English For Students of Computer Sciecne
English For Students of Computer Sciecne
Computer Science 1
Parigul Nabizadah
Editors:
Herat 2013
Project made possible by a grant from the United States Embassy Kabul
Herat University Press
Project made possible by a grant from the United States Embassy Kabul
All rights reserved. No part of this book may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, electronic, mechanical,
photocopy, recording, or otherwise, without prior permission of the publisher.
For more information about the book send your inquiries to:
heratespproject@gmail.com
Preface
The Herat English for Specific Purposes (ESP) textbooks are the first series of ESP
textbooks produced for Afghan university students in Afghanistan. The Herat ESP
Project was initiated in 2012 by a request of Herat University Chancellor Mir Ghulam
Osman Barez Hosseini to the Public Affairs Section of the United States Consulate
in Herat. The first ESP textbooks were completed and published under the leadership
of Chancellor Dr. Abdul Zahir Mohtasebzadeh. English language instructors in two
departments of Herat University - the English Language and Literature Department and
the English Language and Computer Learning Center produced the textbooks under the
guidance of Senior English Language Specialist Dr. Suzanne M. Griffin, ESP Editor
Mr. Toufiq Sarwarzada and English Language Fellow Lisa Roegner.
The project was initiated because Herat University English instructors and their
students had discovered that commercially available ESP textbooks were inadequate to
the needs of Afghan students in specific departments of the university. English instructors
began developing their skills as ESP materials writers in spring 2012, through a series of
workshops and individual mentoring sessions that focused on developing lesson plans
with sufficient detail to guide the classroom lessons for future ESP instructors. The goal
of their work was to help Herat University undergraduate students successfully read
the textbooks, journal articles and online resources written in English in nine discipline
areas: Computer Science, Economics, Engineering, Humanities, Journalism, Medicine,
Public Administration, Sciences and Sociology.
In autumn 2012 ten instructors combined their efforts and worked in teams to
develop their lessons into textbook materials while four instructors continued to
develop textbook materials individually. The instructors’ work was guided by a
leadership team that consisted of the department heads of the English Language and
Literature Department and the English Language Center, as well as the ESP Section
head and the ESP textbook editor in the English Language and Literature Department
and led by the American English Language Specialist. The English Department Head
of Herat Education University actively participated in the workshops and later joined
the leadership team. The project goal is to produce four books in each discipline area
by 2014.
The spring and autumn activities--workshops, consultant contracts for the English
Language Specialist and printing of the first textbooks--were supported by two grants
from English Language Programs Office in the Public Affairs Section of the United
States Embassy, Kabul. The second grant was administered by the United States
Consulate in Herat.
Dr. Suzanne Griffin
ACKNOWLEDGEMENTS
Special thanks are due to the following persons for support of the Herat University ESP
Project:
Chancellor Mir Ghulam Osman Barez Hosseini, Herat University (2009- Oct. 2012)
Chancellor Dr. Abdul Zahir Mohtasebzadeh (Oct. 2012- )
Stephen Hanchey, English Language Programs (ELP) Officer, Public Affairs Section
(PAS) United States (US) Embassy, Kabul
Professor M. Hanif Hamid - ELP Office, PAS, US Embassy Kabul
Mr. Bradford Hanson, US Consul, Herat (2011- Oct. 2012)
Ms. Lisa Roegner, English Language Fellow at Herat University and Herat Education
University - ESP Textbook Editor
Dr. Suzanne Griffin, Project Director, Senior English Language Specialist Consultant to
US Embassy, Kabul
Unit 5. Workstations 32
Unit 6. Servers 38
Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language:
No. Words English Synonyms / definitions NL Meaning
1 Electronic Pertaining to electronics
Man-made device of interconnected parts
2 Machine
that work together to perform a task
3 Mathematical Concerning mathematics, arithmetical
4 Calculation Computation , estimate
5 Logical Based on logic, simulated
6 Quickly Fast
7 Comparison Similarity, likeness
8 Mistake an error
9 Result Outcome
10 To store To supply, to stock
11 Forever Always
12 To reason To think, to consider logically
13 Consist Be made of
14 Between Among
15 To perform to, to act
16 Operation Act of operating; working, performance
17 Relation Connection
18 Physical Bodily
19 Spirit Soul
20 Permanent Lasting, enduring
21 Temporary Impermanent, passing
22 Storage Memory (computer)
24 Last End, persist
25 Long Extended, far reaching
26 To switch on To turn on
27 To switch off To turn off
28 Special Important
29 To operate To act, function
30 Central Main, principal
31 Brain Mind
Listening
Activity
Listen to the recording twice and then write about a computer mouse in your own words.
Computer Mouse
Activity
Exchange your books with your partners. Listen again and try to make corrections on
your partner’s answers.
Reading
The computer gets data from an input device such as a keyboard, mouse, hard
disk, or scanner, and makes all the calculations and the comparisons in the central
processing unit (CPU). The CPU is like the computer’s brain. It uses the RAM to
maintain the data. When the CPU has processed the data, it sends the results to an
output device such as a monitor, hard disk, or printer. When you switch a computer
off, the computer copies any important data in the RAM back to permanent storage.
The users can access the saved data forever. For these reasons, computers have
become a part of our lives.
Copyright (Ay, Osman. And et.al. (2003). Introduction to Computers. Istanbul – Turkey: Zambak Typesetting & Design.)
Activity
Make meaningful English sentences using the following words.
1. ……………………………………………………………………………………………….....................................
2. ……………………………………………………………………………………………….....................................
3. ……………………………………………………………………………………………….....................................
4. ……………………………………………………………………………………………….....................................
5. ……………………………………………………………………………………………….....................................
Activity
Write the definitions of the following computer terms based on the reading passage.
1. A computer is a ……………………………………………………………………………..............................
2. A memory is ………………………………………………………………………………................................
3. Operating system is …………………………………………………………………………..........................
Activity
True or False? Read the sentences and mark T or F.
1. We cannot store the data permanently in our computer. .................
2. Any mathematical calculation can be done by computer. .................
3. There is no difference between the hardware and software of .................
computer.
4. This passage mostly focuses on storing data by a computer. .................
5. The brain of a human being helps him to think and similarly the CPU .................
of a computer helps it to process.
6. The output devices are helpful for inserting data in a computer. .................
7. RAM can process the data and send them to output devices to perform .................
the action.
8. With the help of permanent storage you can see your saved .................
information any time you want.
Activity
Consider the information in the reading passage. Then work with a partner to answer
the questions below.
Reading skill
Scanning
When you need to find specific information in a text, you don’t need to read
every word. Instead, you can move your eyes quickly over the text to find the
information. This is called scanning.
Activity
Read the questions below. Then scan (don’t read) the following paragraph to find the
answers.
TV Card
TV cards usually have two functions, TV decoding and TV tuning. The TV decoder
transfers the picture that is on the screen to a TV. This is sometimes useful for business
presentations. The TV tuner allows you to watch TV channels on the monitor so that
your monitor becomes like a TV.
Grammar - Writing
Pronoun +Be + Noun Pronouns
Singular Plural I Forms of be
Pronoun + Be + Noun Pronoun + Be + Noun You am
I am a student We are students He is
You are a student You are students She are
She is a student They are students It
He is a student We
It is a country They
Activity
Complete each sentence by circling a word in parentheses.
1. That keyboard is so interesting, but ….. (He, she, it) is very old.
2. You …. (is, are) so careful about playing games by computer.
3. My laptop (is, are) the best one among all in the world!
4. Software and hardware ………(is, are) very important for computers.
5. I ……(are, am, is) a computer specialist.
Activity
Make five sentences using subjective pronouns with be + nouns.
1. ……………………………………………………………………………………... .
2. ……………………………………………………..……………………………… .
3. ……………………………………………………..……………………………… .
4. ………………………………………………………..…………………………… .
5. ………………………………………………………….………………………… .
Unit 1 What are computers and how they work? 11
Discussion and Writing
Activity
Pair Work: List three examples for hardware and three examples for software.
Software Hardware
Example: Windows XP Example: keyboard
1. 1.
2. 2.
3. 3.
Activity
Group Work: Read the examples of hardware and software aloud in the class and
then share your information about them.
Activity
Homework: Choose one of the examples of hardware/software (talked in the
class), search the internet for the information about software or hardware and
then write about the information.
Activity
Three of the words in each group are synonyms. Cross out the word that has an
opposite meaning (antonym).
Activity
Based on exercise 1, write the synonyms and antonyms of the given words in the chart
below.
Activity
Match the meaning of words in column A with the words in column B:
A B
1. Incredibly common
2. Forecast inquiry
3. Military unbelievably
4. research army
5. weather predict
6. usual medium
7. capacity company
8. insurance climate
9. organization guarantee
10. mid – sized function
Unit 2 Types of Computers 14
Listening
Dictation
Listen to the recording carefully and write every word you hear. Don’t add something
of your own!
Palmtop computers
Activity
Listen again and correct your mistakes.
Activity
Exchange your books with your partners. Listen again and correct your partner’s
mistakes.
After you Read
Scanning
Scan the passage and complete the information below.
Reading
Types of Computer
Mainframe Computers
A mainframe computer is a big, powerful, and expensive computer. Many people
can use the power of a mainframe computer at the same time, using either a PC
(personal computer) or a ‘dumb terminal’. A PC performs a lot of processing itself.
A dumb terminal uses the mainframe computer to do all the processing, and just
Unit 2 Types of Computers 15
shows the results on a screen. Large organizations, for example banks and insurance
companies, use mainframe computers.
Minicomputers
Like mainframe computers, minicomputers are very powerful and expensive.
Mainframes and minicomputers are used for almost the same things. Mid-sized
companies use minicomputers.
Supercomputers
A supercomputer is an incredibly powerful computer with a very big capacity for
processing data. Supercomputers are often used by the military. They are also used
for research and for things such as weather forecasting, where a huge amount of data
has to be processed rapidly.
Microcomputers
Microcomputers are usually used by one person at a time. An IBM PC and Apple
Macintosh are two kinds of microcomputer. There are desktop, laptop, palmtop,
pocket, and tablet models of microcomputers.
(Ay, Osman. And et.al. (2003). Introduction to Computers. Istanbul – Turkey: Zambak Typesetting & Design.)
True or False?
Read the sentences and mark T or F.
1. A dumb terminal never uses the mainframe computer to do all the processing. .................
2. Microcomputers are usually used by many people at a time.
3. A supercomputer is an incredibly powerful computer often used by .................
the military. .................
4. Mainframe computers are mostly used by large organizations such
as banks, insurance companies, etc. .................
Activity
For each item below, circle the best answer(s).
Grammar - Writing
Activity
Put the following words in correct order to make meaningful sentences.
Activity
Make sentences with the adjectives given:
1. ……………………………………………………………………………………...............................................
2. ……………………………………………………………………………………...............................................
3. ……………………………………………………………………………………...............................................
4. ……………………………………………………………………………………...............................................
5. ……………………………………………………………………………………...............................................
Activity
Pair Work. Discuss with your partner about four types of computers that you read
about in the text. Try to list the similarities and differences among them.
Example:
Student A: Is there any similarity between mainframe and super computers?
Student B: Of course, both are powerful with big capacity.
Activity
Homework: Compare the minicomputer with the microcomputer in a few sentences by
writing their similarities and differences.
Activity
In the chart below, English synonyms or definitions are given, write their meanings in
your native language.
No. Words English Synonyms / definitions NL Meaning
To recover, to find information and display it as
1 To retrieve
output
2 Instruction Direction, guideline
3 To execute To perform, run a computer program
4 Component Parts
5 To control To rule, to command
6 To coordinate To arrange in proper order
7 Action Perform
8 Numeric Consisting of numbers
9 Addition Adding
10 Subtraction Deduction
Process of calculating the result of one number
11 Multiplication
multiplied by another.
12 Division Act of separating into parts
13 Internal Interior,
14 To emit To send out
15 Pulse Beat
16 Constant Continuous, steadfast
17 Synchronize Operate simultaneously;
18 Pace Speed of progress
19 Speed Quickness; velocity
20 To execute To perform, to run a computer program
21 measurement calculation of size or extent
22 Equal same, identical
23 Continuously ceaseless
24 manufacturer owner of a manufactory
Activity
Make grammatically correct sentences with the words from the box below.
1. .....................................................................................................................................
Unit 3 Central Processing Unit 20
2. .....................................................................................................................................
3. .....................................................................................................................................
4. .....................................................................................................................................
5. .....................................................................................................................................
Listening
Activity
Listen to the recording carefully and fill in the blanks from the words below:
Activity
Exchange your books with your classmates. Listen again and correct your classmates’
mistakes.
Scanning
The main CPU manufacturers today are Intel (8086, 80486, Pentium, Pentium
Pro, Pentium-II, Pentium-III, and Pentium-IV processors). MHz).
True or False?
Read the sentences and mark T or F.
Reading Skill
Asking yourself questions while you read
As you read it helps to stop and ask yourself questions to check your
comprehension.
Example questions:
• Do I understand this?
• Do I know what this word or technical term mean?
• What information do I remember?
• Do I need to read this again?
Activity
Read the Second paragraph of the passage and answer the following questions.
Grammar - Writing
Activity
Change the following statements in questions and then into negative forms:
Activity
Group Work. Make groups of four students. Ask and answer the questions below.
Activity
Homework:
Based on the information you exchanged in the class about CD and DVD, write brief
information about any of them. Try to use your own words!
Activity
In the chart below, the words’ English synonyms or definitions are given; write their meanings
in your native language.
No. Words English Synonyms / definitions NL Meaning
1 Cable Thick rope of steel or other metal
2 Inside Within; in
3 To connect
To join, to link
4 To situate
To locate
5 To attachTo fasten
6 Via By way of, by means of
7 Directly Clearly
8 Nowadays In these times
9 To contain
To include
10 To allow To let
11 Socket Hollow part, cavity
12 To extendTo stretch, to enlarge
13 Feature Characteristic, quality
14 Capability
Ability, skill
15 To hold Contain; keep
16 To locatePlace, situate
17 Potable Movable
18 Commonly Usually
19 To enableTo make capable
20 Password Code word
21 Error Mistake
Sound which the computer makes in order to
22 Waning beep
attract the user's attention
24 Plug Electrical connector
25 device Hardware component which can send or receive data
Activity
Fill in the blanks using the words given.
1. If your computer show an……………. while opening a file, it means something is wrong with it.
2. Installing antivirus software …………………the computers to be protected.
Unit 4 What is a Mainboard? 26
3. A network interface card allows computers to communicate with each other through
………………. .
4. Before switching your computer on, you should …………. it to the electricity.
5. A printer is a ………………….by which you can print as much as data you want.
Listening
Activity
Listen to the people talking about Video Card, Sound Card and Network Interface Cards
and fill the blanks.
1. A ……………… card converts digital sound signals to analog sound signals and sends
them to the ………………. so that you can hear sounds.
2. A …………..… card converts the digital signals in a computer to a special format that
can be displayed on a …………………. .
3. A ……………………….card allows computers to communicate with each other through
………………………… .
Activity
Listen again and write the answers the questions.
Activity
Exchange your books with your partners. Listen again and try to make correction on
your partner’s answers.
Scan the reading passage and then answer the following questions.
Mainboard
The main board (also called the mother board, or system board) is the
biggest board inside your system unit. All the main components of your
computer connect to the mainboard. The CPU is normally situated on your
mainboard along with all the other electronic components. All the other
boards (cards) in your computer connect to the mainboard. Other items, such
as the hard disk, are attached to the mainboard either directly or via cables.
Mainboards are getting smaller and smaller as the components become more
integrated. Nowadays, if you open up a system unit it can look quite empty.
Buses are data paths on the motherboard that connect the CPU to the
different parts of the mother board, such as the chips and cable connections.
Expansion slots are sockets on the mainboard which allow you to extend the
computer’s features and capabilities.
Expansion slots hold expansion cards (such as a video card, sound card,
or network card) and connect them to the buses. Laptops and other portable
computers use special expansion slots called PCMCIA slots, which accept small
expansion cards called PC Cards.
Serial ports are sockets located at the back of your computer that allow you
to connect items such as modems to the computer. Serial ports are commonly
labeled COM1 or COM2.
Parallel ports are sockets located at the back of your computer that enable
you to connect items such as printers to the computer. Parallel ports are
commonly labeled LPT1 or LPT2.
PS/2 keyboard and mouse ports are used to connect a keyboard and mouse to the
mainboard. A battery on the mainboard is needed to store some important information (such
as the date and time, and maybe a user password) while your computer is switched off.
(Ay, Osman. And et.al. (2003). Introduction to Computers. Istanbul – Turkey: Zambak Typesetting & Design.)
True or False?
Read the sentences and mark T or F.
1. A few of the main components of your computer connect to the .................
mainboard
2. ROM - BIOS copies your operating system into RAM when you .................
switch on your computer.
3. Serial ports are sockets located in front of your computer that .................
allow you to connect items such as printers, scanners to the
computer. .................
4. The USB stands for( Universal Silver Business).
5. An internal speaker connected to the mainboard helps you hear .................
music sounds while playing a video file.
Activity
Consider the information in the reading passage. Work with a partner to answer the
questions below.
Wh
Examples Explanatory Answers No short answer!
Questions:
What 1. What are parallel ports? They are sockets. Yes/ No
When 2. When did you learn I learned typing in Yes they do./
Why typing? 2001. No, they don’t.
Where 3. Why mainboard is called Because it is the
Whose motherboard? biggest part in your
Who 4. Where serial ports are unit system.
Whom located in your computer?
Whose They are located at
How the back of computer.
Activity
Change the following statements into questions using the given wh – question words.
1. The USB (Universal Serial Bus) is quite a new item inside a PC.
What…………………………………………………………………………………….?
Activity
Pair Work. Suppose you are buying a computer from a computer store and your
partner is the seller. Ask a lot of questions about different types of computer
available in the store, their prices, their manufacturing companies, and their features
(such as memory storage, capacity, battery life and display quality) . Try to use Wh –
questions!
Activity
Home Work. Write about the conversation (buying a computer) that you had with
your partner in the class. Don’t forget to mention every detail-- especially the result of
shopping.
Activity
In the chart below, the words’ English synonyms or definitions are given; write their
meanings in your native language:
1. …………………………………………………………………………………………….
2. …………………………………………………………………………………………….
3. …………………………………………………………………………………………….
4. …………………………………………………………………………………………….
5. …………………………………………………………………………………………….
Listening
Activity
Dictation: Listen to the recording carefully and write every word you hear. Don’t
add something of your own!
Microphone
Activity
Exchange your papers with your partners. Listen again and try to make corrections on
your partner’s papers.Scanning: Scan the passage and then check Yes or No for the
following questions.
Reading
Workstations
CPU speed, memory, and hard disk requirements vary from one application to
another. A low – end workstation that’s to be used for simple tasks such as word
processing can get by with less of each of these values than is available on new
computers today.
A high – end workstation that will be used for video rendering, heavy – duty
scientific simulations, or the like may need the fastest CPU, the most RAM, and the
biggest hard disk available. Likewise, low – end workstations are likely to have
less cutting – edge network hardware than are high – end workstations, and the
differing hard disk requirements dictate less in the way of backup hardware for
the low – end workstation.
True or False?
Read the sentences and check T or F.
1. In this article two types of workstation were introduced. .................
2. A workstation requires a display smaller than 8 inch. .................
3. According to this article, a two – button mouse is suboptimal for .................
windows.
4. A low – end workstation is used for video rendering and scientific .................
simulation.
Activity
For each item below, circle the best answer(s).
Unit 5 Workstations 35
2. The fastest CPU, the most RAM and biggest hard disk are needed for……………………
a. Disk top computers
b. High – end workstations
c. Low – end workstations
d. None of the above
Grammar - Writing
Adverbs of Manner
Adverbs of Manner are adjectives that almost always end with –ly, though some are
also irregular. Except good that its adverb form is changed to well, other irregular
adverbs of manner have the same form with their adjective form.
4. A manner adverb is placed before a clause to expresses the attitude of the speaker
on content of the clause.
Example: Illegally, he broke the program code and downloaded the eBooks.
Unit 5 Workstations 36
Activity
Reread the text of this chapter and list at least four adverbs of manner and four
adjectives.
Activity
Now, change the listed adjectives into adverbs of manner and then make sentences
with all these eight adverbs in your notebooks.
Activity
Group work: As you are studying computer, you may know how to install windows or
Ubuntu programs in your computer. Sit in a group and try to explain the process of
installing one of these programs. Each student should explain only one process!
Activity
Writing. As you are discussing, one of the group members should write down the
process.
Activity
Now exchange the written process of installing the program with other groups in order
to be corrected.
Activity
It is time to read the processes aloud in front of the class.
Activity
Homework: Write a few sentences about your group discussion. How did it go? Did
you really know how to install these programs or did you learn them from group
discussion?
Unit 5 Workstations 37
6 Servers
Unit 6 Servers 38
Vocabulary
Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language.
Activity
Fill in the blanks with the words given.
1. Today’s technology has changed our life and ………………… our living facilities faster.
2. There were a lot of questions with …………………choices in yesterday’s computer exam
in our course.
3. IBM Company is producing ………………………modern and improved computers.
4. The memory of a computer………………….. the data from input devices.
Unit 6 Servers 39
Listening
Activity
Listen to the recording carefully and fill the blanks from the words below:
Scan the first paragraph of this passage and then define the server in your own words.
Server is ..............................................................................................................................
........................................................................................................................................... .
Reading
Servers
The word server can mean one of two things: a program that responds to network
requests from other computers, or the computer on which the server program runs.
When designing a computer, the latter is the appropriate definition. Servers usually have
little or no need for user – oriented features such as large monitor or sound cards. Most
servers make heavy use of their hard disks, however, so large and high performance
are desirable in servers. For the same reason, Small Computer System Interface (SCSI)
disks are preferred to Advanced Technology Attachment (ATA) disks, also known as
Enhanced Integrated Device Electronics (EIDE) disks – SCSI disks tend to perform better,
particularly when multiple disks are present on a single computer. Likewise, servers by
definition rely on the network, and busy servers may need top – notch network cards, and
perhaps special dedicated network connection outside of the computer itself.
Small servers such as those handling a few users in a small office, don’t need
much in the way CPU speed or RAM, but larger servers demand more of these
quantities, especially RAM. Linux automatically buffers disk accesses, meaning that
Unit 6 Servers 40
Linux keeps recent disk accesses in memory, and reads more than it requested from
disk. These practices mean that when subsequent requests come in, Linux can
deliver them from memory, which is faster than going back to the disk to obtain the
data. Thus a server with lots of RAM can often outperform an otherwise similar
server with only a modest amount of RAM.
It is important to realize that server needs fall along a continuum; a very low –
demand Web site might not require a very powerful computer, but a very popular
Web site might need an extraordinary powerful system. Many other types of
servers are also available, including Usenet news servers, database servers, time
servers, and more. News and database servers are particularly likely to require
very large hard disks.
True or False?
Read the sentences and check T or F.
1. SCSI disks are better than EIDE disks for better performance. .................
2. Sound cards and big monitors are two important components of .................
servers.
3. Special dedicated network connections are needed for small servers. .................
4. The speed of RAM can be the same both in small servers and the .................
large ones.
5. Linux has the ability to deliver subsequent requests from memory, .................
and need more data from disk.
Activity
Consider the issues. Work with a partner to answer the questions below.
Grammar - Writing
Activity
Now, use the 8 above words into proper English sentences.
1. …………………………………………………………………………………………..
2. …………………………………………………………………………………………..
3. ………………………………………………………………………………………….
4. ………………………………………………………………………………………….
5. ………………………………………………………………………………………….
6. ………………………………………………………………………………………….
7. ………………………………………………………………………………………….
8. ………………………………………………………………………………………….
Reading Skill
Skimming
When you skim a reading selection, you read it quickly to learn about its
content and organization. You don’t read every word. Instead your eyes
move very quickly over the selection, trying to find general information (e.g.,
the topic of a reading).
Activity
Read the two questions below. Then, take one minute to skim the reading below for
the answers.
Unit 6 Servers 42
Current local time and date in every time zone worldwide!
Are you about to make an International long distance phone call? Are you
planning a trip to a foreign destination? Are you preparing for a web cast or online
meeting? Are you looking for a free clock for your own web site or blog? Just want
to know what time it is?
The Internet can bring you closer to the world, but with time zones and daylight
saving time rules, World Time Server is here to help by providing accurate time
information when you need it!
World Time Server shows current time and date in cities and countries in all
time zones, automatically adjusted for local Daylight Saving Time rules. Convert
times from one location to another or even check current international weather
conditions.
2. World time server uses our own self-maintained database with accurate
adjustments for Daylight Saving Time or Summer Time. With no official resource
to get this data (such as the UN), many Fortune 500 companies depend on our
vigilant research and our contacts with governments, embassies, newspapers to
keep up with the ever-changing Daylight Saving Time rules for zones around the
world. You can depend on us, too!
3. World time server has the best world time converter. Pick the one exact place
and exact time your event will occur and we'll give you a link to email or post on
your website. Everyone who follows the link gets to pick their home location to
compare their time directly with yours. No big list of world cities to distract anyone,
no math required. If you aren't sure of the best time to hold your next event or
meeting, try our cool Meeting Planner.
We even have a mobile version of available for your iPhone, Android or other
smaller screen devices so you can still use our site anywhere when the full site
won't do.
(http://www.worldtimeserver.com)
Unit 6 Servers 43
Activity
Now, share your answers with a partner. Was it difficult to answer these questions in a
minute? How can skimming help you become a more effective reader?
Group work: Go around the class and find students who are working as admins in your
faculty or some students who have information about faculty servers. Then ask him/her
some questions.
Example questions:
1. Do you have any information about the servers available in your faculty?
2. What are they for? And what important role do servers play in an academic place?
3. What type of computer servers are available in your faculty?
4. What problems the computer users of your faculty might face if the servers don’t work?
5. .......................................................................................................................................
6. .......................................................................................................................................
Activity
Homework: Based on the listening, reading and discussion sections of this chapter and
something from your own information, write a few informative sentences about servers
and the problems you have in your faculty due to the lack of sufficient servers in your
university.
Unit 6 Servers 44
7 Types of Computer Viruses
Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language.
Activity
Fill in the blanks with the following words. You may need to add verb endings or plurals.
Listening
Activity
Dictation: Listen to the recording carefully and write every word you hear. Don’t add
something of your own!
What Are the Functions of Antivirus Software?
Activity
Listen again and correct your mistakes.
Activity
Exchange your books with your partners. Listen again and correct your partner’s
mistakes.
Scanning
Scan the passage and then fill in the blanks.
1. The most common type of ……………. can infect any application ………………… .
2. The goal of a computer virus is to ……………………… by the computer.
3. Viruses can attach themselves to specific ……………….. in order to be hidden.
Reading
Computer viruses can be classified into several different types. The first and
most common type is the virus which infects any application program. On IBM
PC’s and clones running under PC-DOS or MS-DOS, most programs and data
which do not belong to the operating system itself are stored as files. Each file has
a file name eight characters long, and an extent which is three characters long.
A typical file might be called “TRUE.TXT”, where “TRUE” is the name and “TXT”
is the extent. The extent normally gives some information about the nature of a
file—in this case “TRUE.TXT” might be a text file. Programs must always have an
extent of “COM”, “EXE”, or “SYS”. Under DOS, only files with these extents can be
executed by the central processing unit. If the user tries to execute any other type
of file, DOS will generate an error and reject the attempt to execute the file.
Since a virus’ goal is to get executed by the computer, it must attach itself to a COM,
EXE or SYS file. If it attaches to any other file, it may corrupt some data, but it won’t
normally get executed, and it won’t reproduce. Since each of these types of executable
files has a different structure, a virus must be designed to attach itself to a particular
type of file. A virus designed to attack COM files cannot attack EXE files, and vice
versa, and neither can attack SYS files. Of course, one could design a virus that would
attack two or even three kinds of files, but it would require a separate reproduction
method for each file type.
The next major type of virus seeks to attach itself to a specific file, rather than
attacking any file of a given type. Thus, we might call it an application-specific
virus. These viruses make use of a detailed knowledge of the files they attack to
hide better than would be possible if they were able to infiltrate just any file. For
example, they might hide in a data area inside the program rather than lengthening
the file. However, in order to do that, the virus must know where the data area is
located in the program, and that differs from program to program.
This second type of virus usually concentrates on the files associated to DOS, like
COMMAND.COM, since they are on virtually every PC in existence. Regardless of
Unit 7 Types of Computer Viruses 48
which file such a virus attacks, though, it must be very, very common, or the virus
will never be able to find another copy of that file to reproduce in, and so it will not
go anywhere. Only with a file like COM- MAND.COM would it be possible to begin
leaping from machine to machine and travel around the world.
The final type of virus is known as a “boot sector virus.” This virus is a further
refinement of the application-specific virus, which attacks a specific location on a
computer’s disk drive, known as the boot sector. The boot sector is the first thing
a computer loads into memory from disk and executes when it is turned on. By
attacking this area of the disk, the virus can gain control of the computer immediately,
every time it is turned on, before any other program can execute. In this way, the virus
can execute before any other program or person can detect its existence.
(Ludwig. Mark A. (1996) The Black Book of Computer Viruses. American Eagle Publication, Inc. Show Low, Arizona (1996).
True or False?
Read the sentences and mark (√ ) T or F.
1. If a virus attaches to any file, it may corrupt some data, and it will .................
normally get executed, and it won’t reproduce.
2. A virus must be attached to a COM, EXE or SYS file in order to be .................
executed by the computer.
3. The boot sector virus doesn’t attack a specific location of the boot .................
sector of computer.
4. A virus’ goal is to get executed by the computer. .................
Activity
Consider the information in the reading passage. Work with a partner to answer the
questions below.
1. What extents are important for the computer programs and why?
2. How should a virus be designed in order to be executed by CPU?
3. Is it possible for a virus to travel around the world? If yes, how?
Grammar - Writing
Adjectives Nouns
ness- kind kindness
ity- active activity
ism- ideal idealism
Activity
Add the suffixes -ness, -ity and –ism to the following adjectives in order to change them
into nouns.
Activity
Exchange your papers to your partners and check each other’s mistakes.
Activity
Check the dictionary for correct spelling and using correct suffixes.
Activity
Group work: Go around the class find at least three students who have recently had
trouble with virus in their PCs. Ask them questions from the chart and add three
questions of your own. Then write their answers and their names into the chart.
5. .........................................?
6. .........................................?
7. .........................................?
Activity
Homework: Write about the information you noted in the chart given by the students
in activity 1. Then add your own feelings about losing some important data corrupted
by viruses.
Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language.
Activity
Based on exercise 1, write the synonyms and antonyms of the given words in the chart below.
No. Words English Synonyms English Antonyms
1 Author
2 Certain
3 Publish
4 Essential
5 Obtain
6 Precise
7 Concept
8 Purpose
9 Amazing
10 Freedom
Activity
Listen to the recording twice and then write the summary of what you get about the
given topic by using your own words.
Activity
Scan the first and second paragraphs of the reading passage and then mark Yes or No
boxes for the following questions.
1. Is there any source code under a license for open source software?
2. Is the original writer’s right of open source software protected?
3. Is there any difference between commercial software and open source?
Reading
Open source usually refers to software that is released with source code under
a license that ensures the derivative works will be available as source code,
protects certain rights of the original authors, and prohibits restrictions on how
the software can be used or who can use it. “Answering the question what is open
source?” used to be a lot simpler than it is today. Open source began as, and for the
most part still is, software created by a community of people who are dedicated to
working together in a highly collaborative and evolutionary way.
A huge amount of amazing software has been created through this loose process.
While much of open source development has focused on creating tools for software
developers, an increasing amount of effort is being put into creating programs to solve
less technical problems like publishing blogs or keeping track of skydiving activity.
Users of software
For users of software who have the skills to download and install software,
open source means choice and freedom. The choice comes from the huge amount
of programs available. Some programs like Firefox (the smoking-hot browser from
Mozilla.org) or OpenOffice.org (a suite of word processing, spreadsheet, and related
programs) can be downloaded and used by just about anybody. Other open source
projects such as Babeldoc or Axkit are mostly useful for software developers. None
of this open source software costs money. Some programs charge subscriptions for
support, updates, documentation, or premium versions, but most of those are usable
without paying a fee. The freedom comes from the fact that the source code is available.
If you want to change something, then you can, if you have the right skills. Only a
handful of the people who download and use open source ever actually change it. Most
use it as intended, but they have the freedom to modify it if they want.
True or False?
Read the sentences and mark T or F.
1. Source code and the legal license are two important factors for open .................
source software.
2. There is no difference between software created by open source and .................
commercial software.
3. Open source software can be used for any purposes. .................
4. After creating software to solve a problem, the developers start to .................
write a code to create a solution.
Activity
For each item below, circle the best answer.
7. The developers put the open source code where other people …………………
a. Cannot find about it
b. Can download it
c. Can buy it
8. For developers and engineers who found a successful project, open source
means…………………………
a. fame,
b. recognition and money
c. a &b
A main idea is the writer’s message about the topic. Typically writers organize their
writing around one or two main idea. To identify the main idea of a reading, ask:
What is the most important thing(s) the writer says about the topic?
Activity
Reread reading passage of Chapter 7. Then write the topic and the main idea(s) of the passage.
Topic: ...................................
Main idea(s):
Activity
Write the main idea of the Topic “Users of Software” from this unit.
Topic: Users of Software
Main idea:
Grammar - Writing
Prefixes: un-, im-, in-, ir-
You can change the meaning of many adjectives by adding a prefix that
means not: un-, im-, in-, ir-. Ex: portable means not producing a profit or not
portable
Prefix Roots (adjectives) Example
un profitable unprofitable
im mobile immobile
in complete incomplete
ir replaceable irreplaceable
Unit 8 Open Source Software 58
Activity
Add prefixes from the chart to the following adjective in order to change their
meanings from positive to negative.
Regular ...................
convenient ...................
possible ...................
Comfortable ...................
healthy ................... permanent ...................
Responsible ...................
active ...................
dependent ...................
Experienced ...................
successful ...................
important ...................
Activity
Exchange your papers with your classmates. Check them and then check the dictionary
to be sure about your corrections.
Activity
Add three questions about open source of your own to the following questions then
discuss them with your partners.
Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language:
No. Words English Synonyms / definitions NL Meaning
To give a lot of time and effort to it because you
1 Dedicate
think it is important.
If you share something with another person,
2 To share
you both use it or have some of it.
3 To consider To think about
4 To participate To take part in
5 Client Customer
6 Satisfy Gratify
7 Account Formal business agreement
8 Firm Company
9 Employee Worker
11 Capability Ability
12 Advantage Benefit
13 To centralize Centered
14 Concurrent Parallel
15 Eventually Finally
16 To implement Execute
17 To onfigure To assemble a computer system
Management, Administration is the range of
activities connected with the organization
18 Administration
or supervision of a company, institution, or
country.
19 Throughout All over
20 To lead To direct
21 Complicate to make it more difficult to understand or deal with.
22 Apparent obvious
Permit, If you give someone permission to do
24 Permission something, you say that they are allowed to do
it.
25 Application Request
25 To cooperate To work together
27 Numerous Consisting of a great number
Unit 9 Peer-to-Peer Network versus Server-based Networks 61
Activity
Use the following words in proper sentences.
1. …………………………………………………………………………………………....................................... .
2. …………………………………………………………………………………………....................................... .
3. …………………………………………………………………………………………....................................... .
4. …………………………………………………………………………………………....................................... .
5. …………………………………………………………………………………………....................................... .
Listening
Activity
Listen to the people talking about Internet, Intranet and Extranet. Try to fill in the
blanks using given words.
1. If you wish to expose …………….. to everyone in the …………., then you would build an
Internet-type application.
2. An application is considered to be on the company’s intranet if it is using ………………
protocols such as HTTP or FTP but the application is available only within the ………....... .
3. An ……………..cannot be used by anyone else …………. to the company except for those
selected individuals.
Activity
Listen again and mark Yes or No boxes. Yes / No
1. Is it possible to transfer funds to the bank without going there?
2. Is the information on a company’s intranet accessible to persons on the Internet?
3. Can you create an extranet by extending your intranet?
Activity
Exchange your books with your partners. Listen again and try to make correction on
your partner’s answers.
Before you Read
Scanning
Scan the reading passage and then fill in the blanks.
1. A peer – to – peer network needs a ………………………… in order to share information.
2. A server- based network needs …………………………….. in the purpose of sharing information.
3. One difference between peer-to-peer network and server based network is ……………
………………………………………………......................................................................................... .
4. Another difference is………………………………………………………………………........................... .
Unit 9 Peer-to-Peer Network versus Server-based Networks 62
Reading
Peer-to-Peer Network
A peer-to-peer network has no dedicated servers; instead, a number of
workstations are connected together for the purpose of sharing information or
devices. When there is no dedicated server, all workstations are considered equal;
any one of them can participate as the client or the server. Peer-to-peer networks are
designed to satisfy the networking needs of home networks or of small companies
that do not want to spend a lot of money on a dedicated server but still want to
have the capability to share information or devices. For example, a small accounting
firm with three employees that needs to access customer data from any of the three
systems or print to one printer from any of the three systems may not want to spend
a lot of money on a dedicated server. A small peer-to-peer network will allow these
three computers to share the printer and the customer information with one another.
Most of the modern operating systems such as Windows XP and Windows Vista
already have built-in peer-to-peer networking capabilities, which is why building a
peer-to-peer network would be a “cheap” network solution. The disadvantage of a
peer-to-peer network is the lack of centralized administration—with peer-to-peer
networks, you need to build user accounts and configure security on each system.
It is important to note that peer-to-peer networks are designed for fewer than
10 systems, and with Microsoft client operating systems such as Windows XP
Professional, only 10 concurrent network connections to those clients are allowed.
This means that if you have 15 or 20 employees, you eventually will need to
implement a server-based network.
Server-Based Networks
A big disadvantage of peer-to-peer networking is that you can’t do your day-to-
day administration in a single place. With peer-to-peer networking, user accounts
typically are created on all the systems, and data files are stored throughout all the
systems. This leads to a more complicated environment and makes your job harder as
a network administrator. Usually after four or five systems have been networked, the
need for a dedicated server to store all of the user accounts and data files becomes
apparent—this is a server-based network. The advantage of a server-based network
is that the data files that will be used by all of the users are stored on one server. This
will help you by giving you a central point to set up permissions on the data files, and
it will give you a central point from which to back up all of the data in case data loss
should occur. With a server-based network, the network server stores a list of users
who may use network resources and usually holds the resources as well.
It is important to note that a server can have numerous roles at the same time. A
server can be a file and print server, as well as an application server, or it can be file,
print, and directory server all at the same time. Because a single server can perform
multiple roles, a company will not need to purchase an additional server every time
a new product (or feature) is implemented on the network, and this fact reduces the
cost of a server-based network.
(Clarke. Glen E., (2009) Comp TIA Network + : Mc Graw- Hill Companies, United States)
True or False?
Read the sentences and mark T or F.
1. A group of servers are needed for a peer- to- peer network in order .................
to share information and devices.
2. A server –based network will allow some computers to share the .................
printer and the customer information with one another.
3. Peer-to-peer networks are designed to satisfy the home and small .................
companies’ networking needs.
4. The data files that will be used by all of the users stored on all .................
systems in a
server – based networks.
5. Building a peer-to-peer network wouldn’t be a “cheap” network .................
solution.
6. A single server can perform multiple roles. .................
7. Web servers run some form of special program on the server. .................
Grammar - Writing
Activity
Choose the correct form of the word in parentheses to complete each sentence.
Pair work: Add four more questions about the passage to the following questions then
discuss them with your partners.
Example:
Student A: What roles do the workstations play in peer –to-peer network?
Student B: the workstations….
Writing
Paragraph Writing
What are the elements of a paragraph?
1. A paragraph has a topic sentence that states the main idea.
2. All of the sentences (supporting sentences) in a paragraph are about one topic.
3. The last sentence, or concluding sentence, brings the paragraph to a logical
conclusion.
Activity
Reread the first paragraph of this chapter reading passage. Then write its topic
sentence.
Activity
Reread the second and third paragraphs of the chapter one reading passage. Then
write their topic sentences
Second paragraph of chapter one topic sentence:
Activity
Homework. Write a topic sentence for the topic “The Function of Keyboard”.
Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language.
Listening
Activity
Dictation: Listen to the recording carefully and write every word you hear. Don’t add
something of your own!
C++
Activity
Exchange your books with your partners. Listen again and try to make corrections on
your partner’s answers.
Scanning
Scan the passage and then name some computer programming languages you found in
the reading.
Example:
1. Assembly language
2. ……………………
3. ……………………
4. …………………...
5. …………………...
Unit 10 What is Programming? 70
Reading
What Is Programming?
Start out down Main Street headed east. Continue on Main Street until you see a
drugstore on your right. If the street is blocked because of construction, turn right there
at 15th Street, turn left on Pine Street, and then turn right on 16th Street. Otherwise,
you can just continue and make a right on 16th Street. Continue on 16th Street, and
turn left onto Destination Road. Drive straight down Destination Road for 5 miles, and
then you'll see the house on the right. The address is 743 Destination Road.
Anyone who knows English can understand and follow these driving directions,
since they’re written in English. Granted, they’re not eloquent, but each instruction is
clear and easy to understand, at least for someone who reads English.
True or False?
Read the sentences and mark T or F.
1. A computer knows natively machine language as well as English language. .................
2. Machine language consists of raw bits and bytes and is similar to all .................
architectures.
3. A translator help decrease the problems related to writing machine .................
language.
4. Assembly language is different from English language. .................
Activity
For each item below, circle the best answer.
Grammar - Writing
Infinitive with” to” : used as Subject and Object
The “to infinitive” can be used as subject and object in sentences. To instruct, to
teach, to program, etc. are all infinitives with to.
Activity
Use the following infinitives as subject in proper sentences:
1. …………………………………………………………………………………………….......................................
2. …………………………………………………………………………………………….......................................
3. …………………………………………………………………………………………….......................................
Activity
Use the following infinitives as object in proper sentences:
1. …………………………………………………………………………………………….......................................
2. …………………………………………………………………………………………….......................................
3. …………………………………………………………………………………………….......................................
Activity
Reread the passage and find examples of the infinitives used as subjects and objects.
As subject:
1. …………………………………………………………………………………………….......................................
2. …………………………………………………………………………………………….......................................
As object:
1. …………………………………………………………………………………………….......................................
2. …………………………………………………………………………………………….......................................
Unit 10 What is Programming? 73
Discussion & Writing
Group work: Go around the class and find a person who wants to be a computer
programmer in future. Then ask him/her some questions.
Example:
Student A: Do you want to be a computer programmer in future?
Student B: Yeah, it is my interest.
Student A: so, what are the most important things that you should first acquire about
programming?
Student B: Actually, the first important thing is…
Writing
Supporting sentences:
Supporting sentences are facts and details related to the topic that support the
topic sentence or main idea of a paragraph.
Example:
A modem is a device that connects your computer to the telephone system for having
Internet connections. A modem converts digital data on your computer into analog
signals that can be sent over a telephone line. It also converts the analog signals that it
receives into digital data. If you want to connect to the Internet using a telephone line,
you will need a modem.
1. ................................................................................................................
2. ................................................................................................................
3. ................................................................................................................
Unit 10 What is Programming? 74
Activity
Reread the first paragraph of the chapter 4 reading passage. Then write its topic
sentence and supporting sentences.
1. ................................................................................................................
2. ................................................................................................................
3. ................................................................................................................
Activity
Homework: Write supporting sentences for the topic “The Function of Keyboard” that
you had already done in previous homework.
Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language.
No. Words English Synonyms / definitions NL Meaning
The central and most important part of something,
1 Basis
from which it can be further developed.
An intermediary is a person who passes messages
2 Intermediary
between two people or groups.
3 Amazing Surprising
An aspect of something is one of the parts of its
4 Aspect
character or nature
Something that is varied consists of things of
5 Varied
different types, sizes, or qualities.
To To complete, finish; perform, execute
6
accomplish
7 Task A piece of work that must be done.
8 Primarily Principally, mainly
9 To optimize To produce maximum results; improve efficiency
11 Utilization Putting to practical use
Complex things have many different parts and are
12 Complex
hard to understand
The interface between two subjects or systems is
13 Interface the area in which they affect each other or have
links with each other.
14 Roughly Approximately
The resources of a country, organization, system or
15 Resource
person are the things they have and can use.
The organization and methods involved in
16 Government
governing a country or state.
To monopolize something means to control it
17 Monopolize completely and prevent other people having a
share in it.
To make something as great in amount or
18 To maximize
importance as you can.
19 Assure To be sure
If you have something at your disposal, you can
20 Disposal
use it at any time.
1. …………………………………………………………………………….....................................................…
2. …………………………………………………………………………….....................................................…
3. …………………………………………………………………………….....................................................…
4. …………………………………………………………………………….....................................................…
5. …………………………………………………………………………….....................................................…
Listening
Activity
Dictation: Listen to the recording carefully and write every word you hear. Don’t add
something of your own!
UNIX
Activity
Exchange your books with your partners. Listen again and try to make corrections on
your partner’s answers.
Unit 11 What Operating Systems Do 78
Before you Read
Scanning
Scan the first paragraph of the reading passage and then complete the information
below.
Operating system….
• manages the computer hardware,
• provides …………………………………………………………………..
• acts ………………………………………………………………………....
An operating system is a program that manages the computer hardware. It also provides
a basis for application programs and acts as an intermediary between the computer user
and the computer hardware. An amazing aspect of operating systems is how varied they
are in accomplishing these tasks. Mainframe operating systems are designed primarily
to optimize utilization of hardware. Personal computer (PC) operating systems support
complex games, business applications, and everything in between. Operating systems for
handheld computers are designed to provide an environment in which a user can easily
interface with the computer to execute programs. Thus, some operating systems are
designed to be convenient, others to be efficient, and others some combination of the two. A
computer system can be divided roughly into four components: the hardware, the operating
system, the application programs, and the users.
The hardware—the central processing unit (CPU), the memory, and the input/
output (I/O) devices—provides the basic computing resources for the system. The
application programs—such as word processors, spreadsheets, compilers, and
web browsers—define the ways in which these resources are used to solve users'
computing problems. The operating system controls and coordinates the use of the
hardware among the various application programs for the various users.
1. User View
The user's view of the computer varies according to the interface being used. Most
computer users sit in front of a PC, consisting of a monitor, keyboard, mouse, and system
unit. Such a system is designed for one user to monopolize its resources. The goal is
to maximize the work (or play) that the user is performing. In this case, the operating
system is designed mostly for ease of use, with some attention paid to performance
and none paid to resource utilization—how various hardware and software resources
are shared. Performance is, of course, important to the user; but rather than resource
utilization, such systems are optimized for the single-user experience.
2. System View
From the computer's point of view, the operating system is the program most
intimately involved with the hardware. In this context, we can view an operating
system as a resource allocator. A computer system has many resources that may be
required to solve a problem: CPU time, memory space, file-storage space, I/O devices,
and so on. The operating system acts as the manager of these resources. Facing
numerous and possibly conflicting requests for resources, the operating system must
decide how to allocate them to specific programs and users so that it can operate
the computer system efficiently and fairly. As we have seen, resource allocation is
especially important where many users access the same mainframe or minicomputer.
Unit 11 What Operating Systems Do 80
A slightly different view of an operating system emphasizes the need to control
the various I/O devices and user programs. An operating system is a control
program. A control program manages the execution of user programs to prevent
errors and improper use of the computer. It is especially concerned with the
operation and control of I/O devices.
(Silber. Schatz, Peter Bare Galvin and Greg Galvin and Greg Gagne. (2005) Operating System Concept. USA. John Wiley and sons, Inc.)
True or False?
Read the sentences and mark T or F. Operating system acts as an intermediary.
Activity
Consider the information in the reading passage. Work with a partner to answer the
questions below.
1. How operating systems differently do some certain tasks for personal, handheld and
mainframe computers?
2. What services operating system provide for computer users?
3. What does operating system do as resource allocator?
4. When an operating system is called as a control program?
5. Is it possible for computer hardware to work without designing an operating system?
Grammar - Writing
Verbs Nouns
1. To allocate The .......................................
2. To govern The .......................................
3. To combine The .......................................
4. To divide The .......................................
5. To manage The .......................................
6. To perform The .......................................
7. To deliver The .......................................
8. To fail The .......................................
9. To deny The .......................................
10. To attend The .......................................
Activity
Exchange your books with your classmates’ papers and then try to make corrections on
them. See a dictionary to be sure about mistakes.
Role play: Suppose you are a computer system and your partner is an operating system.
Now, what are your expectations from operating system to do for you? Ask him/
her about your expectations and possible new services from him/her. Then list new
services done by operating systems in future and read them aloud in the class.
Writing
Example:
A modem is a device that connects your computer to the telephone system for having
Internet connections. A modem converts digital data on your computer into analog
signals that can be sent over a telephone line. It also converts the analog signals that it
receives into digital data. If you want to connect to the Internet using a telephone line,
you will need a modem.
Concluding Sentence(s): If you want to connect to the Internet using a telephone line,
you will need a modem.
Activity
Read the following paragraph. Then write a general topic and a good concluding
sentence for it.
Computers are excellent machines to help students. Before computers, students had
to do their school work on typewriters. Typewrites did not allow students to make
major changes easily, so they had to use special correction fluid to fix mistakes. Today
computers let students move information around without retyping it and correct errors
with little effort.
Activity
Conclude the paragraph about (The Function of Keyboard) that you have written as previous
homework with a proper and relevant concluding sentence.
Activity
Homework: Write a paragraph about the following topic.
Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language.
No. Words English Synonyms / definitions NL Meaning
1 Critical Important, crucial
Something that is considered to be useful or
2 Asset
helpful to a person or group
3 Practically functionally, usefully
4 Robust Strong
5 Available Ready for use
Something that is present or noticed throughout
6 Pervasive
a place or thing.
7 Presence State of being
8 Location Place, site
9 Advent Coming, arrival
11 Repository Plentiful source
Something or someone that is efficient does a job
12 Efficient
well and successfully, without wasting time or energy.
13 Maintenance Act of maintaining, repairs
14 Tabular Arranged in rows and columns
15 Interchangeably In an interchangeable manner
16 Corresponding One thing is similar or related to another
17 To update To bring up to date, modernize
18 Inconsistent Incompatible, contradictory
19 Inadvertently Mistakenly, unintentionally
The interface between two subjects or systems
20 Interface is the area in which they affect each other or
have links with each other.
Copying of data in order for retrieval in the
21 Backup
event of a malfunction
22 To restore To return to a previous condition
The recovery of something that was lost or
24 Recovery
stolen is the fact of getting it back
25 Backbone Physical infrastructure of the Internet
26 Breadth Width; broadness
27 Essentially Basically, mainly
A # B
1. Consumer g
......... a. A large, round object in space that moves around a
2. Commerce ......... star
3. Planet ......... b. People or things that can be trusted to work well or
4. Requirements ......... to behave in the way that you want them to.
5. Reliable ......... c. Having many dimensions, of many measurements
6. Domain ......... d. The activity of buying and selling things on a large
7. Multidimensional ......... scale.
8. Hierarchical ......... e. Arranged according to rank
9. Retrieve ......... f. Something that you must have or do in order to do
10. Commerce ......... what you want
g. A person who buys goods or uses services
h. To get something back
i. The activity of buying and selling things on a large
scale
j. Division of the Internet according to country and
type of organization
Listening
Activity
Listen to the people talking about Data Architect. Try to fill in the blanks using the given
words.
Data Architect
A data architect is responsible for designing an ………………. that supports the
organization's ……………….. and future needs for data management. The architecture
should cover……….., data integration and the means to get to the …….. . Usually the data
architect achieves his goals by setting ………………..data standards. A Data Architect is
also referred to as a Data ………... This is in spite of the fact that the role involves much
more than just creating data models.
Activity
Exchange your books with your partners. Listen again and try to make correction on
your partner’s answers.
Scanning
Scan the passage and then answer the following questions:
1. What is database?
2. Why is a database software needed?
3. What is database management system?
Reading
What is a Database?
Data is one of the most critical assets of any business. It is used and collected
practically everywhere, from businesses trying to determine consumer patterns
based on credit card usage, to space agencies trying to collect data from other
planets. Data, as important as it is, needs robust, secure, and highly available
software that can store and process it quickly. The answer to these requirements is
a solid and a reliable database. Database software usage is pervasive, yet it is taken
for granted by the billions of daily users worldwide. Its presence is everywhere-
from retrieving money through an automatic teller machine to badging access at a
secure office location.
Since its advent, databases have been among the most researched knowledge
domains in computer science. A database is a repository of data, designed to support
efficient data storage, retrieval and maintenance. Multiple types of databases exist
to suit various industry requirements. A database may be specialized to store binary
files, documents, images, videos, relational data, multidimensional data, transactional
data, analytic data, or geographic data to name a few.
Data can be stored in various forms, namely tabular, hierarchical and graphical forms.
If data is stored in a tabular form then it is called a relational database. When data is
organized in a tree structure form, it is called a hierarchical database. Data stored as
graphs representing relationships between objects is referred to as a network database.
Why do we need database software or a DBMS? Can we not just store data in
simple text files for example? The answer lies in the way users access the data and
the handle of corresponding challenges. First, we need the ability to have multiple
Unit 12 What is a Database? 87
users insert, update and delete data to the same data file without "stepping on each
other's toes". This means that different users will not cause the data to become
inconsistent, and no data should be inadvertently lost through these operations. We
also need to have a standard interface for data access, tools for data backup, data
restore and recovery, and a way to handle other challenges such as the capability to
work with huge volumes of data and users. Database software has been designed to
handle all of these challenges.
True or False?
Read the sentences and mark T or F.
Activity
For each item below, circle the best answer.
Grammar - Writing
Activity
Change the following nouns to adjectives using given suffixes. To be sure about the
correct spilling, check a dictionary.
Nouns Adjectives
Activity
Reread the reading passage and write any adjective which has the suffixes you studied
in this chapter. Then write their noun forms, too.
For example: critical the noun form is critic.
Activity
Look back at the reading and find at least three details that support the main idea given below.
Main Idea
A database is a repository of data, designed to support efficient data storage, retrieval
and maintenance.
Supporting Details
1. ......................................................................................................................................
2. ......................................................................................................................................
3. ......................................................................................................................................
Activity
Look back at the reading in chapter 9 and find at least one main idea and three details
that support the main idea given below.
Main Idea
Supporting Details
1. ......................................................................................................................................
2. ......................................................................................................................................
3. ......................................................................................................................................
Activity
Pair Work: Make a conversation with your partner asking questions about using database software.
Example:
Student A: What do you think about database software?
Student B: Well. It is ease of work, especially with managing and storing data.
Student A: what types of data can you store by database software?
Student B: Different types like…
Activity
Homework: For what purpose do you use database software? Write a short paragraph
about the way you use it.
Unit 12 What is a Database? 90
13 Machine Languages, Assembly
Languages and High-Level Languages
Activity
In the chart below, the words’ English synonyms or definitions are given; write their
meanings in your native language:
1. ……………………………………………………………………………………….............................................
2. ……………………………………………………………………………………….............................................
3. ……………………………………………………………………………………….............................................
4. ……………………………………………………………………………………….............................................
5. ……………………………………………………………………………………….............................................
Activity
Listen to the recording carefully, then write the topic and the answers of the following
questions.
Topic: ........................................
Questions:
1. What is BASIC and when was it developed?
.......................................................................................................................................... .
2. What was the primary purpose of BAISC?
.......................................................................................................................................... .
3. What is Microsoft’s Visual Basic?
.......................................................................................................................................... .
4. When was it introduced?
.......................................................................................................................................... .
5. Why is Visual Basic so popular?
.......................................................................................................................................... .
Activity
Exchange your bookswith your partners. Listen again and try to make corrections on
your partner’s answers.
Before you Read
Scanning
Read the three questions below. Then, take two minutes to skim the reading below for
the answers.
1. Machine languages
2. Assembly languages
3. High-level languages
Any computer can directly understand only its own machine language. Machine
language is the “natural language” of a computer and as such is defined by its
hardware design. Machine languages generally consist of strings of numbers
(ultimately reduced to 1s and 0s) that instruct computers to perform their most
elementary operations one at a time.
Machine languages are machine dependent (i.e., a particular machine language can
be used on only one type of computer). Such languages are cumbersome for humans,
as illustrated by the following section of an early machine-language program that
adds overtime pay to base pay and stores the result in gross pay:
+1300042774
+1400593419
+1200274027
Machine-language programming was simply too slow and tedious for most
programmers. Instead of using the strings of numbers that computers could directly
understand, programmers began using English like abbreviations to represent
elementary operations. These abbreviations formed the basis of assembly languages.
Translator programs called assemblers were developed to convert early assembly-
language programs to machine language at computer speeds. The following section
of an assembly-language program also adds overtime pay to base pay and stores the
result in gross pay:
load basepay
add overpay
store grosspay
You now know that there are ultimately two ways to translate a high-level
language program into a form that the computer understands—compilation and
interpretation.
(Deitel, P. J., Deitle, H. M. (2011). JAVA: How to Program. Pearson Higher Education. Upper Saddle River, New Jersey)
True or False?
Read the sentences and mark T or F.
4. From the list below, …………………… is the most widely used language of computer.
a. Microsoft’s .NET
b. Java
c. C
d. C++
Grammar - Writing
Examples:
1. Although such code is clearer to humans, it is incomprehensible to
computers until translated to machine language.
Activity
Complete these sentences in your own ideas.
1. Although my computer was attacked by viruses, .......................................................
2. Most of the students copy the information from the internet for their research
documents, even though ................................................................................................
3. Even though she is too young, ....................................................................................
Roll play: Each pair of students should have a performance in front of the class. One
should act as a reporter of a TV and another as a famous computer programmer.
Example:
Reporter: Welcome Mr./Ms. (Student’s name) to our studio.
Programmer: Thank you for warm invitation.
Reporter: Since when have you started programming?
Programmer: Actually, ……………… .
Activity
Homework: Write a short paragraph about the following topic.
Activity
In the chart below, the words’ English synonyms or definitions are given; write their
meanings in your native language.
1. The primary ………….. language for the Web is the Hypertext Markup Language.
2. One of good ………………….. of workstation is resolution.
3. Linux was ………………… developed by Linus Torvalds.
4. The hard disk of a computer can be counted as a ………………..of data.
5. Why is Java a……………… programming language?
Listening
Dictation
Listen to the recording carefully and write every word you hear. Don’t add something
of your own!
JAVA TV
Activity
Exchange your books with your partners. Listen again and try to make corrections on
your partner’s answers.
Before you Read
Scanning
Scan the passage and then fill in the blanks.
Java has become enormously popular. Its rapid rise and wide acceptance can
be traced to its design characteristics, particularly its promise that you can write
a program once and run it anywhere. As stated by Sun, Java is simple, object
oriented, distributed, interpreted, robust, secure, architecture neutral, portable, high
performance, multithreaded, and dynamic.
The World Wide Web is an electronic information repository that can be accessed
on the Internet from anywhere in the world. The Internet, the Web’s infrastructure,
has been around for more than thirty years. The colorful World Wide Web and
sophisticated Web browsers are the major reason for the Internet’s popularity.
The primary authoring language for the Web is the Hypertext Markup Language (HTML).
HTML is a simple language for laying out documents, linking documents on the Internet,
and bringing images, sound, and video alive on the Web. However, it cannot interact with the
user except through simple forms. Web pages in HTML are essentially static and flat.
Java initially became attractive because Java programs can be run from a Web
browser. Such programs are called applets. Applets employ a modern graphical
interface with buttons, text fields, text areas, radio buttons, and so on, to interact
with users on the Web and process their requests. Applets make the Web responsive,
interactive, and fun to use. Java can also be used to develop applications on the server
side. These applications can be run from a Web server to generate dynamic Web pages.
(Liang, Y. Daniel. (2011) Introduction to Java Programming. Upper River, New Jersy)
Unit 14 Java, World Wide Web, and Beyond 101
After you Read
True or False?
Read the sentences and mark T or F.
1. The Internet applications were developed by Java. .................
2. Java is widely used both for Web programming and standalone .................
applications of mobile services.
3. It is not possible for Java programs to be run from a Web browser .................
because Applets avoid it.
4. Dynamic Web pages can be run from a web server by the help of Java. .................
Activity
Consider the information in the reading passage. Work with a partner to answer the
questions below.
Grammar - Writing
Simple Past Tense vs. Present Perfect Tense
Simple Past (Certain time) Present Perfect (Uncertain time)
Form: Subject +past verb form +complement Form: Subject + have/has +past
Example: participle +complement
I scanned my computer an hour ago. (Time is Examples:
specified) I have just scanned my computer.
(Time is not specified)
He has printed his homework.
Past forms of verb Past Participle (Third form of a verb)
Examples:
Regular Irregular Regular Irregular
Verb + - ed form is changed configured written
EX: edit +ed = edited wrote scanned came
talked spoken
Activity
Fill in the blanks by given verbs in parentheses. Use the simple past or present perfect.
First Form Second Form Third Form First Form Second Form Third Form
To develop To let
To design To become
To embed To mistake
To be To have
To state To cut
Reading Skill
Summarizing:
Summarizing refers to restating or retelling of the most important information
in your own words. Summarizing something you read can help you remember
information.
Activity
Summarize the paragraph 3 of this chapter reading passage:
Activity
Summarize the paragraph 5 - 7 of this chapter reading passage:
Group work: Make groups of four students and discuss about the Internet available
in your faculty.
For example, you can discuss about the type of internet connection in your faculty, its
speed, services and so on.
Activity
Homework: Summarize what you have discussed in your groups about your faculty
Internet services. Try to write it in a short paragraph.
1. Do you know what Unix is? Have you ever used it or any version of Unix?
2. Do you know what Linux is? Have you ever used it personally?
3. Can you name any similarities between Unix and Linux systems? Any differences?
Activity
In the chart below, the words’ English synonyms or definitions are given; write their
meanings in your native language.
Activity
Write meaningful English sentences with the words from the box.
1. ……………………………………………………………………………………………....................................... .
2. ……………………………………………………………………………………………....................................... .
3. ……………………………………………………………………………………………....................................... .
4. ……………………………………………………………………………………………....................................... .
5. ……………………………………………………………………………………………....................................... .
Listening
Activity
Listen to the recording and then answer the following questions.
Activity
Exchange your books with your partners. Listen again and try to correct your partner’s
answers. Scanning: Scan the passage and then mark Yes or No for the following
questions.
Reading
Originally Linux was developed as a clone of Unix. Linus Torvalds set out to write
an open source Kernel around which existing open source Unix replacement parts
could converge; the result was the Linux distribution as we know it today. Because
of this history, modern Linux systems bear a very strong resemblance to modern
Unix systems, and in fact, the two can often be used similarly.
In many cases, the most important difference between Linux and commercial
Unix is cost. Linux is a very low –cost OS, but commercial Unix OSs cost much more.
(The most common x86 Unix OSs are now available at low cost for personal use, but
most commercial users must still pay hundreds of dollars for license.) Most Linux
software is available in open source from, and it can be compiled on commercial Unix
machines -- indeed, most Linux software is developed as Unix software generically,
with Linux as just one of many Unix –like platforms on which it works. Many
commercial Unix programs have been ported to (that is, recompiled on) Linux.
Where commercial Unix OSs hold an edge is in very high performance computing.
OSs such as silicon graphics’(SGI) IRIX and sun’s Solaris run on very fast non –x 86
hardware and support advanced features that Linux supports poorly, if at all. Also,
the hardware used by high-end systems is often superior to that used on the x86 PCs
on which Linux usually runs. Linux has been ported to many non-x86 platforms,
including many of those on which its Unix “big brothers” run, but these parts often lag
behind the x86 version in terms of overall polish and general usability.
As Linux improves, the gap between Linux and commercial versions of Unix is
shrinking. Even today, Linux is an excellent platform for workstations and small to
mid-size servers. Because of its similarity to more advanced systems, it’s possible
to deploy Linux today and move to a higher-end commercial Unix systems in the
future, with minimal changes to configuration and administrations’ training. This is
certainly an advantage of the Linux /Unix family as a whole over windows.
(Ay, Osman. And et.al. (2003). Introduction to Computers. Istanbul – Turkey: Zambak Typesetting & Design.) and
(Smith, Roderick W. (2004) Linux +. SYBEX Inc. 1151 Marina Villiage)
True or False?
Read the sentences and mark T or F.
1. Comparing to other operating systems, Unix is less portable and more .................
machine – specific.
2. Both Unix and Linux were first developed by the same person. .................
3. Although x 86 Unix is cheaper, the commercial users must buy its license .................
very expensively.
4. The big difference between Linux and commercial versions of Unix is .................
minimizing by Linux improvement.
Activity
Complete the following sentences with the information you got from the text:
1. Unix is a…………………………………….and was originally developed by Dennis Ritchie and
………………………. .
2. Linux is a ………… of Unix developed by…………............ .
3. Most …………… software is available in …………….. from, and it can be compiled on
………………….. Unix machines.
4. ……………. run on very fast non –x 86 hardware and support advanced features that
……………… supports poorly.
5. It’s possible to deploy Linux today and move to a higher-end ……………….. systems in the future.
Grammar - Writing
Simple Future (Will / be going to )
When you’re expressing an intention or decision, use will if you’re making the
decision as you speak; use going to if you have already made the decision:
Forms:
1. Will: subject + Will + main verb +complement.
2. Be going to: subject + am/ is/ are going to + main verb +complement.
Examples:
A: What type of computer are you going to buy?
B: Hmm. Actually, I haven’t made up my mind. I will buy a Pentium 4 computer. (not certain)
Or I am going to buy a Pentium 4 computer. (certain)
Activity
Complete the sentences with correct form of the verbs given. Use simple future will or
be going to.
Activity
Pair work: Work with your partner to list the differences and similarities between Unix
and Linux in the chart below. Then discuss about them.
Differences Similarities
Activity
Homework: Write a short paragraph about any of operating systems: Linux or Unix.
Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language.
1. The virus can ……………. on our computer and damage our file systems.
2. The advent of the Internet has been a ………….... in science and technology.
3. I was an exam …………………… in IT center of our faculty.
4. ………………… robots are used for investigation in serious and dangerous situations at
the time of war.
5. The ……………. won’t broadcast the news about recent banking Hackers.
Activity
Make proper English sentences for the following words.
1. …………………………………………………………………………………...........................................……. .
2. …………………………………………………………………………………...........................................……. .
3. …………………………………………………………………………………...........................................……. .
4. …………………………………………………………………………………...........................................……. .
5. …………………………………………………………………………………...........................................……. .
Listening
Activity
Listen to the recording carefully and fill in the blanks from the words below:
Activity
Exchange your papers with your partners. Listen again and try to make corrections on
your partner’s papers.
Skimming
Skim the passage for two minutes and then write the following items:
The Internet
It’s hard to imagine life without the Internet, the largest computer network in the
world. It’s actually a network of networks that connects billions of computer users
globally. We use it to shop, to communicate, to research, to find places and get directions,
and to entertain ourselves. It’s accessible from our computers, smartphones, and portable
music players (PMPs), and we can get to it while at home, at work, at school—even at
Starbucks or in the car. But what exactly is the Internet, and how did it begin?
The concept of the Internet was developed while the United States was in the midst
of the Cold War with the Soviet Union. At that time, the U.S. armed forces were becoming
increasingly dependent on computers to coordinate and plan their activities. They needed
a computer system that would operate efficiently and that was located in various parts of
the country so that it could not be disrupted easily in the event of an attack.
At the same time, researchers hoped the Internet would address the problems
involved with getting different computers to communicate with each other.
Although computers had been networked since the early 1960s, there was no
reliable way to connect computers from different manufacturers because they
Unit 16 The Internet 114
used different proprietary designs and methods of communication. What was
lacking was a common communication method that all computers could use. The
Internet was created to respond to these two concerns: establishing a secure form
of military communications and creating a means by which all computers could
communicate.
Because the World Wide Web (WWW or the Web) is what we use the most, we
sometimes think of the Internet and the Web as being interchangeable. However,
the Web is only one component of the Internet, the means we use to access
information over the Internet (hence the www at the beginning of Web addresses).
Other components of the Internet include FTP, Gopher, Telnet, and Bit Torrent.
What distinguishes the Web from the rest of the Internet is its use of
• common communication protocols that enable different computers to talk to
each other and display information in compatible formats, and
• special links that enable users to navigate from one place to another on the Web.
The Web was invented many years after the original Internet. In 1989, Tim
Berners-Lee, a physicist at the European Organization for Nuclear Research
(CERN), wanted a method or linking his research documents so that other
researchers could access them. In conjunction with Robert Cailliau, Berners- Lee
developed the basic architecture of the Web and created the first Web browser (or
browser), software that enables a user to display and interact with text and other
media on the Web. The original browser could handle only text and was usable only
on computers running the NeXT operating system, a commercially unsuccessful
operating system (OS), which limited its usage. So Berners-Lee put out a call to the
Internet community to assist with development of browsers for other platforms. In
1993, the National Center for Super- computing Applications released its Mosaic
browser for use on the Macintosh and Windows operating systems. Mosaic could
display graphics as well as text. The once- popular Netscape Navigator browser
evolved from Mosaic and heralded the beginning of the Web’s monumental growth.
(Evans. Alan, et al. (2012) Complete Technology in Action. Pearson Education, Inc., U.S.A, 8th ed.)
True or False?
Read the sentences and mark T or F.
1. The concept of the Internet was developed in 1960s. .................
2. The main purpose of creating the Internet was establishing a secure .................
form of military communications.
3. Vinton Cerf and Robert Kahn are known as father of the Internet .................
because the first real communication occurred between their
computers via the Internet.
4. Developing web browsers (Mosaic and Netscape Navigator ) was the .................
beginning of the Web’s monumental growth.
Activity
Consider the information based on the reading passage. Work with a partner to answer
the questions below.
Group work
Sit in groups of four students. Talk about the usage of the Internet in academic places
such as the university, especially computer science faculty. Then limit your topic to
advantages and disadvantages of the Internet. List them in the chart below.
Activity
Homework: Write a paragraph about the way you benefit from the Internet.
Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language.
1. ………………………………………………………………………………...........................................………. .
2. ………………………………………………………………………………...........................................………. .
3. ………………………………………………………………………………...........................................………. .
4. ………………………………………………………………………………...........................................………. .
5. ………………………………………………………………………………...........................................………. .
Activity
Dictation: Listen to the recording carefully and write every word you hear. Don’t add
something of your own!
Group Communication
Activity
Exchange your papers with your partners. Listen again and try to make corrections on
your partner’s papers.
Before you Read
Scanning
Scan the passage and then try to name some popular social networking sites which
have many users around the world.
1. .......................................
2. .......................................
3. .......................................
4. .......................................
Unit 17 Social Networking 120
Reading
Social Networking
Social networking is a means by which people use the Internet to communicate
and share information among their immediate friends, and meet and connect with
others through common interests, experiences, and friends. Social networking
services such as Facebook (facebook.com) and MySpace (myspace.com) have
become amazingly popular because they provide ways for members to communicate
with their friends in a variety of means such as by voice, chat, instant message, and
videoconference so that members don’t need separate communication accounts.
These services were first accepted broadly among the younger, nonprofessional
population, but now many adults create their own social networking profiles on
Facebook and MySpace. In fact, the largest increase of Facebook users in 2009 was
adults aged 55 and over, with a growth rate of nearly 925%! Ning (ning.com) is a
social networking site that allows you to create your own network around your own
common topic or join a social networking group that has already been formed.
Social networking sites are a great way to exchange photos, but again, use
caution when posting images. Although privacy settings may offer some comfort,
some images may be available for view through search engines and may not
require site registration to be viewed. Online images may become public property
Unit 17 Social Networking 121
and subject to reproduction, and there might be some images that you don’t want
distributed. Additionally, many employers use social networks as another means of
gaining information about a potential job candidate before granting an interview or
extending a job offer. The responsibility for your content rests with you. Make sure
your profile, images, and site content project an image that accurately represents
you.
(Evans. Alan, et al. (2012) Complete Technology in Action. Pearson Education, Inc., U.S.A, 8th ed.)
True or False?
Read the sentences and mark T or F.
1. Social networking is only beneficial for elderly people. .................
2. It is not true that social networking is just for fun. .................
3. If you use Facebook, you will be serviced in different ways to communicate .................
with your friends.
4. Comparing to the past, modern social networking sites’ privacy .................
policies haven’t been improved.
Activity
For each item below, circle the best answer(s).
3. You can create your own network about your favorite topic by…………………
a. Facebook
b. Myspace
c. Ning
d. Linkedin
Activity
Complete each statement with a reason from the list on the right. Write the number of
the sentence.
Sentence Reasons
1. Ali went to London because it provides different services.
2. Antivirus software is essential for because it protects your computer from
computers malware.
3. He is so proud because he want to study programming.
4. Facebook is popular because he is a very famous computer
engineer.
Activity
Complete the following sentences using you own reasons.
Group work: First, discuss about the services provided by social networking sites for
the people who are using them. Secondly, talk about your own experiences. Ask and
answer your classmates some questions like the following:
Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language.
Activity
Make meaningful English sentences with the words from the box.
1. ……………………………………………………………………………………………..................................... .
2. ……………………………………………………………………………………………..................................... .
3. ……………………………………………………………………………………………..................................... .
4. ……………………………………………………………………………………………..................................... .
5. ……………………………………………………………………………………………..................................... .
Activity
Listen to the recording carefully and fill in the blanks using the words below:
Teenage Hackers
These ……………… hackers are often referred to as script kiddies. Script kiddies don’t
create the programs they use to ……………. into computer systems; instead, they use
…………. created by skilled hackers that enable ……………..novices to wreak the same
………….. as professional hackers. Fortunately, because the users of these programs are
amateurs, they’re usually not …………………. at covering their electronic tracks. Therefore,
it’s relatively easy for ……………..enforcement officials to track them down and prosecute
them. Script kiddies ………………..............can cause a lot of disruption and damage to
computers, networks, and Web sites.
Activity
Exchange your books with your partners. Listen again and try to make corrections on
your partner’s books.
Scanning
Scan the passage and then answer the following questions.
Reading
Some hackers are offended by being labeled as criminals and therefore attempt
to classify different types of hackers. A hacker who breaks into systems just for the
challenge of it (and who doesn’t wish to steal or wreak havoc on the systems) may refer
to him- or herself as a white-hat hacker. These individuals tout themselves as experts
who are performing a needed service for society by helping companies uncover the
vulnerabilities in their systems.
Unit 18 Computer Threat: Hackers of View 128
White-hat hackers look down on those hackers who use their knowledge to
destroy information or for illegal gain. A term for these more villainous hackers is
black-hat hacker. (The terms white hat and black hat are references to old Western
movies in which the heroes wore white hats and the outlaws wore black hats.)
Regardless of the hackers’ opinions, the laws in the United States and in many other
countries consider any unauthorized access to computer systems a crime.
Some hackers just like to snoop. They enjoy the challenge of breaking into
systems and seeing what information they can find. Other hackers are hobbyists
seeking information about a particular topic wherever they can find it. Because
many people keep proprietary business information on their home computers,
hackers bent on industrial espionage may break into home computers. For other
hackers, hacking is a way to pass time.
Once a hacker has your credit card information, he or she can either use it
to purchase items illegally or sell the number to someone who will. If a hacker
steals the login ID and password to an account where you have your credit
card information stored (such as eBay or Amazon), he or she can also use your
account to purchase items and have them shipped to him- or herself instead of
Unit 18 Computer Threat: Hackers of View 129
to you. If hackers can gather enough information in conjunction with your credit
card information, they may be able to commit identity theft. Identity theft is
characterized by someone using personal information about you (such as your
name, address, or Social Security number) to assume your identity for the purpose
of defrauding others. Although this sounds scary, you can easily protect yourself
from packet sniffing by installing a firewall and using data encryption on a wireless
network .
Trojan Horses
Hackers often use individuals’ computers as a staging area for mischief. To commit
widespread computer attacks, for example, hackers need to control many computers
at the same time. To this end, hackers often use Trojan horses to install other
programs on computers. A Trojan horse is a program that appears to be something
useful or desirable (like a game or a screen saver), but while it runs does something
malicious in the background without your knowledge. The term Trojan horse derives
from Greek mythology and refers to the wooden horse that the Greeks used to sneak
into the city of Troy and conquer it. Therefore, computer programs that contain a
hidden (and usually dreadful) “surprise” are referred to as Trojan horses.
( Evans. Alan, et al. (2012) Complete Technology in Action. Pearson Education, Inc., U.S.A, 8th ed.)
True or False?
Read the sentences and mark T or F.
1. In the U. S. if you access to a computer system without official .................
permission, you would be counted as a criminal.
2. Hackers don’t always destroy PCs. .................
3. At the time you are online, it is not possible for the hackers to sniff .................
your credit card and bank account information which is on your hard
drive of your computer.
4. The packet sniffer is a key factor in hacking computer users’ PCs. .................
5. In order to commit widespread computer attacks, hackers don’t need .................
to control many computers at the same time.
Grammar - Writing
Activity
Read the passage again to find out more examples of can expressing ability or possibility.
Can (ability):
1. ……………………………………………………………………………………………………………………………………
…………………………………………………………................................................................................
2. ………………………………………………………………………………………………………………………………….
…………………………………………………………................................................................................
Can (possibility):
1. ……………………………………………………………………………………………………………………………………
…………………………………………………………................................................................................
2. ………………………………………………………………………………………………………………………………….
…………………………………………………………….............................................................................
Activity
Note whether CAN, in the following sentences, expresses the ability or possibility.
1. The hackers who can destroy your system are called black – hat hackers. (ability)
2. Your computer data can be stolen by hackers while being online.
3. The government can imprison the hackers because unlawful use of others systems is a crime.
4. You can draw pictures by your computer.
Activity
Role play: Suppose your partner is a professional hacker. Ask him or her which type of
hacker (White – hat or Black – hat) he or she is. Then ask about his or her activities,
interests and so on.
Activity
Now, come in front of the class and perform your interview.
Activity
Homework: What do you think about Hackers? Write a short paragraph about hackers
according to your own opinions.
Activity
In the chart below, the words’ English synonyms or definitions are given; write their
meanings in your native language.
Activity
Write meaningful English sentences with the words from the box.
1. ……………………………………………………………………………………………........................................
2. ……………………………………………………………………………………………........................................
3. ……………………………………………………………………………………………........................................
4. ……………………………………………………………………………………………........................................
5. ……………………………………………………………………………………………........................................
Listening
Activity
Dictation: Listen to the recording carefully and write every word you hear. Don’t add
something of your own!
HTTP
Activity
Exchange your books with your partners. Listen again and try to make corrections on
your partner’s books.
Scanning
Scan the passage and then fill in the blanks.
Reading Passage
Logical Ports
Logical ports are virtual—that is, not physical— communications gateways or
paths that allow a computer to organize requests for information (such as Web
page downloads or e-mail routing) from other networks or computers. Unlike
physical ports (USB, FireWire, and so on), you can’t see or touch a logical port; it is
part of a computer’s internal organization.
Logical ports are numbered and assigned to specific services. For instance,
logical port 80 is designated for hypertext transfer protocol (HTTP), the main
communications protocol (or standard) for the World Wide Web. Thus, all requests
for information from your browser to the Web flow through logical port 80. E-mail
messages sent by simple mail transfer protocol (SMTP), the protocol used for
sending e-mail on the Internet, are routed through logical port 25. Open logical
ports, like open windows in a home, invite intruders, as illustrated in Figure on the
front page of this chapter. Unless you take precautions to restrict access to your
logical ports, other people on the Internet may be able to access your computer
through them. Fortunately, you can thwart most hacking problems by installing a
firewall.
Firewalls are named after a housing construction feature. When houses were
first being packed densely into cities, they were attached to each other with
common walls. Fire was a huge hazard because wood burns readily. An entire
neighborhood could be lost in a single fire. Thus, builders started building common
walls of nonflammable or slow-burning material to stop, or at least slow, the spread
of fire. These came to be known as firewalls.
Types of Firewalls
As noted earlier, firewalls can be configured using either software or hardware
devices. Although installing either a software or a hardware firewall on your home
network is probably sufficient, you should consider installing both for maximum
protection.
1. Software Firewalls
Most current operating systems include reliable firewalls. Many security suites
such as Norton Internet Security, McAfee Internet Security, and Zone Alarm
Internet Security Suite also include firewall software. Although the firewalls that
come with Windows 7 and OS X will protect your computer, firewalls included in
security suites often come with additional features such as monitoring systems that
alert you if your computer is under attack.
If you are using a security suite (say, for virus protection and parental controls)
that includes a firewall, you should disable the firewall that came with your
operating system. Two firewalls running at the same time can conflict with each
other and can cause your computer to slow down or freeze up.
2. Hardware Firewalls
You can also buy and configure hardware firewall devices. Many routers sold
for home networks include firewall protection. Just like software firewalls, the
setup for hardware firewalls is designed for novices, and the default configuration
on most routers keeps unused logical ports closed. Documentation accompanying
routers can assist users with more experience in adjusting the settings to allow
access to specific ports if needed.
(Evans. Alan, et al. (2012) Complete Technology in Action. Pearson Education, Inc., U.S.A, 8th ed.)
True or False?
Read the sentences and mark T or F.
1. According to this article, the Logical ports not only allow a computer .................
to organize other network or computers’ requests, but also invite the
hackers to attack on PCs.
2. You can close the open Logical ports in order to get rid of hackers .................
and other invaders to your PCs by installing personal firewalls.
3. If you install only the software firewall, not the hardware firewalls as .................
well, on your personal computer, your computer won’t be protected.
4. If you run two software firewalls at the same time, your computer .................
will be more protected.
Activity
For each item below, circle the best answer(s).
1. The E- mail messages which are sent by SMTP are routed through …………………..
a. Logical Ports 80
b. Logical Ports 25
c. Hypertext Transfer Protocol
d. None of the above
2. The main communication protocol for the World Wide Web is ………………………
a. Logical Ports 80
b. Logical Ports 25
c. Hypertext Transfer Protocol
d. All the above
3. If you have the operating system firewall software as well as the security suite
firewall software, you are recommended to …………………………
a. disable the security suit firewall
b. disable the operating system firewall
c. enable both of them at the same time
d. use none of them
Grammar - Writing
Gerund used as subject & object
A gerund is the –ing form of a verb when it is used as a noun. It can be used
both as subjects and objects.
Gerund used as subject: Gerund used as object:
Example: Example:
Hacking other computers is his habit. He enjoys hacking other computers.
Unit 19 Logical Ports and Firewalls 138
Activity
Use the following gerunds as subjects and as objects into proper sentences.
As subjects:
1. ………………………………………………………………………………………….....................................……
2. ………………………………………………………………………………………….....................................……
3. ………………………………………………………………………………………….....................................……
4. ………………………………………………………………………………………….....................................……
5. ………………………………………………………………………………………….....................................……
As objects:
1. ………………………………………………………………………………………….....................................……
2. ………………………………………………………………………………………….....................................……
3. ………………………………………………………………………………………….....................................……
4. ………………………………………………………………………………………….....................................……
5. ………………………………………………………………………………………….....................................……
Activity
Reread the reading passage to look for gerund. Write them in the blanks (at least 4
examples) and state whether they are used as subjects or objects.
1. ………………………………………………………………………………………….....................................……
2. ………………………………………………………………………………………….....................................……
3. ………………………………………………………………………………………….....................................……
4. ………………………………………………………………………………………….....................................……
Activity
Group Work: Among your group members, try to find the students whose computers
have been recently hacked. Ask them questions such as the following questions:
1. Has your computer been ever hacked?
2. How did you understand that problem?
3. How your PC’s data or information was affected?
4. What did you do then?
5. Have you ever installed a firewall software or hardware on your personal computer?
6. ………………………………………………………………………………………….....................................……
7. ………………………………………………………………………………………….....................................……
8. ………………………………………………………………………………………….....................................……
9. ………………………………………………………………………………………….....................................……
10. ………………………………………………………………………………………….....................................…
Unit 19 Logical Ports and Firewalls 139
Activity
Homework: Write a short paragraph about the following topic.
Activity
In the chart below, English synonyms or definitions are given; write their meanings in
your native language.
1. …………………………………………………………………………………………….......................................
2. …………………………………………………………………………………………….......................................
3. …………………………………………………………………………………………….......................................
4. …………………………………………………………………………………………….......................................
5. …………………………………………………………………………………………….......................................
Listening
Activity
Listen to the recording twice and then write the summary of what you heard using your
own words.
Unit 20 Password Protection and Password Management 142
Can I use a password to restrict access to my computer?
Activity
Exchange your papers with your partners. Listen again and try to make corrections on
your partner’s papers.
Scanning
Scan the passage and then full in the blanks.
1. It is the ……………….. passwords that prevent hackers to inter into our computers.
2. A strong pass word should be ……………………………………………………...... .
3. Most current Internet security suites and Web browsers make it easy to keep track of
passwords by providing ……………………………………………………………… .
Reading
Many people use extremely weak pass- words. The Imperva Application Defense
Center (a computer security research organization) conducted a review of 32 million
passwords that were used at the Web site rockyou.com. More than 345,000 people were
using “12345,” “123456,” or “123456789” as their password. And almost 62,000 people
were using “password”! Passwords such as these are extremely easy for hackers to crack.
You can use online password strength testers, such as The Password Meter
(passwordmeter.com) or Microsoft’s test (microsoft.com/protect/ yourself/
password/checker. mspx), to evaluate your passwords. The Password Meter
provides guidelines for good passwords and shows you how integrating various
elements (such as symbols) affects the strength score for your password.
You should also not use the same password for every account that you have.
Because remembering constantly changing strong passwords for numerous
accounts can be a challenge, you should use password- management tools to make
the process easier to handle. If you have trouble thinking of secure pass- words,
there are many password generators available for free, such as Perfect Passwords
(grc.com/passwords.htm) and the Bytes Interactive Password Generator
(goodpassword.com).
Even though you only need to remember the master password, you still need
to make sure that it is a secure password (according to the rules we discussed
earlier) and that you change it on a regular basis. Password managers are useful
on the machine that you use on a regular basis. However, if you need to access
your accounts from another computer (such as one at university), you will still
need to know the individual pass- words for each site you wish to access. So start
using secure passwords and let your browser (on your main computer) relieve
you of the problem of trying to remember them all.
( Evans. Alan, et al. (2012) Complete Technology in Action. Pearson Education, Inc., U.S.A, 8th ed.)
True or False?
Read the sentences and mark T or F.
1. Sometimes, passwords are the major way to restrict access to E- mail .................
addresses.
2. Passwords like 123456 or 1234567 are less distinguishable by .................
hackers.
3. A strong password is consisting of a number, a symbol, some upper .................
and lowercase letters associated with your birthdate.
4. There are some websites that help you create strong and secure .................
passwords or evaluate the strength of your passwords.
5. If you use password management for remembering your passwords,
you will no longer need to be worried of forgetting different and .................
difficult passwords.
Activity
Consider the information given in the above article then discuss the following questions
with your partner.
That clause:
Clause Definition: A group of words that forms part of a sentence and has its
own subject and verb.
Example: Main clause: Password managers are
Password managers are useful on the useful on the machine. (complete
machine that you use on a regular thought)
basis. Dependent Clause: that you use on a
regular basis (incomplete thought)
Activity
Reread the reading passage and find at least 5 sentences that include a clause and then
underline the clauses.
1. ..................................................................................................................................... .
2. ..................................................................................................................................... .
3. ..................................................................................................................................... .
4. ..................................................................................................................................... .
5. ..................................................................................................................................... .
Activity
Complete the three following sentences with your own information and add two more
sentences containing that clause.
Activity
Pair Work: Make a conversation with your partner about how you create your own
computer and e- mails’ passwords and provide them security?
Student A: From the time my computer password was cracked, I am very careful and
use password for my computer. What about you?
Student B: To tell you the truth, I used to ignore this fact that our computer and private
accounts would be in danger. Because of this ignorance my e – mail….
Activity
Homework: Write a short paragraph about the following topic.
2. Clarke. Glen E., (2009) Comp TIA Network + : Mc Graw- Hill Companies, United
States. p. 4
3. Deitel, P. J., Deitle, H. M. (2011). JAVA: How to Program. Pearson Higher Education.
Upper Saddle River, New Jersey. p. 34- 35.
5. Evans. Alan, et al. (2012) Complete Technology in Action. Pearson Education, Inc.,
U.S.A, 8th ed. P. 94-95+.
8. Ludwig. Mark A. (1996) The Black Book of Computer Viruses. Types of Computer
Viruses. American Eagle Publication, Inc. Show Low, Arizona (1996).
10. Silber. Schatz, Peter Bare Galvin and Greg Galvin and Greg Gagne. (2005) Operating
System Concept. USA. John Wiley and sons, Inc. p. 3-5.
11. Smith, Roderick W. (2004) Linux +. Workstations. SYBEX Inc. 1151 Marina Villiage.
148
List of images in the book
1. basic.mindteq.com
2. Clarke. Glen E., (2009) Comp TIA Network + : Mc Graw- Hill Companies, United States
1. designyoutrust.com
2. Evans. Alan, et al. (2012) Complete Technology in Action. Pearson Education, Inc.,
U.S.A, 8th ed. P. 94-95+.
3. hautesecure.com
6. maxupdates.tv
7. http://www.fotosearch.com k5540067
8. http://www.fotosearch.com k6042481
9. http://www.fotosearch.com k 9669827
12. http://www.novapdf.com/uploads/novapdf_en/media_
13. http://technorati.com/technology/article/viruses-are-rampant-in-hospitals/
14. http://www.flickr.com
15. https://599cd.com
17. http://xda-developers.com
18. http://technicalhut.blogspot.com
149