Uploaded by Lê Viết Long

UNIT 1 - 4 IT3

advertisement
[Type here]
UNIT 1
INTERNET APPLICATIONS
Task 1
Make a list of all the things you can use the Internet for.
Task 2
Which of the Internet applications (1-10) you would use to perform
the tasks (a-j). Read Part 1 of the Internet FAQs to check your
answers.
1. Email
2. The Web
3. Newsgroups
4. Chat – IM
5. IoT
6. FPT
7. Telnet
8. Web
browser
9. Facebook
10. Icloud
The
a. Connecting a system of interrelated computing devices,
mechanical and digital machines, objects…… to achieve better
performance and efficiency.
b. Accessing information on the web.
c. Coordinating a large range of devices with internet connectivity to exchange messages, post status updates, share
photos, videos and links.
d. Enabling automatic synchronization across computers and iOS
devices of email mailboxes, documents, photos….
e. Transferring files from the Internet to your hard drive.
f. Sending a message to another person via the Internet.
g. Conducting a live conversation online.
h. Taking part in public discussion areas devoted to specific topic.
i. Downloading and viewing documents published on the
Internet.
j. Communicating with devices over a network in plain text.
Internet FAQs: Part 1
What is the Internet (the Net)? When was it created?
The internet is the world’s most popular computer network. It began as an academic
research project in 1969 to share information on research and development in scientific and
military fields, and became a global commercial network in the 1990s. Today it is used by
more than 2 billion people around the world.
The World Wide Web (the Web)?
The World Wide Web (www) is a popular way to publish information on the internet. The
web was created by Timothy Berners-Lee, a computer programmer at the European
scientific research organization CERN, in 1991. The web supported hyperlinks, allowing
users to browse from one document to another. Over time, the web became increasingly
sophisticated, supporting images, audio, video, and interactive content. In the mid-1990s,
companies such as Yahoo and Amazon began building profitable businesses based on the
web.
Using a program called a web browser or search engine such as Google or Internet
Explorer, we can search, view and print web pages with a single click. The web has become
[Type here]
so popular that many people now regard it as synonymous with the internet itself. Although it
offers a more powerful and user-friendly interface than other internet applications,
technically, the web is just one of many internet applications.
What’s an IP address?
Internet Protocol addresses are numbers that computers use to identify each other on the
internet. For example, an IP address for vox.com is 216.146.46.10.
Email?
Email or e-mail (short for electronic mail) is a method for exchanging messages between
people all over the world using the internet and electronic devices (computers, tablets,
smartphones…). Email communication is not only used in lieu of letter writing, it has also
replaced telephone calls in many social situations and in professional environments.
Email addresses are written with a custom username at the beginning followed by the
email service provider's domain name, with an @ sign separating the two. Here's an
example: name@gmail.com.
What does TCP/IP mean?
The language used for data transfer on the Internet known as TCP/IP ( Transmission
Control Protocol/Internet Protocol). This is like the internet operating system. Every
computer connected to the Net is identified by a unique IP address.
FTP?
The File Transfer Program (FTP) is a standard network protocol used for the transfer
of computer files between a client and server on a computer network.
Chat and Instant Messaging?
Chat and Instant Messaging (IM) technologies allow you to real-time conversation online,
by typing messages at the keyboard.
Telnet?
Telnet (Teletype network) is a client-server protocol used on the Internet or local area
network to provide a bidirectional interactive text-oriented communication facility using a
virtual terminal connection.
With Telnet, you can access remote computers through a text-based interface from the
comfort of your home or office. It helps you save time and fix problems easily thanks to using
plain text. Unfortunately, it’s not secure, boring (no graphics), and difficult to use because of
limitations of plain text and command typing.
Newsgroups?
Newsgroups are the public discussion areas which make up a system called Usenet. The
contents are contributed by people who post articles or respond to articles, create chains of
related postings called message threads. You need a newsreader to subscribe to newsgroups
and to read & post messages. The newsreader may be a stand-alone program or part of a web
browser.
Internet of Things?
The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances,
and other items embedded with electronics, software, sensors, actuators,
and connectivity which enables these things to connect and exchange data, creating
[Type here]
opportunities for more direct integration of the physical world into computer-based systems,
resulting in efficiency improvements, economic benefits, and reduced human exertions.
Social networking?
Social networking and collaborative services have grown rapidly, enabling people to
communicate and share interests in many more ways. Sites like Facebook, Twitter, LinkedIn, YouTube, Flickr, Second Life, blogs, Instagram, wikis, and many more let people of all
ages rapidly share their interests of the moment with others everywhere.
What is the cloud (icloud)?
The cloud describes an approach to computing that has become popular in the early 2000s.
By storing files on servers and delivering software over the internet, cloud computing provides
users with a simpler, more reliable computing experience.
For example, Google Docs is a cloud office suite. When a user visits docs.google.com,
he/she automatically gets the latest version of Google Docs. Because his/her files are stored on
Google’s servers, they’re available from any computer. Even better, he/she doesn’t have to
worry about losing her files in a hard drive crash. There are many other examples. Gmail and
Hotmail are cloud email services that have largely replaced desktop email clients such as
Outlook. Dropbox is a cloud computing service that automatically synchronizes data between
devices, saving people from having to carry files around on floppy disks. Apple’s iCloud
automatically copies users’ music and other files from their desktop computer to their mobile
devices, saving users the hassle of synchronizing via a USB connection.
Task 3
Match the terms in Column A with the statements in Column B.
Column A
1. Computer network
2. Web page
3. Text-based interface
4. Internet protocol
5. Service provider
6. Data transfer
7. Plain text
8. Stand-alone program
9. Client-server protocol
10. Real-time conversation
Column B
a. The part of an operating system or program
which displays information in the form of texts.
b. A term for data that represent only characters
of readable material.
c. A number of interconnected computers.
d. A document that is suitable for the Web and
web browser.
e. The process of using computing techniques
and technologies to transmit digital or analog
information from one computer to another.
f. An organization that supplies users with
facilities to access or take part in the Internet.
g. The principal communications method in a
computer network by which data is sent and
received.
h. A computer software that can work offline, i.e.
does not necessarily require network connection
to function.
[Type here]
i. Any mode of telecommunications in which all
users can exchange information instantly.
j. Two-way communication mechanism that allow
humans to get information from web sites.
Task 4
1.
2.
3.
4.
5.
6.
7.
Read the text and find the following.
The place where your ISP stores your emails.
The type of program used to read and send email from a computer.
The part of an email address that identifies the user of the service.
The line that describes the content of an email.
The computer file which is sent along with an email message.
Facial symbols used to indicate an emotion or attitude.
The name given to junk mail.
EMAIL FEATURES
When you set up an account with an Internet Service Provider, you are given an
email address and a password. The mail you receive is stored on the mail server of
your ISP – in a simulated mail box – until you next connect and download it to your
hard drive.
There are two ways to get email over the Internet. One is by using mail program
(known as an email client) installed on your computer, for example Eudora or
Outlook Express. The other way is to use web-based email, accessible from any web
browser. Hotmail and Gmail are good examples.
You can make the message more expressive by including emoticons, also called
smileys. For example, ;-) for happy, ;-( for sad, ;-o for surprise and ;-D for laughing
etc. You may also like to add a signature file, a pre-written text file appended to the
end of the message. The name given to unsolicited email messages is spam.
The anatomy of an email
[Type here]
Task 5
Fill in the blank (1-9) with appropriate words.
1. An email ………… usually consists of four elements:
name@company.organization code.country code e.g. hanh@teg.edu.vn
2. Most …………. allow you to choose anything you want for an email name.
3. ………………
is a unique designation for the computer storing the
addressee's email. This is usually the name of the organization which owns
the machine.
4. A three letter code which designates the type of institution that operates the
computer where the addressee's email is stored is called …………..
5. Many addresses in the US don’t include a location symbol, but some do.
Addresses in other nations always include ……………..
6. Including an ………….. in an email is a simple way to share documents and
images.
[Type here]
7. The majority of the email sent worldwide is ………... Fortunately, …………..
exists as a means of sorting through legitimate email versus spam before it
reaches your inbox.
8. CC stands for ………….. Put email address(es) here if you plan to send a
copy to other recipients in addition to those listed in the ‘To’ field.
9. A ………… is a block of contact information appearing at the bottom of an
email.
10. If you don’t want the other recipients to know that the mail was also sent to
this email address, use the ………. .
11. The …………….. of an email is a description of the message. The best ones
are usually short, descriptive and provide the recipient with a reason to open
the email.
12. In an email, the body (message content) is always preceded by ……………
that identify particular routing information of the message, including the
sender, recipient, date and subject. Some are mandatory, such as the FROM,
TO and DATE. Others are optional, but are very commonly used, such as
SUBJECT and CC.
Task 6
Match the parts of the letter (A-H) with the descriptions (1-8).
C The Editor
EL Independiente
Moratin, 7
28006 Madrid
Spain
A Rhondda High School
31 Prospect Place,Cardiff, Wales
B
28th March 2008
D Dear Sir/Madam,
E
We are writing to ask if you can help us with our school project. We are doing a survey of the major
newspapers in the European Union to find out which computer systems and desktop publishing
programs they use.
F We would be very grateful if you could tell us which hardware, graphic design and page layout software
you use at El Independiente. Could you also tell us how long your online edition has been running for?
Thank you very much in advance.
G We look forward to hearing from you.
H Yours faithfully,
Katherine Powell
Katherine Powell, Student representative
[Type here]
1. For example, 28th March 2008, or 28 March 2008, or 28/03/2008.
2. This is usually in the top right corner of the letter, but can be in the centre
if it's a printed letterhead.
3. State the reason for writing: I am I We are writing to ... I We are
currently …
4. This should be included on the left hand side of the page, before the greeting.
5. Start with Dear Sir/Madam or Dear Mr/Mrs/Ms ... Use Ms if you are not
sure if the recipient is married or not. It is often best to use Ms, as Mrs can
cause offence.
6. Make any requests or ask any questions you need to: We would be
grateful if you could ..., Could you also ...
7. Request further contact, if necessary: Well look forward to hearing from
you; / Please contact us by ...
8. If you have started the letter with the person's name (for example, Dear Mr,
Robinson), then end with Yours sincerely. If you do not know the name
of the recipient, end with Yours faithfully.
Task 7
1.
2.
3.
4.
5.
6.
7.
8.
9.
Rewrite each of these warnings according to the prompt. Add a
reason to the warning.
Never give out your password.
This appliance must be earthed.
Avoid turning off main power while computer is running.
It’s an offence to make unauthorized access to computer material.
No smoking, eating or drinking at the computer.
Use an IC extraction tool, don’t use a screwdriver.
Don’t give open access to PC’s.
Always ensure the power is switched off when working on a computer.
Don’t use out-of-date anti-virus software.
Task 8
Discuss the advantages and disadvantages of emails.
Task 9
Find out IP addresses of these websites and explain the meaning
of their parts.



www.hcmute.edu.vn
www.sunderland.ac.uk
www.amazon.com
[Type here]
UNIT 2
THE WEB
Task 1
Look at the screenshot of a typical web page. How many of the
features (a-k) can you say in English?
Task 2
Read the following text and label the features on the screenshot
with the terms in bold.
A TYPICAL WEB PAGE
At the top of the page is the URL address. URL means Uniform Resource
Locator - the address of a file on the Internet. A typical URL looks like this:
http://www.bbc.computer.uk/radlo/.
In this URL, http:// means Hypertext Transfer Protocol and tells the program to
look for a web page, www means world wide web, bbc.computer.uk is the domain
name of the server that hosts the website - a company based in the UK; other toplevel domains are .com (commercial site), .edu (education), .org (organization) or .net
(network); radio is the directory path where the web page is located. The parts of the
URL are separated by (dot), / (slash) and: (colon). Some sites begin fpt://, a file
transfer protocol used to copy files from one computer to another.
The toolbar shows all the navigation icons, which let you go back one page or go
forward one page. You can also go to the home page or stop the current transfer
when the circuits are busy.
[Type here]
Tab buttons let you view different sites at the same time, and the built-in search
box helps you look for information. If the feed button lights up, it means the site
offers RSS feeds, so you can automatically receive updates. When a web page won't
load, you can refresh the current page, meaning the page reloads (downloads
again). If you want to mark a website address so that you can easily revisit the page
at a later time, you can add it to your favourites (favorites in American English), or
bookmark it. When you want to visit it again you simply click show favourites.
On the web page itself, most sites feature clickable image links and clickable
hypertext links. Together, these are known as hyperlinks and take you to other web
pages when clicked.
Task 3
Study this URL (Uniform Resource Locator).
domain name extension
country code
http://www.hw.ac.uk/libWWW/irn/irn.html
protocol
prefix
Web
service
domain
directory path
document name
Which part of the address tells you:
1. the company is in the UK
2. this is the webpage
3. the type of transmission standard your browser must use to access the data
4. this points to the computer where the webpage is stored
5. this is where the webpage is stored in the computer
6. this is a company
7. this is a Web file
Task 4
Match these approved domain name extensions and their
meanings.
Extension
1/ .aero
2/ .biz
3/ .com (.co in UK)
4/ .coop
5/ .edu (.ac in UK)
6/ .gov
7/ .info
8/ .int
9/ .mil
10/ .net
Meaning
a/ cooperatives
b/ gateway or host
c/ military agency
d/ government
e/ professionals
f/ aviation industry
g/ commercial
h/ educational and research
i/ international organization
j/ non-profit organization
[Type here]
11/ .org
12/ .pro
Task 5
k/ businesses
l/ general use
Read the article quickly and find websites for the following tasks.
1. to search for information on the Web
2. to buy books and DVDs
3. to participate in political campaigns
4. to view and exchange video clips
5. to manage and share personal photos using tabs
6. to buy and sell personal items in online auctions
7. to download music and movies, sometimes illegally
8. to look up the meanings of new terms
9. to make free phone calls or video conferencing
10. to set up a virtual world in which users can pretend to be whomever – or
whatever – they want to be.
TOUR THE COLLECTIVES OF CYBERSPACE
The Internet isn't just about email or the Web anymore. Increasingly, people
online are taking the power of the Internet back into their own hands. They're posting
opinions on online journals - weblogs, or blogs; they're organizing political rallies on
MoveOn.org; they're trading songs on illegal file-sharing networks; they're
volunteering articles for the online encyclopedia, Wikipedia; and they're collaborating
with other programmers around the world. It's the emergence of the 'Power of Us'.
Thanks to new technologies such as blog software, peer-to-peer network, opensource software, and wikis, people are getting together to take collective action like
never before.
eBay, for instance, wouldn't exist without the 61 million active members who list,
sell, and buy millions of items a week. But less obvious is that the whole marketplace
runs on the trust created by eBay's unique feedback system, by which buyers and
sellers rate each other on how well they carried out their half of each transaction.
Pioneer e-tailer Amazon encourages all kinds of customer participation in the site including the ability to sell items alongside its own books, CDs, DVDs and electronic
goods. MySpace and Facebook are the latest phenomena in social networking,
attracting mlllion of unique visitors a month. Many are music fans, who can blog,
email friends, upload photos, and generally socialize. There's even a 3-D virtual
world entirely built and owned by its residents, called Second Life, where real
companies have opened shops, and pop stars such as U2 have performed concerts.
Some sites are much more specialized; such as the photo-sharing site Flickr.
There, people not only share photos but also take the time to attach tags to their
pictures, which help everyone else find photos of, for example, Florence, Italy.
Another successful example of a site based on user-generated content is YouTube,
which allows users to upload, view and share movie clips and music videos, as well
as amateur videoblogs. Another example of the collective power of the internet is the
[Type here]
Google search engine. Its mathematical formulas surf the combined judgements of
millions of people whose website link to other sites. When you type Justin
Timberlake into Google's search box and go to the star's official website, the site is
listed first because more people are telling you it's the most relevant Justin
Timberlake site - which it probably is.
Skype on the surface looks like software that lets you make free phone calls over
the Internet - which it does. But the way it works is extremely clever. By using Skype,
you’re automatically contributing some of your PC's computing power and Internet
connection to route other people's calls. It's an extension of the peer-to-peer network
software such as Bit Torrent that allow you to swap songs - at your own risk if those
songs are under copyright. Bit Torrent is a protocol for transferring music, films,
games and podcasts. A podcast is an audio recording posted online. Podcasting
derives from the words iPod and broadcasting. You can find podcasts about almost
any topic - sports, music, politics, etc. They are distributed through RSS (Really
Simple Syndication) feeds which allow you to receive up-to-date information without
having to check the site for updates. Bit Torrent breaks the files into small pieces,
known as chunks, and distributes them among a large number of users; when you
download a torrent, you are also uploading it to another user.
Task 6
Read the article again and match the sentence beginnings (1-5)
with the correct endings (a-e).
1. A weblog, or blog, is an electronic
journal
2. A peer-to-peer system allows
3. You can use a search engine to find
4. Bit Torrent is a peer-to-peer
protocol used
5. RSS keeps you constantly informed
Task 7
1.
2.
3.
4.
5.
a. web pages on a particular subject.
b. for downloading files over the
Internet.
c. users to share files on their
computers.
d. about fresh, new content on your
favorite websites.
e. that displays in chronological order
the postings of one or more people.
Finds words in the article with the following features.
open source, editable web pages
the same as electronic retailer, or online store
a blog that includes video
a program that allows you to make voice and video calls from a computer
an audio broadcast distributed over the Internet
Task 8
Find 03 simple sentences, 03 compound sentences, 03 complex
sentences and 02 mixed sentences in the text above. Underline
the main verbs in these sentences.
[Type here]
Task 9
Buffering is a way of ensuring that web videos run smoothly.
Refer to the flowchart of video buffering and the words given to fill
in the gaps in this description of buffering.
Internet – buffer – movie – occur – bandwidth – streaming downloads – uninterrupted - bottom
The player feeds
audio or video data
100101011010
Buffer
110111011101
Data goes out to the
player’s decompression
and playback routines
Task 10
Streaming is a way of dealing with ………….
problems when you download video from the ……
One key to successful …………. is the process of
buffering. If you download a movie, the video player
stores part of the ………… in memory while playing
it. Imagine the buffer as a container filled from the top
as shown in the flowchart. When the container is full,
the player sends data on for playback from the ………
Data keeps coming in while a clip plays. The user can
view the beginning of the movie while the rest of the
clip ………… If connection slowdowns or
interruptions ………… , the amount of data in the
buffer decreases but as long as some remains,
playback is …………… Playback continues at a
steady rate until the ……….. is empty.
Link each word in column A with a word which it often occurs with
from column B. In some cases, more than one link is possible.
Column A
bulletin
domain
file
graphical
mobile
search
site
synchronous
text
web
Column B
board
button
engine
link
map
message
name
page
phone
transmission
[Type here]
Task 11
Listen to the recording which explains how your browser finds the
webpage you want. Label the items in the illustration diagram.
1
http://www.zdnet.com
6
3
5
----------
3
205.136.145.101
3
2
4
a. Router
b. Domain Name System (DNS)
server
c. Remote Web server
d. Browser PC
e. URL
f. Internet Protocol address
[Type here]
UNIT 3
WEB DESIGN
Task 1
1.
2.
3.
4.
Discuss these questions.
Why do companies have websites?
What’s the difference between a website and a web page?
What is a home page?
Do you have a blog or personal website? Describe the home page to your
classmates.
Task 2
Read the following text and find the following.
1. the language used to create web documents
2. the type of software that lets you design web pages without
writing HTML codes
3. the format invented by Adobe to distribute text files over the
Internet
4. a method of displaying multiple HTML documents in the same
browser window
5. three popular formats used to store and play back video
WEB PAGE DESIGN
HTML and web editors
The code behind most web pages is HTML (Hyper Text Markup Language),
which consists of commands called tags. Tags are placed around pieces of text to
tell the web browser how to display text or pictures. You can view the source HTML
code of a web page by choosing the Page Source option in your web browser. But
you needn't learn HTML in order to build your own website. Instead, you can use
a word processor with web design capabilities or a dedicated web editor like
Macromedia Dreamweaver or Microsoft FrontPage. Web editors are user-friendly
and WYSIWYG (What You See Is What You Get). Different buttons and menu
items let you design a page without writing HTML.
HTML files have this basic structure:
[Type here]
start with <HTML>
have heading text that begins with <HEAD>, which has a title
enclosed between tags and ends with </HEAD>
have body text that starts with <BODY>, where you place the
contents of the actual document (i.e, text, images, links, etc.) and
ends with </BODY>
end with </HTMl>
You can create links to other web pages by using the tag <A HREF
"filename">active text</A>
Some basic HTML source code
My hobbies
I like music and computers. I can play the Spanish guitar and I love Latin
dancing. I have a mountain bike but my favourite sport is football.
My studies
I study at Politecnica University, Madrid. My favourite subjects are
Maths, Physics, Aeronautics and English. I have studied English for five
years. In the future I would like to be an engineer.
My favoutite city
Zaragoza is a multicultural modern ancient city, with 700,000 inhabitants
and over 2,000 years of history. Muslins, Christians and Jews have lived
together in peace for many centuries. It is famous for its ‘mudejar’ style,
and the charming character of its people.
HTML file displayed as a web page
Web page elements
There are a number of different elements that you can use on a web page:
Text - displayed in a variety of fonts and sizes. Most text files are available in two
formats: HTML or PDF (the Portable Document Format that can be viewed with
Acrobat Reader).
Background - the underlying colours and patterns of a web page.
Tables - with columns and rows used to position images and text on a page.
[Type here]
Frames - rectangular areas that allow the display of different pages in the same
browser window
Cascading Style Sheets (CSS) - a mechanism for adding styles to web documents.
You could use HTML code to specify the font, text styles and background colour.
Nowadays, however, it is more common to use CSS. This makes it easy to apply
presentation changes across a website.
Graphics, clip art, icons, background templates, wallpaper, and transparent
images - common formats are .ipg (Joint Photographic expert Group), ideal for
pictures with many colours, .gif (Graphics Interchange Format), ideal for pictures
with fewer colours, and .png (Portable Network Graphics), which support 16 million
colours.
Hyperlinks - highlighted text or pictures (buttons, image maps, etc.) that act as links
to other pages. If you want to share information with people, you can use RSS feeds
and provide readers with a link to the feed. RSS allows subscribers to receive
updates of bloqs, news, podcasts, etc. Before going live, you should check that all
the links work.
Audio, video and animation
Many website now incorporate audio files, and if you're designing a site, you may
like to insert songs, podcasts etc. The most common audio formats are .wav
(Windows wave audio format), .ra (RealAudio file) and .mp3 (MPEG-1 Audio Layer3).
Full-motion video is stored these formats: .avi (audio video interleave), .mov
(QuickTime movie) and .mpg (moving picture experts group).
If you want to inject something special into your web pages. You can use Adobe
Flash to include interactive animations and streaming audio. Additionally, you
can insert Java applets - small programs that enable the creation of interactive
files. Animations are made up of a series of independent picture put together in
sequence to look like moving pictures. To see or hear all these files you must
have the right plug-in, an auxiliary program that expands the capabilities of your
web browser.
Task 3
1.
2.
3.
4.
5.
6.
Read the text again and then match the sentence beginnings (1-6)
with the correct endings (a-f).
Instructions in HTML
Cascading Style Sheets are the way
A hyperlink is any clickable text,
A plug-in is a small program
Java applets are used to provide
RSS feeds are summaries of web content
a. Image or button that takes you to another place on the Web.
b. used for handling audio, video, and animation files.
c. are called tags.
[Type here]
d. interactive features to web applications.
e. to define the presentation of web pages, from fonts and colours to page
layout.
f. published in the Really Simple Syndication format for download.
Task 4
Link each pair of actions using an appropriate time clause.
1. a/ You use a search engine.
b/ It provides a set of links related to your search.
2. a/ You have clicked on a hyperlink.
b/ You have to wait for the webpage to be copied to your computer.
3. a/ You listen to the first part of a streamed audio file.
b/ The next part is downloading.
4. a/ The graphics can be displayed gradually.
b/ The webpage is downloaded.
5. a/ You receive an email message.
b/ You can forward it to another address.
6. a/ The files are transferred.
b/ The transfer is graphically displayed.
7. a/ The OK button is clicked.
b/ The copying progress begins.
8. a/ You click the mouse pointer on the file.
b/ It is highlighted.
9. a/ The virus is not activated.
b/ You open the infected file.
10. a/ Don’t open an email attachment.
b/ You have virus-checked it.
11. a/ You add memory.
b/ Change the BIOS settings.
12. a/ You can bookmark a webpage to make it easier to find in the future.
b/ You find a webpage you like.
13. a/ You type in a Web address.
b/ You should press the Enter key.
14. a/ You click on the Home button.
b/ The browser displays your starting webpage.
[Type here]
Task 5
Study these seven points for evaluating websites. What questions
would you ask to evaluate a website on each point?
13. Design
14. Easy of use
15. Up to date
16. Compatibility
Task 6
5. Navigation
6. Accuracy
7. Helpful graphics
Study this flowchart for planning a website. Use it as the basis for
a short text providing advice on website planning. Your text
should have three paragraphs corresponding to the 3 stages in
this diagram.
KEY QUESTION WHEN PLANNING YOUR WEBSITE
Careful planning is essential to maximize the impact of your website.
It’ll take some effort to achieve, but the results will be worth it.
Begin planning website
Analysis
Who’s
the target audience?
What’s
the site’s purpose?
Design & Implementation
What look, feel and
content will the site have?
Evaluation
How
will it be created, rolled
out and managed?
How do we know
If the site is effective?
Begin constructing website
[Type here]
Begin your text like this: You need to plan your website carefully before you
go ahead and create it. There are three stages to the planning process:
1. Analysis
2. Design and implementation
3. Evaluation
Task 7
Fill in the gaps in these definitions (1-10)
1 A ……….. is an interface enabling dissimilar networks to communicate.
2 A …………is a hardware and software combination used to connect the same
type of networks.
3 A ………… is a network transmission path handling major data traffic.
4 A ………… is a special computer directing messages when several networks
are linked.
5 A ………… is a number of computers and peripherals linked together.
6 A ………… is a network connecting computers over a small distance such as
within a company.
7 A ………… is a powerful computer storing data shared by all the clients in
the network.
8 A …………. is a network computer used for accessing a service on a server.
9 A ………… is a simple computer comprising a processor and memory, display,
keyboard, mouse and hard drives only.
10 A …………. is an electronic device connecting alt the data cabling in a network.
[Type here]
UNIT 4
INTERNET SECURITY
Task 1
Discuss these questions.
1. Who is a hacker?
2. How easy do you think it is to infiltrate the Internet and steal sensitive
information?
3. What is a computer virus? How does it work?
4. How can you protect your computer from viruses and spyware?
Task 2
Read the following text quickly and see how many of your ideas in
Task 1 are mentioned.
SECURITY AND PRIVACY ON THE INTERNET
There are many benefits from an open system like the Internet, but one of
the risks is that we are often exposed to hackers, who break into computer
systems just for fun, to steal information, or to spread viruses (see note below). So
how document we go about making our online transactions secure?
Security on the Web
Security is crucial when you send confidential information online. Consider, for
example, the process of buying a book on the Web, you have to type your credit
card number into an order form which passes from computer to computer on its way
to the online bookstore. If one of the intermediary computers is infiltrated by hackers,
your data can be copied.
To avoid risks, you should set all security alerts to high on your web browser.
Mozilla Firefox displays a lock when the website is secure and allows you to disable
or delete cookies - small files placed on your hard drive by web servers so that they
can recognize your PC when you return to their site.
If you use online banking services, make sure they use digital certificates - files
that are like digital identification cards and that identify users and web servers. Also
be sure to use a browser that is compliant with SSL (Secure Sockets Layer), a
protocol which provides secure transactions.
'
Email privacy
Similarly, as your email travels across the Net, it is copied temporarily onto many
computers in between. This means that it can be read by people who illegally enter
computer systems.
[Type here]
The only way to protect a message is to put it in a sort of virtual envelope – that
is, to encode it with some form of encryption. A system designed to send email
privately is Pretty Good Privacy, a free ware program written by Phil Zimmerman.
Network security
Private networks can be attacked by intruders who attempt to obtain information
such as Social Security numbers, bank accounts or research and business reports.
To protect crucial data, companies hire security consultants who analyse the risks
and provide solutions. The most common methods of protection are passwords for
access control, firewalls, and encryption and decryption systems. Encryption
changes data into a secret code so that only someone with a key can read it.
Decryption converts encrypted data back into its original form.
Malware protection
Malware (malicious software) are programs designed to infiltrate or damage your
computer, for example viruses, worms, Trojans and spyware. A virus can enter a PC
via a disc drive - if you insert an infected disc - or via the Internet. A worm is a selfcopying program that spreads through email attachments; it replicates itself and
sends a copy to everyone in an address book. A Trojan horse is disguised as a
useful program; it may affect data security. Spyware collects Information from your
PC without your consent. Most spyware and adware (software that allows pop-ups that is, advertisements that suddenly appear on your screen) is included with 'free'
downloads.
If you want to protect your PC, don't open email attachments from strangers and
take care when downloading files from the Web. Remember to update your anti-virus
software as often as possible, since new viruses are being created all the time.
Note: Originally, all computer enthusiasts and skilled programmers were known as
hacker but during the 1990s, the term hacker became synonymous with cracker - a
person who uses technology for criminal aims. Nowadays, people often use the word
hacker to mean both things. In the computer industry, hackers are known as white
hats and crackers are called black hats or darkside hackers.
·
Task 3
Read the text more carefully and answer the questions.
1. Why is security so important on the Internet?
2. What security features are offered by Mozilla Firefox?
3. What security protocol is used by banks to make online transactions
secure?
4. How can we protect our email and keep it private?
5. What methods are used by companies to make internal networks
secure?
6. In what ways can a virus enter a computer system?
7. How does a worm spread itself?
[Type here]
Task 4
Match the captions (1-4) with the pictures (a-d).
1. A secure website can be recognized in two ways: the address bar shows the
letter https and a closed padlock or key is displayed somewhere on the
screen.
2. You have to type your username and password to access a locked computer
system.
3. This program displays a message when it detects spyware and other
unwanted software that may compromise your privacy or damage your
computer.
4. Private networks use a software and/or hardware mechanism called a firewall
to block unauthorized traffic from the Internet.
(a)
(b)
https://www.bankinter.com
(d)
(c)
Task 5
Complete the following sentences with appropriate words.
1. Users have to enter a ………… to gain access to a network.
2. A ………… protects a company intranet from outside attack.
3. A ………… is a person who uses their computer skills to enter computers and
networks illegally.
4. …………… can infect your files and corrupt your hard drive.
5. You can download ………… from the Net; this type of software is available
free of charge but protected by copyright.
6. Encoding data so that unauthorized users can't read it is known as ………
7. This company uses ……………. techniques to decode (or decipher) secret
data.
[Type here]
8. Most ……… is designed to obtain personal information without the user’s
permission.
Task 6
1.
2.
3.
4.
Read Part 1 of the text and answer these questions.
Which hacking case inspired the film War Games?
When did Captain Zap hack into the Pentagon?
Why was Nicholas Whitely arrested in 1988?
How old was the hacker that broke into the US defence computer in 1989?
The history of hacking - Part 1
1971- John Draper discovered that a whistle offered in boxes of Cap'n Crunch
breakfast cereal perfectly generated the 2,600 Hz signal by the AT&T phone
company. He started to make free calls; He was arrested in 1972 but wasn't
sent to prison.
1974- Kevin Mitnick, a legend among hackers, began hacking into banking networks
and altering the credit reports of his enemies. He didn't expect that his most
famous exploit – hacking into the North American Defense Command in
Colorado Springs – would inspire the film War Games in 1983.
1981- Ian Murphy, a 23-year-old known as Captain Zap on the networks, hacked into
the White house and the Pentagon .
1987- The IBM international network was paralysed by a hacker’s Christmas message.
1988- The Union Bank of Switzerland almost lost £32 million to hackers; Nicholas
Whitely was arrested in connection with virus spreading.
1989- A fifteen-year-old hacker cracked the US defence computer.
1991- Kevin Poulsen, known as Dark Dante on the networks, was accused of stealing
military files.
Task 7
Complete Part 2 of the text with appropriate forms of the given
verbs.
show – spread – steal – launch – attempt – overwrite – be – infect – affect
The history of hacking - Part 2
1992 - David L Smith (1) ……………… prosecuted for writing the Melissa virus,
which was passed in Word files sent via email.
1997 – The German Chaos Computer Club (2) …………. On TV how to obtain
money from bank accounts.
2000 - A Russian hacker (3) ……….. to extort $100,000 from online music
retailer CD Universe. A Canadian hacker (4) ………… a massive denial
of service attack against website like Yahoo! And Amazon.
The I Love You virus, cleverly disguised as a love letter, (5) …..…….. so
quickly that email had to be shut down in many companies. The worm (6)
[Type here]
image and sound files with a copy of itself.
2001 - The Code Red worm (7) ……………. Tens of thousands of machines.
2006 – Hackers (8) …………… the credit card details of, almost 20,000 AT&T
online customers. However, subscribers to its service (9) (not) …………
Task 8
Look at the list of cybercrimes and discuss these questions .
/
1. Which crimes are the most dangerous?
2. Is it fair or unfair to pay for the songs, videos, books or articles that you
download? Should copyright infringement be allowed online?
3. What measures can be taken by governments to stop cybercrime?
4. Do you think governments have the right to censor material on the Internet?
5. Personal information such as our address; salary, and civil and criminal
records is held in databases by marketing companies. Is our privacy in
danger?
Cybercrimes
• Piracy - the illegal copy and distribution of copyrighted software, games or
music files.
• Plagiarism and theft of intellectual property - pretending that someone else's
work is your own.
• Spreading of malcious software
• Phishing (password harvesting fishing) - getting passwords for online bank
accounts or credit card numbers by using emails that look like they are from real
organizations, but are in fact fake; people believe the message is from their bank and
send their security details.
 IP spoofing – making one computer look like another in order to gain
unauthorized access.
 Cyberstalking - online harassment or abuse, mainly in chat rooms or newsgroup.
.
 Distribution of indecent or offensive material.
Task 9
Study these phrasal verbs:
break into
get into
hack into
go about
set about
keep ahead
grow up
phone up
run up
keep at
shut down
throw away
log on
find out
track down
hand over
Now complete each blank with the appropriate phrasal verb in the
correct form . In some cases, more than one answer is possible.
[Type here]
1. Hackers try to .................... passwords so they can penetrate a system.
2. Don't .................... your password to anyone who asks for it.
3. The police ...............:.... Ralph .................... by talking to his friends and
acquaintances.
4. Some hackers .................... systems to get commercially valuable information.
5. When you .................... to a network, you have to provide an ID.
6. How do you ................ ... hacking into a system?
7. Never .................... your credit card receipts where someone can find them.
8. Ralph was a hacker as a teenager but...,_ he's .................... now and become more
responsible .
9. .................... a system is strictly illegal nowadays.
10. It's a constant race to .................... of the hackers.
Task 10
1.
2.
3.
4.
Replace the verb in italics with a phrasal verb of similar meaning.
Don't discard your credit card receipts; they could help fraudsters.
Trying to penetrate computer systems is against the law.
The typical hacker is a young person who has not matured yet.
The best way to begin hacking into a system is to try to get hold of a
password.
5. If someone telephones you and asks for your password, don't provide it.
6. Hackers closed Hotmail for five hours.
7. Hackers accumulated a telephone bill of £1m for Scotland Yard.
8. The difficult thing was to determine how the website would look.
9. So you won't forget, record the ID number the support technician gives you.
10. Examine the manufacturers' websites before you phone for help.
Download