such is defined by its
hardware design. Machine languages generally consist of strings of numbers
(ultimately reduced to 1s and 0s) that instruct computers to perform their most
elementary operations one at a time.

Machine languages are machine dependent (i.e., a particular machine language can
be used on only one type of computer). Such languages are cumbersome for humans,
as illustrated by the following section of an early machine-language program that
adds overtime pay to base pay and stores the result in gross pay:

+1300042774
+1400593419
+1200274027

Machine-language programming was simply too slow and tedious for most
programmers. Instead of using the strings of numbers that computers could directly
understand, programmers began using English like abbreviations to represent
elementary operations. These abbreviations formed the basis of assembly languages.
Translator programs called assemblers were developed to convert early assembly-
language programs to machine language at computer speeds. The following section
of an assembly-language program also adds overtime pay to base pay and stores the
result in gross pay:

load basepay
add overpay
store grosspay

Although such code is clearer to humans, it is incomprehensible to computers


until translated to machine language. Computer usage increased rapidly with the
advent of assembly languages, but programmers still had to use many instructions

Unit 13 Machine Languages, Assembly Languages and High-Level Languages 94


to accomplish even the simplest tasks. To speed the programming process, high-
level languages were developed in which single statements could be written
to accomplish substantial tasks. Translator programs called compilers convert
high-level language programs into machine language. High-level languages allow
programmers to write instructions that look almost like every day English and
contain commonly used mathematical notations. A payroll program written in a
high-level language might contain a statement such as

grossPay = basePay + overTimePay

Obviously, high-level languages are preferable to machine and assembly


language from the programmer’s standpoint. C, C++, Microsoft’s .NET languages
(e.g., Visual Basic .NET, Visual C++ .NET and C#) are among the most widely used
high-level programming languages; Java is the most widely used.

The process of compiling a high-level language program into machine language


can take a considerable amount of computer time. Interpreter programs were
developed to execute high-level language programs directly, although more slowly.
Interpreters are popular in program-development environments in which new
features are being added and errors corrected. Once a program is fully developed, a
compiled version can be produced to run most efficiently.

You now know that there are ultimately two ways to translate a high-level
language program into a form that the computer understands—compilation and
interpretation.

(Deitel, P. J., Deitle, H. M. (2011). JAVA: How to Program. Pearson Higher Education. Upper Saddle River, New Jersey)

After you Read

True or False?
Read the sentences and mark T or F.

1. All the instructions written in different programing languages are .................


understood by computer with or without translation.
2. Machine language differs from computer to computer. .................
3. Even though the assembly language increased the number of .................
computer usage, it couldn’t decrease the number of instructions for
programming tasks.
4. The programmers would rather use the high level language than .................
assembly and machine languages.

Unit 13 Machine Languages, Assembly Languages and High-Level Languages 95


Activity
For each item below, circle the best answer.

1. Computer language is divided into …………………. general types.


a. 2
b. 5
c. 4
d. 3

2. The strings of numbers in Machine language are from ………………… .


a. 0 – 9
b. 1 – 5
c. 0 – 1
d. 1 – 0

3. In order to convert early assembly language programs to machine language, ………… is


needed.
a. An assembler
b. A compiler
c. A translator
d. All above

4. From the list below, …………………… is the most widely used language of computer.
a. Microsoft’s .NET
b. Java
c. C
d. C++

Grammar - Writing

Although (Showing Contrast)


The words although and even though show a contrast between two ideas in a
sentence.

Examples:
1. Although such code is clearer to humans, it is incomprehensible to
computers until translated to machine language.

2. It is very difficult to write a program even though you have been an


experienced programmer.

Unit 13 Machine Languages, Assembly Languages and High-Level Languages 96


Activity
Circle the word in parentheses that best completes each sentence.

1. Although he knew how to install a program, he (could/couldn’t) install windows


software to his computer.
2. My laptop (was/wasn’t) broken even though it fell down on the ground.
3. Millions of people (are/ aren’t) using cell – phones although they might be harmed.

Activity
Complete these sentences in your own ideas.
1. Although my computer was attacked by viruses, .......................................................
2. Most of the students copy the information from the internet for their research
documents, even though ................................................................................................
3. Even though she is too young, ....................................................................................

Discussion & Writing

Roll play: Each pair of students should have a performance in front of the class. One
should act as a reporter of a TV and another as a famous computer programmer.

Example:
Reporter: Welcome Mr./Ms. (Student’s name) to our studio.
Programmer: Thank you for warm invitation.
Reporter: Since when have you started programming?
Programmer: Actually, ……………… .

Activity
Homework: Write a short paragraph about the following topic.

The Ups and Downs of Being a Programmer

Unit 13 Machine Languages, Assembly Languages and High-Level Languages 97


14 Java, World Wide Web, and
Beyond

Introduction to the Lesson

Discuss the following questions with your classmates.

1. Do you know what the Java is?


2. What does WWW stand for?
3. What are the usages and advantages of WWW?

Unit 14 Java, World Wide Web, and Beyond 98


Vocabulary

Activity
In the chart below, the words’ English synonyms or definitions are given; write their
meanings in your native language.

No. Words English Synonyms / definitions NL Meaning


1. Originally In an original manner; at first
2 Embedded Inserted
3 Consumer Buyer
4 Appliance Tool, device
The application of a rule, piece of knowledge,
5 Application or piece of equipment is the use of it in a
particular situation.
6 Enormously hugely
7 To rise To increase, to grow
8 To wide To a great extent
9 Acceptance State of accepting or believing in something
If you trace the development of something, you
11 Trace
find out or describe how it developed.
A quality or feature that is typical of someone
12 Characteristic
or something.
Someone or something that is robust is strong
13 Robust
and healthy.
14 Architecture Design of a computer and its components
15 Neutral Without particular kind or character
Broken up from a long chain of commands into
16 Multithreaded small units that can be executed simultaneously
by applications programs
17 Dynamic Powerful
18 Standalone Independent
To hype a product means to advertise it using
19 Hype
costly methods of publicity.
20 Repository Archive
21 Infrastructure Foundation, basis
22 Authoring Composing
Something that is static does not move or
24 Static
change.
25 Attractive Interesting

Unit 14 Java, World Wide Web, and Beyond 99


26 Versatile Multi-purpose
27 Rover Operator of a roving machine
Activity
Complete each sentence with a word from the box.

Originally versatile authoring characteristics repository

1. The primary ………….. language for the Web is the Hypertext Markup Language.
2. One of good ………………….. of workstation is resolution.
3. Linux was ………………… developed by Linus Torvalds.
4. The hard disk of a computer can be counted as a ………………..of data.
5. Why is Java a……………… programming language?

Listening

Dictation
Listen to the recording carefully and write every word you hear. Don’t add something
of your own!

JAVA TV

Activity
Exchange your books with your partners. Listen again and try to make corrections on
your partner’s answers.
Before you Read

Scanning
Scan the passage and then fill in the blanks.

1. Java was designed in …………. .


2. The original name for Java was …………. .
3. The …………….. is an electronic information repository that can be accessed on the
Internet from anywhere in the world.
4. ………….. is the primary authoring language for the web.
Unit 14 Java, World Wide Web, and Beyond 100
Reading

Java, World Wide Web, and Beyond


Java was developed by a team led by James Gosling at Sun Microsystems. Originally
called Oak, it was designed in 1991 for use in embedded chips in consumer electronic
appliances. In 1995, renamed Java, it was redesigned for developing Internet
applications. For the history of Java, see java.sun.com/features/1998/05/birthday.html.

Java has become enormously popular. Its rapid rise and wide acceptance can
be traced to its design characteristics, particularly its promise that you can write
a program once and run it anywhere. As stated by Sun, Java is simple, object
oriented, distributed, interpreted, robust, secure, architecture neutral, portable, high
performance, multithreaded, and dynamic.

Java is a full-featured, general-purpose programming language that can be used to


develop robust mission-critical applications. Today, it is employed not only for Web
programming, but also for developing standalone applications across platforms on
servers, desktops, and mobile devices. It was used to develop the code to communicate
with and control the robotic rover on Mars. Many companies that once considered Java
to be more hype than substance are now using it to create distributed applications
accessed by customers and partners across the Internet. For every new project being
developed today, companies are asking how they can use Java to make their work easier.

The World Wide Web is an electronic information repository that can be accessed
on the Internet from anywhere in the world. The Internet, the Web’s infrastructure,
has been around for more than thirty years. The colorful World Wide Web and
sophisticated Web browsers are the major reason for the Internet’s popularity.

The primary authoring language for the Web is the Hypertext Markup Language (HTML).
HTML is a simple language for laying out documents, linking documents on the Internet,
and bringing images, sound, and video alive on the Web. However, it cannot interact with the
user except through simple forms. Web pages in HTML are essentially static and flat.

Java initially became attractive because Java programs can be run from a Web
browser. Such programs are called applets. Applets employ a modern graphical
interface with buttons, text fields, text areas, radio buttons, and so on, to interact
with users on the Web and process their requests. Applets make the Web responsive,
interactive, and fun to use. Java can also be used to develop applications on the server
side. These applications can be run from a Web server to generate dynamic Web pages.

Java is a versatile programming language. You can use it to develop applications on


your desktop and on the server. You can also use it to develop applications for small
hand- held devices.

(Liang, Y. Daniel. (2011) Introduction to Java Programming. Upper River, New Jersy)
Unit 14 Java, World Wide Web, and Beyond 101
After you Read

True or False?
Read the sentences and mark T or F.
1. The Internet applications were developed by Java. .................
2. Java is widely used both for Web programming and standalone .................
applications of mobile services.
3. It is not possible for Java programs to be run from a Web browser .................
because Applets avoid it.
4. Dynamic Web pages can be run from a web server by the help of Java. .................
Activity
Consider the information in the reading passage. Work with a partner to answer the
questions below.

1. What characteristics made Java so popular throughout the world?


2. What made the Internet popular?
3. What is HTML and what are its benefits?

Grammar - Writing
Simple Past Tense vs. Present Perfect Tense
Simple Past (Certain time) Present Perfect (Uncertain time)
Form: Subject +past verb form +complement Form: Subject + have/has +past
Example: participle +complement
I scanned my computer an hour ago. (Time is Examples:
specified) I have just scanned my computer.
(Time is not specified)
He has printed his homework.
Past forms of verb Past Participle (Third form of a verb)
Examples:
Regular Irregular Regular Irregular
Verb + - ed form is changed configured written
EX: edit +ed = edited wrote scanned came
talked spoken
Activity
Fill in the blanks by given verbs in parentheses. Use the simple past or present perfect.

1. Marry …………….... (buy) a laptop yesterday.


2. Marry doesn’t know how to turn it on because she………………….(not, use) it yet.
3. My brother…………..……….. (go) to computer science faculty since last week.
4. I was angry last night because the electricity …………..(go) and I couldn’t ……….(use)
my computer.
5. Did you……………………..(configure) Linux on his laptop?
Unit 14 Java, World Wide Web, and Beyond 102
Activity
Write the second and third form of the verbs in the chart.

First Form Second Form Third Form First Form Second Form Third Form
To develop To let
To design To become
To embed To mistake
To be To have
To state To cut

Reading Skill

Summarizing:
Summarizing refers to restating or retelling of the most important information
in your own words. Summarizing something you read can help you remember
information.

Summary of the paragraph 1 from this chapter reading passage:


At first Java was designed for electronic appliances by James Gosling’s team in
1991. Later it was redesigned for another purpose, development of Internet
applications.

Activity
Summarize the paragraph 3 of this chapter reading passage:

Activity
Summarize the paragraph 5 - 7 of this chapter reading passage:

Unit 14 Java, World Wide Web, and Beyond 103


Discussion & Writing

Group work: Make groups of four students and discuss about the Internet available
in your faculty.
For example, you can discuss about the type of internet connection in your faculty, its
speed, services and so on.

Activity
Homework: Summarize what you have discussed in your groups about your faculty
Internet services. Try to write it in a short paragraph.

Unit 14 Java, World Wide Web, and Beyond 104


15 Unix vs. Linux

Introduction to the Lesson

Discuss the following questions with your classmates.

1. Do you know what Unix is? Have you ever used it or any version of Unix?
2. Do you know what Linux is? Have you ever used it personally?
3. Can you name any similarities between Unix and Linux systems? Any differences?

Unit 15 Unix vs. Linux 105


Vocabulary

Activity
In the chart below, the words’ English synonyms or definitions are given; write their
meanings in your native language.

No. Words English Synonyms / definitions NL Meaning


1 Multitask Doing several tasks or work
Room or building fitted with equipment for
2 Laboratory
scientific experimentation
3 To evolve Gradually be changed over time
4 Portable Can be transported from one place to another
Equipment or programs which enable two
5 Interface
different systems or programs to communicate
6 Commercial Relating to commerce and business.
Program or hardware which simulates an original
7 Clone
product
8 To set out To arrange
Part of an operating system which deals with basic
9 Kernel
hardware, code
11 To converge Come together, assemble
12 Distribution Act of distributing or portioning something out
If something bears a particular mark or
13 To bear characteristic, it has that mark or characteristic,
include
14 Resemblance Similarity
15 Similarly In a similar manner
16 To cost To have a price
17 Generically In a generic manner, in a nonspecific manner
Transfer of a program from one platform to
18 Port another, interface for connecting external devices
to a computer
To be superior to something or someone means to
19 Superior
be better than them
20 To lag behind To fall behind
21 Over all In general, for the most part
22 Usability Capability of being used
23 Gap Great difference
24 To deploy To spread out

Unit 15 Unix vs. Linux 106


25 To shrink To make smaller
26 Minimal Smallest

Activity
Write meaningful English sentences with the words from the box.

Interface lag behind Resemblance evolve cost

1. ……………………………………………………………………………………………....................................... .
2. ……………………………………………………………………………………………....................................... .
3. ……………………………………………………………………………………………....................................... .
4. ……………………………………………………………………………………………....................................... .
5. ……………………………………………………………………………………………....................................... .

Listening

Activity
Listen to the recording and then answer the following questions.

1. Who is Linus Torvalds and when was he born?


……………………………………………………………………………………………....................................... .
2. Why was he famous as a folk hero programmer?
……………………………………………………………………………………………....................................... .
3. Why is he considered as a leader?
……………………………………………………………………………………………....................................... .

Activity
Exchange your books with your partners. Listen again and try to correct your partner’s
answers. Scanning: Scan the passage and then mark Yes or No for the following
questions.

1. Was Unix first developed for use on microcomputers?


2. Is there any similarity between modern Linux system and modern Unix system?
3. Is Linux more expensive than Commercial Unix?

Reading

Unix vs. Linux


Unix is a multi-user, multitasking operating system. It was originally developed
by Ken Thompson and Dennis Ritchie at AT&T Bell Laboratories between 1969
and 1973 for use on minicomputers. Unix has evolved into a complex, powerful
operating system that is more portable and less machine- specific than many other
Unit 15 Unix vs. Linux 107
operating systems. Unix uses a powerful command-line interface, although there
are also graphical user interfaces for the Unix system. There are many different
versions of Unix such as:

• System V : developed by AT&T for commercial release


• BSD Unix: a free version of Unix which was developed at the University of California
Berkeley
• AIX : a version of System V which was adapted by IBM
• A/UX: a graphical version of Unix for the Macintosh
• SunOS :based on BSD Unix and available on Sun workstations
• Linux :a newer of Unix version that runs easily on home computers

Originally Linux was developed as a clone of Unix. Linus Torvalds set out to write
an open source Kernel around which existing open source Unix replacement parts
could converge; the result was the Linux distribution as we know it today. Because
of this history, modern Linux systems bear a very strong resemblance to modern
Unix systems, and in fact, the two can often be used similarly.

In many cases, the most important difference between Linux and commercial
Unix is cost. Linux is a very low –cost OS, but commercial Unix OSs cost much more.
(The most common x86 Unix OSs are now available at low cost for personal use, but
most commercial users must still pay hundreds of dollars for license.) Most Linux
software is available in open source from, and it can be compiled on commercial Unix
machines -- indeed, most Linux software is developed as Unix software generically,
with Linux as just one of many Unix –like platforms on which it works. Many
commercial Unix programs have been ported to (that is, recompiled on) Linux.

Where commercial Unix OSs hold an edge is in very high performance computing.
OSs such as silicon graphics’(SGI) IRIX and sun’s Solaris run on very fast non –x 86
hardware and support advanced features that Linux supports poorly, if at all. Also,
the hardware used by high-end systems is often superior to that used on the x86 PCs
on which Linux usually runs. Linux has been ported to many non-x86 platforms,
including many of those on which its Unix “big brothers” run, but these parts often lag
behind the x86 version in terms of overall polish and general usability.

As Linux improves, the gap between Linux and commercial versions of Unix is
shrinking. Even today, Linux is an excellent platform for workstations and small to
mid-size servers. Because of its similarity to more advanced systems, it’s possible
to deploy Linux today and move to a higher-end commercial Unix systems in the
future, with minimal changes to configuration and administrations’ training. This is
certainly an advantage of the Linux /Unix family as a whole over windows.

(Ay, Osman. And et.al. (2003). Introduction to Computers. Istanbul – Turkey: Zambak Typesetting & Design.) and
(Smith, Roderick W. (2004) Linux +. SYBEX Inc. 1151 Marina Villiage)

Unit 15 Unix vs. Linux 108


After you Read

True or False?
Read the sentences and mark T or F.
1. Comparing to other operating systems, Unix is less portable and more .................
machine – specific.
2. Both Unix and Linux were first developed by the same person. .................
3. Although x 86 Unix is cheaper, the commercial users must buy its license .................
very expensively.
4. The big difference between Linux and commercial versions of Unix is .................
minimizing by Linux improvement.
Activity
Complete the following sentences with the information you got from the text:
1. Unix is a…………………………………….and was originally developed by Dennis Ritchie and
………………………. .
2. Linux is a ………… of Unix developed by…………............ .
3. Most …………… software is available in …………….. from, and it can be compiled on
………………….. Unix machines.
4. ……………. run on very fast non –x 86 hardware and support advanced features that
……………… supports poorly.
5. It’s possible to deploy Linux today and move to a higher-end ……………….. systems in the future.

Grammar - Writing
Simple Future (Will / be going to )
When you’re expressing an intention or decision, use will if you’re making the
decision as you speak; use going to if you have already made the decision:
Forms:
1. Will: subject + Will + main verb +complement.
2. Be going to: subject + am/ is/ are going to + main verb +complement.
Examples:
A: What type of computer are you going to buy?
B: Hmm. Actually, I haven’t made up my mind. I will buy a Pentium 4 computer. (not certain)
Or I am going to buy a Pentium 4 computer. (certain)
Activity
Complete the sentences with correct form of the verbs given. Use simple future will or
be going to.

pass take start replace

1. I am sure I ……………………. the computer engineering exam.


2. I don’t know what to do to get rid of the viruses! I …………………. it to a computer
repair shop or install an antivirus.
Unit 15 Unix vs. Linux 109
3. He ……………..probably…………….. Teaching computer to his father.
4. Linux ………………… with commercial Unix because of its fast improving process.

Discussion & Writing

Activity
Pair work: Work with your partner to list the differences and similarities between Unix
and Linux in the chart below. Then discuss about them.

Differences Similarities

Activity
Homework: Write a short paragraph about any of operating systems: Linux or Unix.

Unit 15 Unix vs. Linux 110


16 The Internet

Introduction to the Lesson

Discuss the following questions with your classmates.

1. Do you know what the Internet is?


2. What important role does the Internet play in our life?

Unit 16 The Internet 111


Vocabulary

Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language.

No. Words English Synonyms / definitions NL Meaning


If you imagine a situation, you think about it and
1 To imagine
try to form a picture or idea of it in your mind.
2 Actually In fact
4 Globally In the whole world
5 To communicate To exchange information or ideas
6 To entertain To enjoy
7 Exactly With complete accuracy and precision
8 Concept Idea, thought
9 Midst Happening in the middle of a period of time
11 To coordinate To arrange in proper order
12 To disrupted To disturb, to interrupt; to divide
13 Revolution Big change
If you attack a person or building, you try to
14 To attack
hurt or damage them using physical violence.
15 Reliable Credible, trustworthy
One who manufactures (produces something);
16 Manufacturer
owner of a manufactory
17 Proprietary Protected by a patent or trade mark
18 To lack To be short of; be without, need
19 Concern Reason
If you establish an organization or a system,
20 To establish you create it in a way that is intended to be
permanent.
21 Military Army, armed forces, defense force of a nation
22 To invent To create, to design
23 Fund Amount of money set aside for a specific purpose
24 To crash To stop working properly
25 To transmit To send
26 Participant One who takes part
If a fact or situation is acknowledged, it is
27 To acknowledge
accepted that it is true or that it exists

Unit 16 The Internet 112


Things that are interchangeable can be exchanged
28 Interchangeable
with each other without making any difference
29 To navigate To go, to journey across
You can refer to television, radio, and
30 Media
newspapers as the media.
31 In conjunction with Together with
32 To herald To announce
33 Monumental Great
34 Exponentially Growing or increasing very rapidly
The growth of something is its increase or
35 Growth
development in size, wealth, or importance.
Activity
Fill in the blanks with the words given.

Media participant military attacks revolution

1. The virus can ……………. on our computer and damage our file systems.
2. The advent of the Internet has been a ………….... in science and technology.
3. I was an exam …………………… in IT center of our faculty.
4. ………………… robots are used for investigation in serious and dangerous situations at
the time of war.
5. The ……………. won’t broadcast the news about recent banking Hackers.

Activity
Make proper English sentences for the following words.

monumental navigate crash coordinate establish

1. …………………………………………………………………………………...........................................……. .
2. …………………………………………………………………………………...........................................……. .
3. …………………………………………………………………………………...........................................……. .
4. …………………………………………………………………………………...........................................……. .
5. …………………………………………………………………………………...........................................……. .

Listening

Activity
Listen to the recording carefully and fill in the blanks from the words below:

Internet long - distance activity worldwide business


public primary formatted message graphics
Unit 16 The Internet 113
Why did e-mail catch on so quickly?
E-mail (short for electronic mail) is a written ……………that is sent and received over the
………………. The messages can be …………… and enhanced with …………. and may also
include other files as attachments. E-mail became the …………… method of electronic
communication …………….. because it’s fast and convenient. Initially, another attraction
to e-mail was that it reduced the costs of postage and ………………… phone calls. Currently,
e-mail is predominately the main means of communication in the …………… community.
For social exchanges, e-mail often offers a more “private” conversation away from the
very …………. exchanges on social networks. Lastly, e-mail accounts are necessary to join
and then receive updates of …………… on other Web sites.

Activity
Exchange your papers with your partners. Listen again and try to make corrections on
your partner’s papers.

Before you Read

Skimming
Skim the passage for two minutes and then write the following items:

• Names of People used in the passage ....................... ....................... .......................


• Names of places used in the passage ....................... ....................... .......................
• Words repeatedly used in the passage ....................... ....................... .......................
Reading Passage

The Internet
It’s hard to imagine life without the Internet, the largest computer network in the
world. It’s actually a network of networks that connects billions of computer users
globally. We use it to shop, to communicate, to research, to find places and get directions,
and to entertain ourselves. It’s accessible from our computers, smartphones, and portable
music players (PMPs), and we can get to it while at home, at work, at school—even at
Starbucks or in the car. But what exactly is the Internet, and how did it begin?

The concept of the Internet was developed while the United States was in the midst
of the Cold War with the Soviet Union. At that time, the U.S. armed forces were becoming
increasingly dependent on computers to coordinate and plan their activities. They needed
a computer system that would operate efficiently and that was located in various parts of
the country so that it could not be disrupted easily in the event of an attack.

At the same time, researchers hoped the Internet would address the problems
involved with getting different computers to communicate with each other.
Although computers had been networked since the early 1960s, there was no
reliable way to connect computers from different manufacturers because they
Unit 16 The Internet 114
used different proprietary designs and methods of communication. What was
lacking was a common communication method that all computers could use. The
Internet was created to respond to these two concerns: establishing a secure form
of military communications and creating a means by which all computers could
communicate.

The modern Internet evolved from an early U.S. government–funded


“internetworking” project called the Advanced Research Projects Agency Network
(ARPANET). ARPANET began as a four-node network involving UCLA, Stanford
Research Institute, the University of California at Santa Barbara, and the University
of Utah in Salt Lake City. The first real communication occurred in late 1969
between the computer at Stanford and the computer at UCLA. Although the system
crashed after the third letter was transmitted, it was the beginning of a revolution.
Many people participated in the creation of the ARPANET, but two men who worked
on the project, Vinton Cerf and Robert Kahn, are generally acknowledged as the
“fathers” of the Internet. They earned this honor because in the 1970s they were
primarily responsible for developing the communications protocols (standards)
that are still in use on the Internet today.

Because the World Wide Web (WWW or the Web) is what we use the most, we
sometimes think of the Internet and the Web as being interchangeable. However,
the Web is only one component of the Internet, the means we use to access
information over the Internet (hence the www at the beginning of Web addresses).
Other components of the Internet include FTP, Gopher, Telnet, and Bit Torrent.
What distinguishes the Web from the rest of the Internet is its use of
• common communication protocols that enable different computers to talk to
each other and display information in compatible formats, and
• special links that enable users to navigate from one place to another on the Web.

The Web was invented many years after the original Internet. In 1989, Tim
Berners-Lee, a physicist at the European Organization for Nuclear Research
(CERN), wanted a method or linking his research documents so that other
researchers could access them. In conjunction with Robert Cailliau, Berners- Lee
developed the basic architecture of the Web and created the first Web browser (or
browser), software that enables a user to display and interact with text and other
media on the Web. The original browser could handle only text and was usable only
on computers running the NeXT operating system, a commercially unsuccessful
operating system (OS), which limited its usage. So Berners-Lee put out a call to the
Internet community to assist with development of browsers for other platforms. In
1993, the National Center for Super- computing Applications released its Mosaic
browser for use on the Macintosh and Windows operating systems. Mosaic could
display graphics as well as text. The once- popular Netscape Navigator browser
evolved from Mosaic and heralded the beginning of the Web’s monumental growth.

Unit 16 The Internet 115


The Internet experienced explosive growth in the early to mid-1990s. By 1997,
Internet access was global. Because of such global Internet availability and access,
as well as the increasing capabilities of hardware and software, the number of Web
sites-locations on the Internet-grew exponentially. The growth of the Web is by no
means complete. In January 2010, more than 732 million Web sites were online.

(Evans. Alan, et al. (2012) Complete Technology in Action. Pearson Education, Inc., U.S.A, 8th ed.)

After you Read

True or False?
Read the sentences and mark T or F.
1. The concept of the Internet was developed in 1960s. .................
2. The main purpose of creating the Internet was establishing a secure .................
form of military communications.
3. Vinton Cerf and Robert Kahn are known as father of the Internet .................
because the first real communication occurred between their
computers via the Internet.
4. Developing web browsers (Mosaic and Netscape Navigator ) was the .................
beginning of the Web’s monumental growth.
Activity
Consider the information based on the reading passage. Work with a partner to answer
the questions below.

1. What’s the Internet?


2. Why was the Internet created?
3. Who invented the Internet?
4. Are the Web and the Internet the same thing?
5. Did the same people who invented the Internet invent the Web?
6. How much has the Internet grown?
Grammar - Writing
Past form of Be: Was & Were
Form: Examples: Subjects
Singular subject + was 1. He was the developer I
Plural subject + were of the Web. He
2. They were the She was
developers of the Web. It
3. What was the lesson about?
4. It was my first exam on We
networking subject! They were
You

Unit 16 The Internet 116


Activity
Choose the correct forms of “be” for the following sentences by circling letter a or b.
1. My brother and I ……… really interested in playing games.
a. was
b. were

2. Who …………… the inventor of electricity?


a. was
b. were

3. I ………. completely surprised when I saw him typing so fast.


a. was
b. were

4. What ……….. the main aspects of the lesson?


a. was
b. were

5. …………… she present in the computer engineering class yesterday?


a. was
b. were

Discussion & Writing

Group work
Sit in groups of four students. Talk about the usage of the Internet in academic places
such as the university, especially computer science faculty. Then limit your topic to
advantages and disadvantages of the Internet. List them in the chart below.

Advantages of the Internet Disadvantages of the Internet


1. Downloading research material 1. Downloading too much games
2. .................................................. 2. ..................................................
3. .................................................. 3. ..................................................
4. .................................................. 4. ..................................................
5. .................................................. 5. ..................................................
6. .................................................. 6. ..................................................
7. .................................................. 7. ..................................................

Activity
Homework: Write a paragraph about the way you benefit from the Internet.

Unit 16 The Internet 117


17 Social Networking

Introduction to the Lesson

Discuss the following questions with your classmates.

1. Have you ever used any of social websites?


2. Can you name any social website?
3. How useful is social networking in our daily life?

Unit 17 Social Networking 118


Vocabulary

Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language.

No. Words English Synonyms / definitions NL Meaning


1 Social Relating to society
2 Share To allow users on a network to access local resources
4 Immediate friend Close friend
5 Experience Experience
a conference in which several people who
6 Video conference are a long way from each other communicate
using audio and video equipment.
Something happens to a large extent and in all
7 Broadly
the ways that are important.
Relating to the work of someone who is
8 Professional qualified for a particular job, especially work
that requires special training.
The population of a place is all the people
9 Population
who live in it
11 Acquaintance Someone who you have met but do not know well
12 Traditionally Customarily, in traditional form
Something that is instantaneous happens
13 Instantaneous
immediately and very quickly.
14 To facilitate To make it easier
15 Candidate Applicant, nominee
An action that is intended to prevent something
16 Precaution
dangerous or unpleasant from happening.
17 To concern To worry about a thing or situation.
A teenager is someone between thirteen and
18 Teenager
nineteen years of age.
If you misuse something, you use it
19 To misuse
incorrectly, carelessly, or dishonestly.
20 To eliminate To remove it completely
A cautious person acts very carefully in order
21 Cautious
to avoid danger.
If something happens additionally, it happens
22 Additionally
to a greater extent than before.
23 Accurately Precisely, exactly
Unit 17 Social Networking 119
Activity
Make proper English sentences for the following words:

Video conference share cautious Candidate to misuse

1. ………………………………………………………………………………...........................................………. .
2. ………………………………………………………………………………...........................................………. .
3. ………………………………………………………………………………...........................................………. .
4. ………………………………………………………………………………...........................................………. .
5. ………………………………………………………………………………...........................................………. .

Listening and Writing

Activity
Dictation: Listen to the recording carefully and write every word you hear. Don’t add
something of your own!

Group Communication

Activity
Exchange your papers with your partners. Listen again and try to make corrections on
your partner’s papers.
Before you Read

Scanning
Scan the passage and then try to name some popular social networking sites which
have many users around the world.

1. .......................................
2. .......................................
3. .......................................
4. .......................................
Unit 17 Social Networking 120
Reading

Social Networking
Social networking is a means by which people use the Internet to communicate
and share information among their immediate friends, and meet and connect with
others through common interests, experiences, and friends. Social networking
services such as Facebook (facebook.com) and MySpace (myspace.com) have
become amazingly popular because they provide ways for members to communicate
with their friends in a variety of means such as by voice, chat, instant message, and
videoconference so that members don’t need separate communication accounts.
These services were first accepted broadly among the younger, nonprofessional
population, but now many adults create their own social networking profiles on
Facebook and MySpace. In fact, the largest increase of Facebook users in 2009 was
adults aged 55 and over, with a growth rate of nearly 925%! Ning (ning.com) is a
social networking site that allows you to create your own network around your own
common topic or join a social networking group that has already been formed.

Is social networking just for fun?


Networking has long been a means of creating links between you and your
friends—and their friends and acquaintances. Traditionally, networking has been
helpful in the business community for the purposes of finding and filling open job
positions as well as finding clients. The Internet, with its speedy connections and
instantaneous means of communicating, facilitates such business networking as well
as promoting more socially based networks. The professional, business-oriented
online networks such as LinkedIn® (linkedin.com) are helpful for members seeking
to find potential clients, business opportunities, jobs, or job candidates. Like a true
business network, LinkedIn® helps you meet other professionals through the people
you know.

Are there precautions I should take with my social networking content?


When social networking sites first became popular, there was huge concern over
privacy issues, especially for young teenagers who put personal information on
their pages without considering the possibility of that information being misused
by a stalker or identity thief. Although those concerns still exist, many of the most
popular social networking sites have improved their privacy policies, thereby
reducing, but not eliminating, such concerns. Still, users must be cautious about
the type of content they post on these sites. For example, think before you add
information like “your mother’s maiden name” or “your first pet’s name” because
these are often security questions that are used to verify your identity.

Social networking sites are a great way to exchange photos, but again, use
caution when posting images. Although privacy settings may offer some comfort,
some images may be available for view through search engines and may not
require site registration to be viewed. Online images may become public property
Unit 17 Social Networking 121
and subject to reproduction, and there might be some images that you don’t want
distributed. Additionally, many employers use social networks as another means of
gaining information about a potential job candidate before granting an interview or
extending a job offer. The responsibility for your content rests with you. Make sure
your profile, images, and site content project an image that accurately represents
you.

(Evans. Alan, et al. (2012) Complete Technology in Action. Pearson Education, Inc., U.S.A, 8th ed.)

After you Read

True or False?
Read the sentences and mark T or F.
1. Social networking is only beneficial for elderly people. .................
2. It is not true that social networking is just for fun. .................
3. If you use Facebook, you will be serviced in different ways to communicate .................
with your friends.
4. Comparing to the past, modern social networking sites’ privacy .................
policies haven’t been improved.

Activity
For each item below, circle the best answer(s).

1. For improving business and finding a job, the ………………..site is recommended.


a. Facebook
b. MySpace
c. Ning
d. Linkedin

2. Among all existent social networking sites, the…………………….site is more popular to


communicate with friends and publicize your ideas and experiences.
a. Facebook
b. MySpace
c. Linkedin
d. A &B

3. You can create your own network about your favorite topic by…………………
a. Facebook
b. Myspace
c. Ning
d. Linkedin

Unit 17 Social Networking 122


Grammar - Writing
Because + clause
Because joins a clause expressing reason/cause.
The cause-clause may be placed before or after the effect-clause.
Example:
He is sad because his young sister broke his laptop.

(Effect Clause ) (reason/cause Clause)

Or Because his young sister broke his laptop, he is sad.

(reason/cause Clause) (Effect Clause )

Activity
Complete each statement with a reason from the list on the right. Write the number of
the sentence.
Sentence Reasons
1. Ali went to London because it provides different services.
2. Antivirus software is essential for because it protects your computer from
computers malware.
3. He is so proud because he want to study programming.
4. Facebook is popular because he is a very famous computer
engineer.
Activity
Complete the following sentences using you own reasons.

1. I enjoy studying computer at computer science faculty because ...................................


.............................................................................................................................................
2. I always use Facebook social site because ......................................................................
.............................................................................................................................................
3. Ubuntu software is better than Windows software because .........................................
.............................................................................................................................................
Discussion & Writing

Group work: First, discuss about the services provided by social networking sites for
the people who are using them. Secondly, talk about your own experiences. Ask and
answer your classmates some questions like the following:

• How has social networking affected your life?


• Which sites do you prefer to use the most and why?
• Are you using social networking for having fun or learning? Or Any other purposes?
Unit 17 Social Networking 123
Activity
Homework: What is the most helpful experience you have ever had while using social
networking? Write your memory in a short paragraph.

Unit 17 Social Networking 124


18 Computer Threat:
Hackers

Introduction to the Lesson

Discuss the following questions with your classmates.

1. Have you ever heard about computer hackers?


2. What do you think about them and their profession?
3. Are you optimistic about them? Or pessimistic?

Unit 18 Computer Threat: Hackers of View 125


Vocabulary

Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language.

No. Words English Synonyms / definitions NL Meaning


1 Amateur Not professional
2 Novice Beginner, inexperienced person
4 Havoc A state of great disorder
5 Fortunately Luckily
6 Proficient Expert
If you enforce a particular condition, you
7 Enforce
force it to be done or to happen.
8 Official Formal
If you prosecute someone, you bring
9 To prosecute criminal charges against them, and they go
on trial.
11 Nevertheless However, anyway
When there is disruption of an event,
12 Disruption system, or process, it is prevented from
proceeding or operating easily or peacefully.
13 Unlawfully Illegally
14 Offended Emotionally hurt
15 Criminal A person who has committed a crime
16 To tout To praise
17 Vulnerable Unprotected
Someone who is very bad and willing to
18 Villainous
harm other people or break the law.
An outlaw is a criminal who is hiding from
19 Outlaw
the authorities
20 Unauthorized Without official permission
21 To snoop To pry into the affairs of others
22 Hobbyist Person with a hobby or favorite activity
23 Proprietary Of a possession; protected by a patent or trade mark
Spying, Spying is the activity of trying to find
out secret information about one country
24 Espionage
or organization in order to give it to another
country or organization.

Unit 18 Computer Threat: Hackers of View 126


25 To steal To rob
26 Financial Of money matters
A business deal, usually involving buying and
27 Transaction
selling something.
28 To reassemble To put together again
Something that is cohesive consists of parts
29 Cohesive that fit together well and form a united
whole.
30 Exploitation Selfish use, taking advantage
If you intercept someone or something that is
31 To intercept travelling from one place to another, you stop
them
If you assume that something is true, you
32 To assume
suppose that it is true, sometimes wrongly
32 To defraud To deceive
Mischief is eagerness to have fun, especially
34 Mischief
by embarrassing people or by playing tricks.
If something is widespread, it exists or
35 Widespread happens over a large area, or to a very great
extent.
36 Malicious Something harmful
37 To conquer To overcome
Collective group of stories about specific
38 Mythology
imaginary characters;
If you sneak somewhere, you go there
39 To sneak
quietly, trying to avoid being seen or heard.
40 To perpetrate To do a harmful or immoral act

Activity
Make meaningful English sentences with the words from the box.

havoc official intercept steal mischief

1. ……………………………………………………………………………………………..................................... .
2. ……………………………………………………………………………………………..................................... .
3. ……………………………………………………………………………………………..................................... .
4. ……………………………………………………………………………………………..................................... .
5. ……………………………………………………………………………………………..................................... .

Unit 18 Computer Threat: Hackers of View 127


Listening

Activity
Listen to the recording carefully and fill in the blanks using the words below:

Law havoc tools amateur


proficient hack nevertheless unskilled

Teenage Hackers
These ……………… hackers are often referred to as script kiddies. Script kiddies don’t
create the programs they use to ……………. into computer systems; instead, they use
…………. created by skilled hackers that enable ……………..novices to wreak the same
………….. as professional hackers. Fortunately, because the users of these programs are
amateurs, they’re usually not …………………. at covering their electronic tracks. Therefore,
it’s relatively easy for ……………..enforcement officials to track them down and prosecute
them. Script kiddies ………………..............can cause a lot of disruption and damage to
computers, networks, and Web sites.

Activity
Exchange your books with your partners. Listen again and try to make corrections on
your partner’s books.

Before you Read

Scanning
Scan the passage and then answer the following questions.

1. Who is the hacker?


2. Name some of hackers’ reasons in computer hacking.

Reading

Computer Threats: Hackers


Although there is a great deal of disagreement as to what a hacker actually is (especially
among hackers themselves), a hacker is most commonly defined as anyone who unlawfully
breaks into a computer system— either an individual computer or a network.

Some hackers are offended by being labeled as criminals and therefore attempt
to classify different types of hackers. A hacker who breaks into systems just for the
challenge of it (and who doesn’t wish to steal or wreak havoc on the systems) may refer
to him- or herself as a white-hat hacker. These individuals tout themselves as experts
who are performing a needed service for society by helping companies uncover the
vulnerabilities in their systems.
Unit 18 Computer Threat: Hackers of View 128
White-hat hackers look down on those hackers who use their knowledge to
destroy information or for illegal gain. A term for these more villainous hackers is
black-hat hacker. (The terms white hat and black hat are references to old Western
movies in which the heroes wore white hats and the outlaws wore black hats.)
Regardless of the hackers’ opinions, the laws in the United States and in many other
countries consider any unauthorized access to computer systems a crime.

Some hackers just like to snoop. They enjoy the challenge of breaking into
systems and seeing what information they can find. Other hackers are hobbyists
seeking information about a particular topic wherever they can find it. Because
many people keep proprietary business information on their home computers,
hackers bent on industrial espionage may break into home computers. For other
hackers, hacking is a way to pass time.

What Hackers Steal


If you perform financial transactions online, such as banking or buying goods
and services, then you probably do so using a credit (or debit) card. Credit card and
bank account information can thus reside on your hard drive and may be detectable
by a hacker. Also, many sites require you to provide a login ID and password to gain
access. Even if this data is not stored on your computer, a hacker may be able to
capture it when you’re online by using a packet sniffer or a key logger (a program that
captures all keystrokes made on a computer).

What’s a packet sniffer?


Data travels through the Internet in small pieces, each called a packet. The packets
are identified with an IP address, in part to help identify the computer to which they
are being sent. Once the packets reach their destination, they are reassembled into
cohesive messages. A packet sniffer is a computer program deployed by hackers
that looks at (or sniffs) each packet as it travels on the Internet—not just those
that are addressed to a particular computer, but all packets. Some packet sniffers
are configured to capture all the packets into memory, whereas others capture
only packets that contain specific content (such as credit card numbers). Wireless
networks can be particularly vulnerable to this type of exploitation because many
people do not enable encryption of data when they set up their wireless networks. A
hacker might sit in a coffee shop connected to a wireless network and run a packet
sniffer to capture data from other patrons who are using the wireless network. This
makes it easy for hackers to intercept and read sensitive information transmitted
without encryption, such as credit card numbers or the contents of e-mails.

Once a hacker has your credit card information, he or she can either use it
to purchase items illegally or sell the number to someone who will. If a hacker
steals the login ID and password to an account where you have your credit
card information stored (such as eBay or Amazon), he or she can also use your
account to purchase items and have them shipped to him- or herself instead of
Unit 18 Computer Threat: Hackers of View 129
to you. If hackers can gather enough information in conjunction with your credit
card information, they may be able to commit identity theft. Identity theft is
characterized by someone using personal information about you (such as your
name, address, or Social Security number) to assume your identity for the purpose
of defrauding others. Although this sounds scary, you can easily protect yourself
from packet sniffing by installing a firewall and using data encryption on a wireless
network .

Trojan Horses
Hackers often use individuals’ computers as a staging area for mischief. To commit
widespread computer attacks, for example, hackers need to control many computers
at the same time. To this end, hackers often use Trojan horses to install other
programs on computers. A Trojan horse is a program that appears to be something
useful or desirable (like a game or a screen saver), but while it runs does something
malicious in the background without your knowledge. The term Trojan horse derives
from Greek mythology and refers to the wooden horse that the Greeks used to sneak
into the city of Troy and conquer it. Therefore, computer programs that contain a
hidden (and usually dreadful) “surprise” are referred to as Trojan horses.

Often, the malicious activity perpetrated by a Trojan horse program is the


installation of a backdoor program that allows hackers to take almost complete control
of your computer without your knowledge. Using a backdoor program, hackers can
access and delete all the files on your computer, send e-mail, run programs, and do just
about anything else you can do with your computer. A computer that a hacker controls
in this manner is referred to as a zombie. Zombies are often used to launch denial-of-
service attacks on other computers.

( Evans. Alan, et al. (2012) Complete Technology in Action. Pearson Education, Inc., U.S.A, 8th ed.)

After you Read

True or False?
Read the sentences and mark T or F.
1. In the U. S. if you access to a computer system without official .................
permission, you would be counted as a criminal.
2. Hackers don’t always destroy PCs. .................
3. At the time you are online, it is not possible for the hackers to sniff .................
your credit card and bank account information which is on your hard
drive of your computer.
4. The packet sniffer is a key factor in hacking computer users’ PCs. .................
5. In order to commit widespread computer attacks, hackers don’t need .................
to control many computers at the same time.

Unit 18 Computer Threat: Hackers of View 130


Activity
Consider the information in the reading passage. Work with a partner to answer the
questions below.

1. Are there different kinds of hackers? What do they do?


2. Why would a hacker be interested in breaking into home computers?
3. Could a hacker steal our credit card number?
4. What’s a packet sniffer?
5. What do hackers do with the information they “sniff”?
6. Besides stealing information, what other problems can hackers cause if they break
into my computer?
7. What damage can Trojan horses do?

Grammar - Writing

Can + main verb (To express ability & possibility)


To express ability: To express possibility:
Example: Example:
You can easily protect yourself from If hackers can gather information about
packet sniffing by installing a firewall in your credit card, they may be able to
your PC. commit identity theft.

Activity
Read the passage again to find out more examples of can expressing ability or possibility.

Can (ability):
1. ……………………………………………………………………………………………………………………………………
…………………………………………………………................................................................................
2. ………………………………………………………………………………………………………………………………….
…………………………………………………………................................................................................
Can (possibility):
1. ……………………………………………………………………………………………………………………………………
…………………………………………………………................................................................................
2. ………………………………………………………………………………………………………………………………….
…………………………………………………………….............................................................................

Activity
Note whether CAN, in the following sentences, expresses the ability or possibility.

1. The hackers who can destroy your system are called black – hat hackers. (ability)
2. Your computer data can be stolen by hackers while being online.
3. The government can imprison the hackers because unlawful use of others systems is a crime.
4. You can draw pictures by your computer.

Unit 18 Computer Threat: Hackers of View 131


Discussion & Writing

Activity
Role play: Suppose your partner is a professional hacker. Ask him or her which type of
hacker (White – hat or Black – hat) he or she is. Then ask about his or her activities,
interests and so on.

Activity
Now, come in front of the class and perform your interview.

Activity
Homework: What do you think about Hackers? Write a short paragraph about hackers
according to your own opinions.

Unit 18 Computer Threat: Hackers of View 132


19 Logical Ports and Firewalls

Introduction to the Lesson

Discuss the following questions with your classmates.

1. What do the pictures show?


2. Do you have any information about logical ports?
3. Do you know what firewalls are?

Unit 19 Logical Ports and Firewalls 133


Vocabulary

Activity
In the chart below, the words’ English synonyms or definitions are given; write their
meanings in your native language.

No. Words English Synonyms / definitions NL Meaning


1 Theft Robbery
2 To deter To prevent
3 To hook up To connect to a central system
4 Wide open Open fully
5 To poke around To look for something
6 Obviously Clearly
Almost or very nearly the thing described,
7 Virtual so that any slight difference is not
important.
Refers to things that can be touched or
8 Physical seen, especially with regard to their size or
shape.
9 Gateway An entrance where there is a gate.
10 To designate Choose
11 Protocol Standard
If you assign a task or function to someone,
12 To assign
you give it to them.
One who enters by force or without
13 Intruder
invitation; invader
14 To thwart To prevent
15 Invader Intruder
16 Invisible Impossible to see
17 Construction Act of building
A hazard is something which could be
18 Hazard
dangerous to you.
19 Entire Whole
20 Neighborhood Local area
Something that is flammable catches fire
21 Flammable
easily
22 Sufficient Enough, adequate
23 Maximum Most, highest
24 Protection Safety
Unit 19 Logical Ports and Firewalls 134
25 Suite Group of things that together form a set
26 To alert To warn, to alarm
To deactivate a hardware or software
27 To disable
operation
28 To freeze up To shut down, to stop working
29 To accompany To go together with; to join
30 To assist To help

Activity
Write meaningful English sentences with the words from the box.

accompany hook up invisible theft maximum

1. ……………………………………………………………………………………………........................................
2. ……………………………………………………………………………………………........................................
3. ……………………………………………………………………………………………........................................
4. ……………………………………………………………………………………………........................................
5. ……………………………………………………………………………………………........................................

Listening

Activity
Dictation: Listen to the recording carefully and write every word you hear. Don’t add
something of your own!

HTTP

Activity
Exchange your books with your partners. Listen again and try to make corrections on
your partner’s books.

Unit 19 Logical Ports and Firewalls 135


After you Read

Scanning
Scan the passage and then fill in the blanks.

1. Hackers can access to computers in two ways: ………….. and …………….


2. There are two types of firewalls: …………….. and ……………………. .
3. The logical ports of a computer are compared to the ………….and ……...... of a house.
4. SMTP stands for ……………………………………………………….. .

Reading Passage

Logical Ports and Firewalls


Hackers can gain access to computers directly or indirectly. Direct access involves
sitting down at a computer and installing hacking software. The most likely method
a hacker will use to access a computer is to enter indirectly through its Internet
connection. When connected to the Internet, your computer is potentially open to
attack by hackers. Many people forget that their Internet connection is a two-way
street. Not only can you access the Internet but also people on the Internet can access
your computer. Think of the computer as a house. Common sense tells you to lock your
doors and windows to deter theft when you aren’t home. Hooking your computer up
to the Internet is like leaving the front door to your house wide open. Anyone passing
by can access your computer and poke around for valuables. Your computer obviously
doesn’t have doors and windows like a house, but it does have logical ports.

Logical Ports
Logical ports are virtual—that is, not physical— communications gateways or
paths that allow a computer to organize requests for information (such as Web
page downloads or e-mail routing) from other networks or computers. Unlike
physical ports (USB, FireWire, and so on), you can’t see or touch a logical port; it is
part of a computer’s internal organization.

Logical ports are numbered and assigned to specific services. For instance,
logical port 80 is designated for hypertext transfer protocol (HTTP), the main
communications protocol (or standard) for the World Wide Web. Thus, all requests
for information from your browser to the Web flow through logical port 80. E-mail
messages sent by simple mail transfer protocol (SMTP), the protocol used for
sending e-mail on the Internet, are routed through logical port 25. Open logical
ports, like open windows in a home, invite intruders, as illustrated in Figure on the
front page of this chapter. Unless you take precautions to restrict access to your
logical ports, other people on the Internet may be able to access your computer
through them. Fortunately, you can thwart most hacking problems by installing a
firewall.

Unit 19 Logical Ports and Firewalls 136


Firewalls
A firewall is a program or hardware device designed to protect computers from
hackers. A firewall specifically designed for home networks is called a personal
firewall. Personal firewalls are made to be easy to install. By using a personal
firewall, you can close open logical ports to invaders and potentially make your
computer invisible to other computers on the Internet.

Firewalls are named after a housing construction feature. When houses were
first being packed densely into cities, they were attached to each other with
common walls. Fire was a huge hazard because wood burns readily. An entire
neighborhood could be lost in a single fire. Thus, builders started building common
walls of nonflammable or slow-burning material to stop, or at least slow, the spread
of fire. These came to be known as firewalls.

Types of Firewalls
As noted earlier, firewalls can be configured using either software or hardware
devices. Although installing either a software or a hardware firewall on your home
network is probably sufficient, you should consider installing both for maximum
protection.

1. Software Firewalls
Most current operating systems include reliable firewalls. Many security suites
such as Norton Internet Security, McAfee Internet Security, and Zone Alarm
Internet Security Suite also include firewall software. Although the firewalls that
come with Windows 7 and OS X will protect your computer, firewalls included in
security suites often come with additional features such as monitoring systems that
alert you if your computer is under attack.

If you are using a security suite (say, for virus protection and parental controls)
that includes a firewall, you should disable the firewall that came with your
operating system. Two firewalls running at the same time can conflict with each
other and can cause your computer to slow down or freeze up.

2. Hardware Firewalls
You can also buy and configure hardware firewall devices. Many routers sold
for home networks include firewall protection. Just like software firewalls, the
setup for hardware firewalls is designed for novices, and the default configuration
on most routers keeps unused logical ports closed. Documentation accompanying
routers can assist users with more experience in adjusting the settings to allow
access to specific ports if needed.

(Evans. Alan, et al. (2012) Complete Technology in Action. Pearson Education, Inc., U.S.A, 8th ed.)

Unit 19 Logical Ports and Firewalls 137


After you Read

True or False?
Read the sentences and mark T or F.
1. According to this article, the Logical ports not only allow a computer .................
to organize other network or computers’ requests, but also invite the
hackers to attack on PCs.
2. You can close the open Logical ports in order to get rid of hackers .................
and other invaders to your PCs by installing personal firewalls.
3. If you install only the software firewall, not the hardware firewalls as .................
well, on your personal computer, your computer won’t be protected.
4. If you run two software firewalls at the same time, your computer .................
will be more protected.

Activity
For each item below, circle the best answer(s).

1. The E- mail messages which are sent by SMTP are routed through …………………..
a. Logical Ports 80
b. Logical Ports 25
c. Hypertext Transfer Protocol
d. None of the above

2. The main communication protocol for the World Wide Web is ………………………
a. Logical Ports 80
b. Logical Ports 25
c. Hypertext Transfer Protocol
d. All the above

3. If you have the operating system firewall software as well as the security suite
firewall software, you are recommended to …………………………
a. disable the security suit firewall
b. disable the operating system firewall
c. enable both of them at the same time
d. use none of them
Grammar - Writing
Gerund used as subject & object
A gerund is the –ing form of a verb when it is used as a noun. It can be used
both as subjects and objects.
Gerund used as subject: Gerund used as object:
Example: Example:
Hacking other computers is his habit. He enjoys hacking other computers.
Unit 19 Logical Ports and Firewalls 138
Activity
Use the following gerunds as subjects and as objects into proper sentences.

Configuring installing typing playing downloading

As subjects:
1. ………………………………………………………………………………………….....................................……
2. ………………………………………………………………………………………….....................................……
3. ………………………………………………………………………………………….....................................……
4. ………………………………………………………………………………………….....................................……
5. ………………………………………………………………………………………….....................................……

As objects:
1. ………………………………………………………………………………………….....................................……
2. ………………………………………………………………………………………….....................................……
3. ………………………………………………………………………………………….....................................……
4. ………………………………………………………………………………………….....................................……
5. ………………………………………………………………………………………….....................................……

Activity
Reread the reading passage to look for gerund. Write them in the blanks (at least 4
examples) and state whether they are used as subjects or objects.

1. ………………………………………………………………………………………….....................................……
2. ………………………………………………………………………………………….....................................……
3. ………………………………………………………………………………………….....................................……
4. ………………………………………………………………………………………….....................................……

Discussion & Writing

Activity
Group Work: Among your group members, try to find the students whose computers
have been recently hacked. Ask them questions such as the following questions:
1. Has your computer been ever hacked?
2. How did you understand that problem?
3. How your PC’s data or information was affected?
4. What did you do then?
5. Have you ever installed a firewall software or hardware on your personal computer?
6. ………………………………………………………………………………………….....................................……
7. ………………………………………………………………………………………….....................................……
8. ………………………………………………………………………………………….....................................……
9. ………………………………………………………………………………………….....................................……
10. ………………………………………………………………………………………….....................................…
Unit 19 Logical Ports and Firewalls 139
Activity
Homework: Write a short paragraph about the following topic.

How to Protect your Computer from Hackers

Unit 19 Logical Ports and Firewalls 140


20 Password Protection and
Password Management

Introduction to the Lesson

Discuss the following questions with your classmates.

1. Why do you use passwords for your computers?


2. How many characters do you usually use for your computers and E – mail account's
passwords?
3. What makes your systems secured?

Unit 20 Password Protection and Password Management 141


Vocabulary

Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language.

No. Words English Synonyms / definitions NL Meaning


1 To restrict To limit
2 Doubt Lack of certainty
3 Essential Necessary, needed
4 Individual Particular person
5 To overlook To ignore
Breaking the computer password through
6 Crack
illegal methods
7 Sophisticated Complicated
8 Combination Combination
9 Per For each
10 Deduced Easy to be understood
To link a specific file type to a specific
11 To associate
application
12 To discover To find
13 Strength Quality of being strong
14 Frequently Often
15 Maintain Keep in existence
16 To conduct To organize
Activity
Write meaningful English sentences with the words from the chart below.

Strength maintain crack combination essential

1. …………………………………………………………………………………………….......................................
2. …………………………………………………………………………………………….......................................
3. …………………………………………………………………………………………….......................................
4. …………………………………………………………………………………………….......................................
5. …………………………………………………………………………………………….......................................
Listening

Activity
Listen to the recording twice and then write the summary of what you heard using your
own words.
Unit 20 Password Protection and Password Management 142
Can I use a password to restrict access to my computer?

Activity
Exchange your papers with your partners. Listen again and try to make corrections on
your partner’s papers.

Before you Read

Scanning
Scan the passage and then full in the blanks.

1. It is the ……………….. passwords that prevent hackers to inter into our computers.
2. A strong pass word should be ……………………………………………………...... .
3. Most current Internet security suites and Web browsers make it easy to keep track of
passwords by providing ……………………………………………………………… .

Reading

Password Protection and Password Management


Passwords, used in conjunction with login IDs, are the major way we restrict
access to computers, networks, and online accounts. You no doubt have many
passwords that you need to remember to access your digital life. However, creating
strong passwords— ones that are difficult for hackers to guess— is an essential
piece of security that individuals sometimes overlook. Password cracking programs
have become more sophisticated lately. In fact, some commonly available programs,
such as John the Ripper, can test more than 1 million password combinations per
second! Creating a secure password is therefore more important than ever.

Many people use extremely weak pass- words. The Imperva Application Defense
Center (a computer security research organization) conducted a review of 32 million
passwords that were used at the Web site rockyou.com. More than 345,000 people were
using “12345,” “123456,” or “123456789” as their password. And almost 62,000 people
were using “password”! Passwords such as these are extremely easy for hackers to crack.

Creating strong Passwords


Strong passwords are difficult for someone to guess. They should not contain
Unit 20 Password Protection and Password Management 143
easily deduced components related to your life such as parts of your name, your
pet’s name, your street address, or your telephone number. To create strong
passwords, follow the basic guidelines shown here:

• Your password should contain at least 14 characters and include numbers,


symbols, and upper- and lowercase letters.
• Your password should not be a single word or any word found in the
dictionary and should not be easily associated with you (such as your birth date,
the name of your pet, or your nickname).
• Use a different password for each system or Web site you need to access.
This prevents access to other accounts you maintain if one of your passwords is
discovered.
• Never tell anyone your password or write it down in a place where others
might see it.
• Change your password on a regular basis (say, every month) and change it
sooner if you think someone may know it.

You can use online password strength testers, such as The Password Meter
(passwordmeter.com) or Microsoft’s test (microsoft.com/protect/ yourself/
password/checker. mspx), to evaluate your passwords. The Password Meter
provides guidelines for good passwords and shows you how integrating various
elements (such as symbols) affects the strength score for your password.

You should also not use the same password for every account that you have.
Because remembering constantly changing strong passwords for numerous
accounts can be a challenge, you should use password- management tools to make
the process easier to handle. If you have trouble thinking of secure pass- words,
there are many password generators available for free, such as Perfect Passwords
(grc.com/passwords.htm) and the Bytes Interactive Password Generator
(goodpassword.com).

Managing Your Passwords


Good security practices suggest that you have different passwords for different
Web sites that you access and that you change your passwords frequently. The
problem with well-constructed passwords is that they can be hard to remember.
Fortunately, password-management tools are now widely available. This takes the
worry out of forgetting passwords because the password-management soft- ware
does the remembering for you.

Password Management Software


Most current Internet security suites and Web browsers make it easy to keep
track of passwords by providing password-management tools. For example, to set
up the password manager in Firefox, from the Tools menu, select Options, and then
click the Security icon. In the Pass- words section, check Remember passwords for
Unit 20 Password Protection and Password Management 144
sites to have Firefox remember passwords when you log onto Web sites. Check Use
a master password, which causes a dialog box to appear, and enter a well- designed,
secure password. The next time you go to a Web site that requires a login, Firefox
will display a dialog box prompting you to have Firefox remember the login name
and password for this site. Then, when you return to the site and select a login
option, enter the master password and the Firefox Password Manager will fill in the
login and password information for you. You also can see a list of sites maintained
by the Firefox Password Manager by clicking the Show Passwords button, which
displays the Saved Passwords dialog box. Passwords for each site are displayed
after you click the Show Passwords button and enter the master password.

Even though you only need to remember the master password, you still need
to make sure that it is a secure password (according to the rules we discussed
earlier) and that you change it on a regular basis. Password managers are useful
on the machine that you use on a regular basis. However, if you need to access
your accounts from another computer (such as one at university), you will still
need to know the individual pass- words for each site you wish to access. So start
using secure passwords and let your browser (on your main computer) relieve
you of the problem of trying to remember them all.

( Evans. Alan, et al. (2012) Complete Technology in Action. Pearson Education, Inc., U.S.A, 8th ed.)

After you Read

True or False?
Read the sentences and mark T or F.
1. Sometimes, passwords are the major way to restrict access to E- mail .................
addresses.
2. Passwords like 123456 or 1234567 are less distinguishable by .................
hackers.
3. A strong password is consisting of a number, a symbol, some upper .................
and lowercase letters associated with your birthdate.
4. There are some websites that help you create strong and secure .................
passwords or evaluate the strength of your passwords.
5. If you use password management for remembering your passwords,
you will no longer need to be worried of forgetting different and .................
difficult passwords.
Activity
Consider the information given in the above article then discuss the following questions
with your partner.

1. Why do we need to create secure passwords?


2. What constitute a strong password?
3. How can we check the strength of our passwords?
Unit 20 Password Protection and Password Management 145
Grammar - Writing

That clause:
Clause Definition: A group of words that forms part of a sentence and has its
own subject and verb.
Example: Main clause: Password managers are
Password managers are useful on the useful on the machine. (complete
machine that you use on a regular thought)
basis. Dependent Clause: that you use on a
regular basis (incomplete thought)
Activity
Reread the reading passage and find at least 5 sentences that include a clause and then
underline the clauses.

1. ..................................................................................................................................... .
2. ..................................................................................................................................... .
3. ..................................................................................................................................... .
4. ..................................................................................................................................... .
5. ..................................................................................................................................... .

Activity
Complete the three following sentences with your own information and add two more
sentences containing that clause.

1. Internet is the rich source of information that ...............................................................


……………………………….......................................................................................................... .
2. The sound card converts the electrical signals into digital data ………………………............
…………………………………………………………………………………………............................................. .
3. Java TV is a Java ME-based technology that…………………………………………...................... .
4. ………………………………………………………………………………………….......................................... .
5. ………………………………………………………………………………………….......................................... .

Discussion & Writing

Activity
Pair Work: Make a conversation with your partner about how you create your own
computer and e- mails’ passwords and provide them security?

Unit 20 Password Protection and Password Management 146


Example:

Student A: From the time my computer password was cracked, I am very careful and
use password for my computer. What about you?
Student B: To tell you the truth, I used to ignore this fact that our computer and private
accounts would be in danger. Because of this ignorance my e – mail….

Activity
Homework: Write a short paragraph about the following topic.

The Advantages of Creating a Password

Unit 20 Password Protection and Password Management 147


Bibliography

1. Ay, Osman. Muammer ÖKSÜZ Osman BOZDAÐ (2003). Introduction to Computers.


Istanbul- Turkey: Zambak Typesetting & Design.p. 6+ .

2. Clarke. Glen E., (2009) Comp TIA Network + : Mc Graw- Hill Companies, United
States. p. 4

3. Deitel, P. J., Deitle, H. M. (2011). JAVA: How to Program. Pearson Higher Education.
Upper Saddle River, New Jersey. p. 34- 35.

4. Erickson. Jon. (2008). Hacking: The Art of Exploitation. USA. p. 6-7.

5. Evans. Alan, et al. (2012) Complete Technology in Action. Pearson Education, Inc.,
U.S.A, 8th ed. P. 94-95+.

6. http://onlamp.com/onlamp/2005/09/15/what-is-opensource.html. (Woods. Don,


Gautam Guliani. (2005) Open Source for the Enterpise, O’Reilly Media July (2005). Web.
Oct. 28, 2012.

7. Liang, Y. Daniel. (2011). Introduction to Java Programming. New Jersey. p. 2+.

8. Ludwig. Mark A. (1996) The Black Book of Computer Viruses. Types of Computer
Viruses. American Eagle Publication, Inc. Show Low, Arizona (1996).

9. Sharma Neeraj ,etal. (2010). Database Fundamentals. Canada. IBM Corporation. p.


23-24

10. Silber. Schatz, Peter Bare Galvin and Greg Galvin and Greg Gagne. (2005) Operating
System Concept. USA. John Wiley and sons, Inc. p. 3-5.

11. Smith, Roderick W. (2004) Linux +. Workstations. SYBEX Inc. 1151 Marina Villiage.

148
List of images in the book

The numbers correspond with the unit number in the book.

1. basic.mindteq.com

2. Clarke. Glen E., (2009) Comp TIA Network + : Mc Graw- Hill Companies, United States
1. designyoutrust.com

2. Evans. Alan, et al. (2012) Complete Technology in Action. Pearson Education, Inc.,
U.S.A, 8th ed. P. 94-95+.

3. hautesecure.com

4. Liang, Y. Daniel. (2011). Introduction to Java Programming. New Jersey. p. 2+.

5. Maindoard (VIA 307 – 1.5 Ghz)

6. maxupdates.tv

7. http://www.fotosearch.com k5540067

8. http://www.fotosearch.com k6042481

9. http://www.fotosearch.com k 9669827

10. http://www.shutterstock.com 78037216

11. http://www.shutterstock.com 96874048

12. http://www.novapdf.com/uploads/novapdf_en/media_

13. http://technorati.com/technology/article/viruses-are-rampant-in-hospitals/
14. http://www.flickr.com

15. https://599cd.com

16. http://www. decadeofwebdesign.org

17. http://xda-developers.com

18. http://technicalhut.blogspot.com

Cover Image: http://www.naukawpolsce.pap.pl/Data/Thumbs/_plugins/


information/393325/MTAyNHg3Njg,12833350_12722556.jpg

149

You might also like