[Type here] UNIT 1 INTERNET APPLICATIONS Task 1 Make a list of all the things you can use the Internet for. Task 2 Which of the Internet applications (1-10) you would use to perform the tasks (a-j). Read Part 1 of the Internet FAQs to check your answers. 1. Email 2. The Web 3. Newsgroups 4. Chat – IM 5. IoT 6. FPT 7. Telnet 8. Web browser 9. Facebook 10. Icloud The a. Connecting a system of interrelated computing devices, mechanical and digital machines, objects…… to achieve better performance and efficiency. b. Accessing information on the web. c. Coordinating a large range of devices with internet connectivity to exchange messages, post status updates, share photos, videos and links. d. Enabling automatic synchronization across computers and iOS devices of email mailboxes, documents, photos…. e. Transferring files from the Internet to your hard drive. f. Sending a message to another person via the Internet. g. Conducting a live conversation online. h. Taking part in public discussion areas devoted to specific topic. i. Downloading and viewing documents published on the Internet. j. Communicating with devices over a network in plain text. Internet FAQs: Part 1 What is the Internet (the Net)? When was it created? The internet is the world’s most popular computer network. It began as an academic research project in 1969 to share information on research and development in scientific and military fields, and became a global commercial network in the 1990s. Today it is used by more than 2 billion people around the world. The World Wide Web (the Web)? The World Wide Web (www) is a popular way to publish information on the internet. The web was created by Timothy Berners-Lee, a computer programmer at the European scientific research organization CERN, in 1991. The web supported hyperlinks, allowing users to browse from one document to another. Over time, the web became increasingly sophisticated, supporting images, audio, video, and interactive content. In the mid-1990s, companies such as Yahoo and Amazon began building profitable businesses based on the web. Using a program called a web browser or search engine such as Google or Internet Explorer, we can search, view and print web pages with a single click. The web has become [Type here] so popular that many people now regard it as synonymous with the internet itself. Although it offers a more powerful and user-friendly interface than other internet applications, technically, the web is just one of many internet applications. What’s an IP address? Internet Protocol addresses are numbers that computers use to identify each other on the internet. For example, an IP address for vox.com is 216.146.46.10. Email? Email or e-mail (short for electronic mail) is a method for exchanging messages between people all over the world using the internet and electronic devices (computers, tablets, smartphones…). Email communication is not only used in lieu of letter writing, it has also replaced telephone calls in many social situations and in professional environments. Email addresses are written with a custom username at the beginning followed by the email service provider's domain name, with an @ sign separating the two. Here's an example: name@gmail.com. What does TCP/IP mean? The language used for data transfer on the Internet known as TCP/IP ( Transmission Control Protocol/Internet Protocol). This is like the internet operating system. Every computer connected to the Net is identified by a unique IP address. FTP? The File Transfer Program (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network. Chat and Instant Messaging? Chat and Instant Messaging (IM) technologies allow you to real-time conversation online, by typing messages at the keyboard. Telnet? Telnet (Teletype network) is a client-server protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. With Telnet, you can access remote computers through a text-based interface from the comfort of your home or office. It helps you save time and fix problems easily thanks to using plain text. Unfortunately, it’s not secure, boring (no graphics), and difficult to use because of limitations of plain text and command typing. Newsgroups? Newsgroups are the public discussion areas which make up a system called Usenet. The contents are contributed by people who post articles or respond to articles, create chains of related postings called message threads. You need a newsreader to subscribe to newsgroups and to read & post messages. The newsreader may be a stand-alone program or part of a web browser. Internet of Things? The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data, creating [Type here] opportunities for more direct integration of the physical world into computer-based systems, resulting in efficiency improvements, economic benefits, and reduced human exertions. Social networking? Social networking and collaborative services have grown rapidly, enabling people to communicate and share interests in many more ways. Sites like Facebook, Twitter, LinkedIn, YouTube, Flickr, Second Life, blogs, Instagram, wikis, and many more let people of all ages rapidly share their interests of the moment with others everywhere. What is the cloud (icloud)? The cloud describes an approach to computing that has become popular in the early 2000s. By storing files on servers and delivering software over the internet, cloud computing provides users with a simpler, more reliable computing experience. For example, Google Docs is a cloud office suite. When a user visits docs.google.com, he/she automatically gets the latest version of Google Docs. Because his/her files are stored on Google’s servers, they’re available from any computer. Even better, he/she doesn’t have to worry about losing her files in a hard drive crash. There are many other examples. Gmail and Hotmail are cloud email services that have largely replaced desktop email clients such as Outlook. Dropbox is a cloud computing service that automatically synchronizes data between devices, saving people from having to carry files around on floppy disks. Apple’s iCloud automatically copies users’ music and other files from their desktop computer to their mobile devices, saving users the hassle of synchronizing via a USB connection. Task 3 Match the terms in Column A with the statements in Column B. Column A 1. Computer network 2. Web page 3. Text-based interface 4. Internet protocol 5. Service provider 6. Data transfer 7. Plain text 8. Stand-alone program 9. Client-server protocol 10. Real-time conversation Column B a. The part of an operating system or program which displays information in the form of texts. b. A term for data that represent only characters of readable material. c. A number of interconnected computers. d. A document that is suitable for the Web and web browser. e. The process of using computing techniques and technologies to transmit digital or analog information from one computer to another. f. An organization that supplies users with facilities to access or take part in the Internet. g. The principal communications method in a computer network by which data is sent and received. h. A computer software that can work offline, i.e. does not necessarily require network connection to function. [Type here] i. Any mode of telecommunications in which all users can exchange information instantly. j. Two-way communication mechanism that allow humans to get information from web sites. Task 4 1. 2. 3. 4. 5. 6. 7. Read the text and find the following. The place where your ISP stores your emails. The type of program used to read and send email from a computer. The part of an email address that identifies the user of the service. The line that describes the content of an email. The computer file which is sent along with an email message. Facial symbols used to indicate an emotion or attitude. The name given to junk mail. EMAIL FEATURES When you set up an account with an Internet Service Provider, you are given an email address and a password. The mail you receive is stored on the mail server of your ISP – in a simulated mail box – until you next connect and download it to your hard drive. There are two ways to get email over the Internet. One is by using mail program (known as an email client) installed on your computer, for example Eudora or Outlook Express. The other way is to use web-based email, accessible from any web browser. Hotmail and Gmail are good examples. You can make the message more expressive by including emoticons, also called smileys. For example, ;-) for happy, ;-( for sad, ;-o for surprise and ;-D for laughing etc. You may also like to add a signature file, a pre-written text file appended to the end of the message. The name given to unsolicited email messages is spam. The anatomy of an email [Type here] Task 5 Fill in the blank (1-9) with appropriate words. 1. An email ………… usually consists of four elements: name@company.organization code.country code e.g. hanh@teg.edu.vn 2. Most …………. allow you to choose anything you want for an email name. 3. ……………… is a unique designation for the computer storing the addressee's email. This is usually the name of the organization which owns the machine. 4. A three letter code which designates the type of institution that operates the computer where the addressee's email is stored is called ………….. 5. Many addresses in the US don’t include a location symbol, but some do. Addresses in other nations always include …………….. 6. Including an ………….. in an email is a simple way to share documents and images. [Type here] 7. The majority of the email sent worldwide is ………... Fortunately, ………….. exists as a means of sorting through legitimate email versus spam before it reaches your inbox. 8. CC stands for ………….. Put email address(es) here if you plan to send a copy to other recipients in addition to those listed in the ‘To’ field. 9. A ………… is a block of contact information appearing at the bottom of an email. 10. If you don’t want the other recipients to know that the mail was also sent to this email address, use the ………. . 11. The …………….. of an email is a description of the message. The best ones are usually short, descriptive and provide the recipient with a reason to open the email. 12. In an email, the body (message content) is always preceded by …………… that identify particular routing information of the message, including the sender, recipient, date and subject. Some are mandatory, such as the FROM, TO and DATE. Others are optional, but are very commonly used, such as SUBJECT and CC. Task 6 Match the parts of the letter (A-H) with the descriptions (1-8). C The Editor EL Independiente Moratin, 7 28006 Madrid Spain A Rhondda High School 31 Prospect Place,Cardiff, Wales B 28th March 2008 D Dear Sir/Madam, E We are writing to ask if you can help us with our school project. We are doing a survey of the major newspapers in the European Union to find out which computer systems and desktop publishing programs they use. F We would be very grateful if you could tell us which hardware, graphic design and page layout software you use at El Independiente. Could you also tell us how long your online edition has been running for? Thank you very much in advance. G We look forward to hearing from you. H Yours faithfully, Katherine Powell Katherine Powell, Student representative [Type here] 1. For example, 28th March 2008, or 28 March 2008, or 28/03/2008. 2. This is usually in the top right corner of the letter, but can be in the centre if it's a printed letterhead. 3. State the reason for writing: I am I We are writing to ... I We are currently … 4. This should be included on the left hand side of the page, before the greeting. 5. Start with Dear Sir/Madam or Dear Mr/Mrs/Ms ... Use Ms if you are not sure if the recipient is married or not. It is often best to use Ms, as Mrs can cause offence. 6. Make any requests or ask any questions you need to: We would be grateful if you could ..., Could you also ... 7. Request further contact, if necessary: Well look forward to hearing from you; / Please contact us by ... 8. If you have started the letter with the person's name (for example, Dear Mr, Robinson), then end with Yours sincerely. If you do not know the name of the recipient, end with Yours faithfully. Task 7 1. 2. 3. 4. 5. 6. 7. 8. 9. Rewrite each of these warnings according to the prompt. Add a reason to the warning. Never give out your password. This appliance must be earthed. Avoid turning off main power while computer is running. It’s an offence to make unauthorized access to computer material. No smoking, eating or drinking at the computer. Use an IC extraction tool, don’t use a screwdriver. Don’t give open access to PC’s. Always ensure the power is switched off when working on a computer. Don’t use out-of-date anti-virus software. Task 8 Discuss the advantages and disadvantages of emails. Task 9 Find out IP addresses of these websites and explain the meaning of their parts. www.hcmute.edu.vn www.sunderland.ac.uk www.amazon.com [Type here] UNIT 2 THE WEB Task 1 Look at the screenshot of a typical web page. How many of the features (a-k) can you say in English? Task 2 Read the following text and label the features on the screenshot with the terms in bold. A TYPICAL WEB PAGE At the top of the page is the URL address. URL means Uniform Resource Locator - the address of a file on the Internet. A typical URL looks like this: http://www.bbc.computer.uk/radlo/. In this URL, http:// means Hypertext Transfer Protocol and tells the program to look for a web page, www means world wide web, bbc.computer.uk is the domain name of the server that hosts the website - a company based in the UK; other toplevel domains are .com (commercial site), .edu (education), .org (organization) or .net (network); radio is the directory path where the web page is located. The parts of the URL are separated by (dot), / (slash) and: (colon). Some sites begin fpt://, a file transfer protocol used to copy files from one computer to another. The toolbar shows all the navigation icons, which let you go back one page or go forward one page. You can also go to the home page or stop the current transfer when the circuits are busy. [Type here] Tab buttons let you view different sites at the same time, and the built-in search box helps you look for information. If the feed button lights up, it means the site offers RSS feeds, so you can automatically receive updates. When a web page won't load, you can refresh the current page, meaning the page reloads (downloads again). If you want to mark a website address so that you can easily revisit the page at a later time, you can add it to your favourites (favorites in American English), or bookmark it. When you want to visit it again you simply click show favourites. On the web page itself, most sites feature clickable image links and clickable hypertext links. Together, these are known as hyperlinks and take you to other web pages when clicked. Task 3 Study this URL (Uniform Resource Locator). domain name extension country code http://www.hw.ac.uk/libWWW/irn/irn.html protocol prefix Web service domain directory path document name Which part of the address tells you: 1. the company is in the UK 2. this is the webpage 3. the type of transmission standard your browser must use to access the data 4. this points to the computer where the webpage is stored 5. this is where the webpage is stored in the computer 6. this is a company 7. this is a Web file Task 4 Match these approved domain name extensions and their meanings. Extension 1/ .aero 2/ .biz 3/ .com (.co in UK) 4/ .coop 5/ .edu (.ac in UK) 6/ .gov 7/ .info 8/ .int 9/ .mil 10/ .net Meaning a/ cooperatives b/ gateway or host c/ military agency d/ government e/ professionals f/ aviation industry g/ commercial h/ educational and research i/ international organization j/ non-profit organization [Type here] 11/ .org 12/ .pro Task 5 k/ businesses l/ general use Read the article quickly and find websites for the following tasks. 1. to search for information on the Web 2. to buy books and DVDs 3. to participate in political campaigns 4. to view and exchange video clips 5. to manage and share personal photos using tabs 6. to buy and sell personal items in online auctions 7. to download music and movies, sometimes illegally 8. to look up the meanings of new terms 9. to make free phone calls or video conferencing 10. to set up a virtual world in which users can pretend to be whomever – or whatever – they want to be. TOUR THE COLLECTIVES OF CYBERSPACE The Internet isn't just about email or the Web anymore. Increasingly, people online are taking the power of the Internet back into their own hands. They're posting opinions on online journals - weblogs, or blogs; they're organizing political rallies on MoveOn.org; they're trading songs on illegal file-sharing networks; they're volunteering articles for the online encyclopedia, Wikipedia; and they're collaborating with other programmers around the world. It's the emergence of the 'Power of Us'. Thanks to new technologies such as blog software, peer-to-peer network, opensource software, and wikis, people are getting together to take collective action like never before. eBay, for instance, wouldn't exist without the 61 million active members who list, sell, and buy millions of items a week. But less obvious is that the whole marketplace runs on the trust created by eBay's unique feedback system, by which buyers and sellers rate each other on how well they carried out their half of each transaction. Pioneer e-tailer Amazon encourages all kinds of customer participation in the site including the ability to sell items alongside its own books, CDs, DVDs and electronic goods. MySpace and Facebook are the latest phenomena in social networking, attracting mlllion of unique visitors a month. Many are music fans, who can blog, email friends, upload photos, and generally socialize. There's even a 3-D virtual world entirely built and owned by its residents, called Second Life, where real companies have opened shops, and pop stars such as U2 have performed concerts. Some sites are much more specialized; such as the photo-sharing site Flickr. There, people not only share photos but also take the time to attach tags to their pictures, which help everyone else find photos of, for example, Florence, Italy. Another successful example of a site based on user-generated content is YouTube, which allows users to upload, view and share movie clips and music videos, as well as amateur videoblogs. Another example of the collective power of the internet is the [Type here] Google search engine. Its mathematical formulas surf the combined judgements of millions of people whose website link to other sites. When you type Justin Timberlake into Google's search box and go to the star's official website, the site is listed first because more people are telling you it's the most relevant Justin Timberlake site - which it probably is. Skype on the surface looks like software that lets you make free phone calls over the Internet - which it does. But the way it works is extremely clever. By using Skype, you’re automatically contributing some of your PC's computing power and Internet connection to route other people's calls. It's an extension of the peer-to-peer network software such as Bit Torrent that allow you to swap songs - at your own risk if those songs are under copyright. Bit Torrent is a protocol for transferring music, films, games and podcasts. A podcast is an audio recording posted online. Podcasting derives from the words iPod and broadcasting. You can find podcasts about almost any topic - sports, music, politics, etc. They are distributed through RSS (Really Simple Syndication) feeds which allow you to receive up-to-date information without having to check the site for updates. Bit Torrent breaks the files into small pieces, known as chunks, and distributes them among a large number of users; when you download a torrent, you are also uploading it to another user. Task 6 Read the article again and match the sentence beginnings (1-5) with the correct endings (a-e). 1. A weblog, or blog, is an electronic journal 2. A peer-to-peer system allows 3. You can use a search engine to find 4. Bit Torrent is a peer-to-peer protocol used 5. RSS keeps you constantly informed Task 7 1. 2. 3. 4. 5. a. web pages on a particular subject. b. for downloading files over the Internet. c. users to share files on their computers. d. about fresh, new content on your favorite websites. e. that displays in chronological order the postings of one or more people. Finds words in the article with the following features. open source, editable web pages the same as electronic retailer, or online store a blog that includes video a program that allows you to make voice and video calls from a computer an audio broadcast distributed over the Internet Task 8 Find 03 simple sentences, 03 compound sentences, 03 complex sentences and 02 mixed sentences in the text above. Underline the main verbs in these sentences. [Type here] Task 9 Buffering is a way of ensuring that web videos run smoothly. Refer to the flowchart of video buffering and the words given to fill in the gaps in this description of buffering. Internet – buffer – movie – occur – bandwidth – streaming downloads – uninterrupted - bottom The player feeds audio or video data 100101011010 Buffer 110111011101 Data goes out to the player’s decompression and playback routines Task 10 Streaming is a way of dealing with …………. problems when you download video from the …… One key to successful …………. is the process of buffering. If you download a movie, the video player stores part of the ………… in memory while playing it. Imagine the buffer as a container filled from the top as shown in the flowchart. When the container is full, the player sends data on for playback from the ……… Data keeps coming in while a clip plays. The user can view the beginning of the movie while the rest of the clip ………… If connection slowdowns or interruptions ………… , the amount of data in the buffer decreases but as long as some remains, playback is …………… Playback continues at a steady rate until the ……….. is empty. Link each word in column A with a word which it often occurs with from column B. In some cases, more than one link is possible. Column A bulletin domain file graphical mobile search site synchronous text web Column B board button engine link map message name page phone transmission [Type here] Task 11 Listen to the recording which explains how your browser finds the webpage you want. Label the items in the illustration diagram. 1 http://www.zdnet.com 6 3 5 ---------- 3 205.136.145.101 3 2 4 a. Router b. Domain Name System (DNS) server c. Remote Web server d. Browser PC e. URL f. Internet Protocol address [Type here] UNIT 3 WEB DESIGN Task 1 1. 2. 3. 4. Discuss these questions. Why do companies have websites? What’s the difference between a website and a web page? What is a home page? Do you have a blog or personal website? Describe the home page to your classmates. Task 2 Read the following text and find the following. 1. the language used to create web documents 2. the type of software that lets you design web pages without writing HTML codes 3. the format invented by Adobe to distribute text files over the Internet 4. a method of displaying multiple HTML documents in the same browser window 5. three popular formats used to store and play back video WEB PAGE DESIGN HTML and web editors The code behind most web pages is HTML (Hyper Text Markup Language), which consists of commands called tags. Tags are placed around pieces of text to tell the web browser how to display text or pictures. You can view the source HTML code of a web page by choosing the Page Source option in your web browser. But you needn't learn HTML in order to build your own website. Instead, you can use a word processor with web design capabilities or a dedicated web editor like Macromedia Dreamweaver or Microsoft FrontPage. Web editors are user-friendly and WYSIWYG (What You See Is What You Get). Different buttons and menu items let you design a page without writing HTML. HTML files have this basic structure: [Type here] start with <HTML> have heading text that begins with <HEAD>, which has a title enclosed between tags and ends with </HEAD> have body text that starts with <BODY>, where you place the contents of the actual document (i.e, text, images, links, etc.) and ends with </BODY> end with </HTMl> You can create links to other web pages by using the tag <A HREF "filename">active text</A> Some basic HTML source code My hobbies I like music and computers. I can play the Spanish guitar and I love Latin dancing. I have a mountain bike but my favourite sport is football. My studies I study at Politecnica University, Madrid. My favourite subjects are Maths, Physics, Aeronautics and English. I have studied English for five years. In the future I would like to be an engineer. My favoutite city Zaragoza is a multicultural modern ancient city, with 700,000 inhabitants and over 2,000 years of history. Muslins, Christians and Jews have lived together in peace for many centuries. It is famous for its ‘mudejar’ style, and the charming character of its people. HTML file displayed as a web page Web page elements There are a number of different elements that you can use on a web page: Text - displayed in a variety of fonts and sizes. Most text files are available in two formats: HTML or PDF (the Portable Document Format that can be viewed with Acrobat Reader). Background - the underlying colours and patterns of a web page. Tables - with columns and rows used to position images and text on a page. [Type here] Frames - rectangular areas that allow the display of different pages in the same browser window Cascading Style Sheets (CSS) - a mechanism for adding styles to web documents. You could use HTML code to specify the font, text styles and background colour. Nowadays, however, it is more common to use CSS. This makes it easy to apply presentation changes across a website. Graphics, clip art, icons, background templates, wallpaper, and transparent images - common formats are .ipg (Joint Photographic expert Group), ideal for pictures with many colours, .gif (Graphics Interchange Format), ideal for pictures with fewer colours, and .png (Portable Network Graphics), which support 16 million colours. Hyperlinks - highlighted text or pictures (buttons, image maps, etc.) that act as links to other pages. If you want to share information with people, you can use RSS feeds and provide readers with a link to the feed. RSS allows subscribers to receive updates of bloqs, news, podcasts, etc. Before going live, you should check that all the links work. Audio, video and animation Many website now incorporate audio files, and if you're designing a site, you may like to insert songs, podcasts etc. The most common audio formats are .wav (Windows wave audio format), .ra (RealAudio file) and .mp3 (MPEG-1 Audio Layer3). Full-motion video is stored these formats: .avi (audio video interleave), .mov (QuickTime movie) and .mpg (moving picture experts group). If you want to inject something special into your web pages. You can use Adobe Flash to include interactive animations and streaming audio. Additionally, you can insert Java applets - small programs that enable the creation of interactive files. Animations are made up of a series of independent picture put together in sequence to look like moving pictures. To see or hear all these files you must have the right plug-in, an auxiliary program that expands the capabilities of your web browser. Task 3 1. 2. 3. 4. 5. 6. Read the text again and then match the sentence beginnings (1-6) with the correct endings (a-f). Instructions in HTML Cascading Style Sheets are the way A hyperlink is any clickable text, A plug-in is a small program Java applets are used to provide RSS feeds are summaries of web content a. Image or button that takes you to another place on the Web. b. used for handling audio, video, and animation files. c. are called tags. [Type here] d. interactive features to web applications. e. to define the presentation of web pages, from fonts and colours to page layout. f. published in the Really Simple Syndication format for download. Task 4 Link each pair of actions using an appropriate time clause. 1. a/ You use a search engine. b/ It provides a set of links related to your search. 2. a/ You have clicked on a hyperlink. b/ You have to wait for the webpage to be copied to your computer. 3. a/ You listen to the first part of a streamed audio file. b/ The next part is downloading. 4. a/ The graphics can be displayed gradually. b/ The webpage is downloaded. 5. a/ You receive an email message. b/ You can forward it to another address. 6. a/ The files are transferred. b/ The transfer is graphically displayed. 7. a/ The OK button is clicked. b/ The copying progress begins. 8. a/ You click the mouse pointer on the file. b/ It is highlighted. 9. a/ The virus is not activated. b/ You open the infected file. 10. a/ Don’t open an email attachment. b/ You have virus-checked it. 11. a/ You add memory. b/ Change the BIOS settings. 12. a/ You can bookmark a webpage to make it easier to find in the future. b/ You find a webpage you like. 13. a/ You type in a Web address. b/ You should press the Enter key. 14. a/ You click on the Home button. b/ The browser displays your starting webpage. [Type here] Task 5 Study these seven points for evaluating websites. What questions would you ask to evaluate a website on each point? 13. Design 14. Easy of use 15. Up to date 16. Compatibility Task 6 5. Navigation 6. Accuracy 7. Helpful graphics Study this flowchart for planning a website. Use it as the basis for a short text providing advice on website planning. Your text should have three paragraphs corresponding to the 3 stages in this diagram. KEY QUESTION WHEN PLANNING YOUR WEBSITE Careful planning is essential to maximize the impact of your website. It’ll take some effort to achieve, but the results will be worth it. Begin planning website Analysis Who’s the target audience? What’s the site’s purpose? Design & Implementation What look, feel and content will the site have? Evaluation How will it be created, rolled out and managed? How do we know If the site is effective? Begin constructing website [Type here] Begin your text like this: You need to plan your website carefully before you go ahead and create it. There are three stages to the planning process: 1. Analysis 2. Design and implementation 3. Evaluation Task 7 Fill in the gaps in these definitions (1-10) 1 A ……….. is an interface enabling dissimilar networks to communicate. 2 A …………is a hardware and software combination used to connect the same type of networks. 3 A ………… is a network transmission path handling major data traffic. 4 A ………… is a special computer directing messages when several networks are linked. 5 A ………… is a number of computers and peripherals linked together. 6 A ………… is a network connecting computers over a small distance such as within a company. 7 A ………… is a powerful computer storing data shared by all the clients in the network. 8 A …………. is a network computer used for accessing a service on a server. 9 A ………… is a simple computer comprising a processor and memory, display, keyboard, mouse and hard drives only. 10 A …………. is an electronic device connecting alt the data cabling in a network. [Type here] UNIT 4 INTERNET SECURITY Task 1 Discuss these questions. 1. Who is a hacker? 2. How easy do you think it is to infiltrate the Internet and steal sensitive information? 3. What is a computer virus? How does it work? 4. How can you protect your computer from viruses and spyware? Task 2 Read the following text quickly and see how many of your ideas in Task 1 are mentioned. SECURITY AND PRIVACY ON THE INTERNET There are many benefits from an open system like the Internet, but one of the risks is that we are often exposed to hackers, who break into computer systems just for fun, to steal information, or to spread viruses (see note below). So how document we go about making our online transactions secure? Security on the Web Security is crucial when you send confidential information online. Consider, for example, the process of buying a book on the Web, you have to type your credit card number into an order form which passes from computer to computer on its way to the online bookstore. If one of the intermediary computers is infiltrated by hackers, your data can be copied. To avoid risks, you should set all security alerts to high on your web browser. Mozilla Firefox displays a lock when the website is secure and allows you to disable or delete cookies - small files placed on your hard drive by web servers so that they can recognize your PC when you return to their site. If you use online banking services, make sure they use digital certificates - files that are like digital identification cards and that identify users and web servers. Also be sure to use a browser that is compliant with SSL (Secure Sockets Layer), a protocol which provides secure transactions. ' Email privacy Similarly, as your email travels across the Net, it is copied temporarily onto many computers in between. This means that it can be read by people who illegally enter computer systems. [Type here] The only way to protect a message is to put it in a sort of virtual envelope – that is, to encode it with some form of encryption. A system designed to send email privately is Pretty Good Privacy, a free ware program written by Phil Zimmerman. Network security Private networks can be attacked by intruders who attempt to obtain information such as Social Security numbers, bank accounts or research and business reports. To protect crucial data, companies hire security consultants who analyse the risks and provide solutions. The most common methods of protection are passwords for access control, firewalls, and encryption and decryption systems. Encryption changes data into a secret code so that only someone with a key can read it. Decryption converts encrypted data back into its original form. Malware protection Malware (malicious software) are programs designed to infiltrate or damage your computer, for example viruses, worms, Trojans and spyware. A virus can enter a PC via a disc drive - if you insert an infected disc - or via the Internet. A worm is a selfcopying program that spreads through email attachments; it replicates itself and sends a copy to everyone in an address book. A Trojan horse is disguised as a useful program; it may affect data security. Spyware collects Information from your PC without your consent. Most spyware and adware (software that allows pop-ups that is, advertisements that suddenly appear on your screen) is included with 'free' downloads. If you want to protect your PC, don't open email attachments from strangers and take care when downloading files from the Web. Remember to update your anti-virus software as often as possible, since new viruses are being created all the time. Note: Originally, all computer enthusiasts and skilled programmers were known as hacker but during the 1990s, the term hacker became synonymous with cracker - a person who uses technology for criminal aims. Nowadays, people often use the word hacker to mean both things. In the computer industry, hackers are known as white hats and crackers are called black hats or darkside hackers. · Task 3 Read the text more carefully and answer the questions. 1. Why is security so important on the Internet? 2. What security features are offered by Mozilla Firefox? 3. What security protocol is used by banks to make online transactions secure? 4. How can we protect our email and keep it private? 5. What methods are used by companies to make internal networks secure? 6. In what ways can a virus enter a computer system? 7. How does a worm spread itself? [Type here] Task 4 Match the captions (1-4) with the pictures (a-d). 1. A secure website can be recognized in two ways: the address bar shows the letter https and a closed padlock or key is displayed somewhere on the screen. 2. You have to type your username and password to access a locked computer system. 3. This program displays a message when it detects spyware and other unwanted software that may compromise your privacy or damage your computer. 4. Private networks use a software and/or hardware mechanism called a firewall to block unauthorized traffic from the Internet. (a) (b) https://www.bankinter.com (d) (c) Task 5 Complete the following sentences with appropriate words. 1. Users have to enter a ………… to gain access to a network. 2. A ………… protects a company intranet from outside attack. 3. A ………… is a person who uses their computer skills to enter computers and networks illegally. 4. …………… can infect your files and corrupt your hard drive. 5. You can download ………… from the Net; this type of software is available free of charge but protected by copyright. 6. Encoding data so that unauthorized users can't read it is known as ……… 7. This company uses ……………. techniques to decode (or decipher) secret data. [Type here] 8. Most ……… is designed to obtain personal information without the user’s permission. Task 6 1. 2. 3. 4. Read Part 1 of the text and answer these questions. Which hacking case inspired the film War Games? When did Captain Zap hack into the Pentagon? Why was Nicholas Whitely arrested in 1988? How old was the hacker that broke into the US defence computer in 1989? The history of hacking - Part 1 1971- John Draper discovered that a whistle offered in boxes of Cap'n Crunch breakfast cereal perfectly generated the 2,600 Hz signal by the AT&T phone company. He started to make free calls; He was arrested in 1972 but wasn't sent to prison. 1974- Kevin Mitnick, a legend among hackers, began hacking into banking networks and altering the credit reports of his enemies. He didn't expect that his most famous exploit – hacking into the North American Defense Command in Colorado Springs – would inspire the film War Games in 1983. 1981- Ian Murphy, a 23-year-old known as Captain Zap on the networks, hacked into the White house and the Pentagon . 1987- The IBM international network was paralysed by a hacker’s Christmas message. 1988- The Union Bank of Switzerland almost lost £32 million to hackers; Nicholas Whitely was arrested in connection with virus spreading. 1989- A fifteen-year-old hacker cracked the US defence computer. 1991- Kevin Poulsen, known as Dark Dante on the networks, was accused of stealing military files. Task 7 Complete Part 2 of the text with appropriate forms of the given verbs. show – spread – steal – launch – attempt – overwrite – be – infect – affect The history of hacking - Part 2 1992 - David L Smith (1) ……………… prosecuted for writing the Melissa virus, which was passed in Word files sent via email. 1997 – The German Chaos Computer Club (2) …………. On TV how to obtain money from bank accounts. 2000 - A Russian hacker (3) ……….. to extort $100,000 from online music retailer CD Universe. A Canadian hacker (4) ………… a massive denial of service attack against website like Yahoo! And Amazon. The I Love You virus, cleverly disguised as a love letter, (5) …..…….. so quickly that email had to be shut down in many companies. The worm (6) [Type here] image and sound files with a copy of itself. 2001 - The Code Red worm (7) ……………. Tens of thousands of machines. 2006 – Hackers (8) …………… the credit card details of, almost 20,000 AT&T online customers. However, subscribers to its service (9) (not) ………… Task 8 Look at the list of cybercrimes and discuss these questions . / 1. Which crimes are the most dangerous? 2. Is it fair or unfair to pay for the songs, videos, books or articles that you download? Should copyright infringement be allowed online? 3. What measures can be taken by governments to stop cybercrime? 4. Do you think governments have the right to censor material on the Internet? 5. Personal information such as our address; salary, and civil and criminal records is held in databases by marketing companies. Is our privacy in danger? Cybercrimes • Piracy - the illegal copy and distribution of copyrighted software, games or music files. • Plagiarism and theft of intellectual property - pretending that someone else's work is your own. • Spreading of malcious software • Phishing (password harvesting fishing) - getting passwords for online bank accounts or credit card numbers by using emails that look like they are from real organizations, but are in fact fake; people believe the message is from their bank and send their security details. IP spoofing – making one computer look like another in order to gain unauthorized access. Cyberstalking - online harassment or abuse, mainly in chat rooms or newsgroup. . Distribution of indecent or offensive material. Task 9 Study these phrasal verbs: break into get into hack into go about set about keep ahead grow up phone up run up keep at shut down throw away log on find out track down hand over Now complete each blank with the appropriate phrasal verb in the correct form . In some cases, more than one answer is possible. [Type here] 1. Hackers try to .................... passwords so they can penetrate a system. 2. Don't .................... your password to anyone who asks for it. 3. The police ...............:.... Ralph .................... by talking to his friends and acquaintances. 4. Some hackers .................... systems to get commercially valuable information. 5. When you .................... to a network, you have to provide an ID. 6. How do you ................ ... hacking into a system? 7. Never .................... your credit card receipts where someone can find them. 8. Ralph was a hacker as a teenager but...,_ he's .................... now and become more responsible . 9. .................... a system is strictly illegal nowadays. 10. It's a constant race to .................... of the hackers. Task 10 1. 2. 3. 4. Replace the verb in italics with a phrasal verb of similar meaning. Don't discard your credit card receipts; they could help fraudsters. Trying to penetrate computer systems is against the law. The typical hacker is a young person who has not matured yet. The best way to begin hacking into a system is to try to get hold of a password. 5. If someone telephones you and asks for your password, don't provide it. 6. Hackers closed Hotmail for five hours. 7. Hackers accumulated a telephone bill of £1m for Scotland Yard. 8. The difficult thing was to determine how the website would look. 9. So you won't forget, record the ID number the support technician gives you. 10. Examine the manufacturers' websites before you phone for help.