ALESSANDRA REBECCHI - ELISA CAVALLI - ROBERTO CABRAS ICT Information Communication Technology S U L P Agenda 2030 COD. 73057 24,50 Trinity Whitebridge co IC d. 7 T 3 PL 05 U 7 S ICT PLUS ISBN 978-88-99673-57-4 ALESSANDRA REBECCHI - ELISA CAVALLI - ROBERTO CABRAS ICT Information Communication Technology PLUS Per scaricare la copia digitale interattiva, vai sul sito Scuolabook.it e digita il codice che trovi in questa pagina TESTI Un’ampia varietà di testi, calibrati sulle esigenze dello studente, tratta gli argomenti fondamentali per lo studio delle Tecnologie dell’Informazione e della Comunicazione. Particolare attenzione è data all’acquisizione del vocabolario specifico. Audio 5 OPERATING SYSTEMS AND SOFTWARE • What Is an Operating System? • A Bit of History • Operating Systems for Personal Computers • Mobile Operating Systems 1 Main Components and Multitasking What Is an Operating System? control over all of the computer hardware devices. The kernel manages memory access for programs in the RAM and determines which programs gain access to hardware resources etc. A specific memory managing technique that can provide a modern operating system with an important feature is called multitasking, which permits the running of multiple independent programs on the same computer, thus giving the impression that it is performing the tasks at the same time. Since most computers can do at most one or two things at a time, this is generally done via time-sharing, which means that each program uses a share of the computer time to execute. The user interface is the component of an operating system between the user and the rest of the system. With this component it is possible to access the other parts of an OS designed to perform a specific function. For example, the file system is the component of an OS which is specifically developed to manage the files stored in every mass storage device of a computer. By means of this component, users can issue commands and, depending on the (available) interface, copy, move, rename or delete files or folders in a disk. Other components manage the peripherals and the memory, and each of these is controlled by the kernel that provides the most basic level of 32 After covering the hardware features of a computer, in this unit we are going to focus on the basic software generally supplied by the manufacturer: the operating system. An operating system (OS) is a program that permits the user to control the basic functions of a computer, thus allowing the user to communicate with the hardware using input/output peripherals, as well as managing files and data by specific application programs. User Interface MATERIALE DIGITALE In ogni capitolo, tracce audio, video e approfondimenti accessibili tramite il QR code. 86 BIOS The operating system allows the user to ‘speak’ with the hardware and one of its most important features is that it must be easy to use. In other words, it has to be ‘user-friendly’. The first operating systems like MS-DOS were text-based and the user communicated with the hardware by typing commands into the keyboard. This way of communication is very difficult, especially for a non-skilled user, due to the number of commands and syntax to remember. Thanks to Steve Jobs, modern operating systems now provide users with a more intuitive Graphic User Interface (GUI). Through a GUI, the user can give the system a command by pointing a mouse to an object displayed on the screen such as an icon, a window, a button or text. GLOSSARY supplied: fornito syntax: sintassi The operating system of a personal computer is stored on the main hard disk. This memory support allows users to choose which operating system to install (Windows, Linux…) and an easier way to update it, by simply uploading installation files from the producer’s website. The operating system is loaded on the memory at the power on of the computer, but this means that another program is needed to tell the hard disk to start and load the OS. This program is called BIOS, which stands for Basic Input Output System, and is embedded on a memory chip of the computer. At the power on the hardware is designed to read the memory chip containing the BIOS first and perform the program stored in it. This initial operation is called ‘bootstrap’ and the term derives from the Anglo-Saxon idiom ‘To pull oneself up by one’s bootstraps’, that is, put on your boots and stand up alone without any help. The expression was later introduced into computer language to describe the initialising process of a PC thanks to BIOS, so operating systems could ‘stand up by themselves’. GLOSSARY update (v.): aggiornare bootstrap: tirante initialising: inizializzazione by means of: tramite, mediante, attraverso folder: cartella running: esecuzione, attività 5. Operating Systems and Software READING COMPREHENSION 1. Summarise the main events listed in the passage in chronological order by completing the grid. When? Company/OS Features FCE ESERCIZI Writing – Part 2 6. You recently attended a course on Computer-Aided Design at school. The course lasted four weeks; lessons were twice a week from 2 p.m. to 4 p.m. After the final test, you received the following e-mail. READING COMPREHENSION 2. Read the passage again and decide if the following sentences are true (T) or false (F). T F 1. The first operating systems date back to the 1950s. 2. First-generation computer machines had no proper OS. 3. Punched cards were a significant improvement in the late 1960s. 4. Prior to multiprogramming, memory partition was a failure. 5. Multiprogramming means that the processor can run several jobs at the same time. 6. The OS eventually became part of computers due to LSI circuits. 7. MS-DOS and PC-DOS are completely different operating systems. 8. BIOS is a boot program that loads the OS automatically. 9. The GUI was first developed by Apple Inc. 10. Since the 1990s only two main OSs have been used in computers. 11. Linux is an open source OS. PET Ricco apparato di esercizi per lo sviluppo delle quattro abilità (reading, listening, speaking, writing) e per la preparazione alle certificazioni europee PET (format aggiornato al 2020) e FCE. We hope you enjoyed the course and would be grateful if you could provide us with feedback. We would appreciate receiving a report on the course you have just attended expressing your point of view on the following points: • Organisation • Length • Contents • Suggestions Thank you in advance, James H. Denver Easy CAD Team Speaking 3. Ask and answer the following questions with a classmate, then switch roles. • What kind of operating system is your mobile/smartphone provided with? • Do you own any other devices that have a different operating system? Which OS? • In your experience, what are the differences and similarities between different operating systems? • Can you give any practical examples? • Have you ever used an open source operating system? • Can you explain in your own words the main differences between open source operating systems and operating systems like Android or iOS? • Look at the picture below. Do you agree or disagree with its meaning? Who could make such a statement? Give reasons. Write your report on the course in 140-190 words in an appropriate style. ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… If your child can use a smartphone, they can easily operate any of the above! ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… INDUSTRY 4.0 Alla fine di ogni Unit: MIND MAP Colossus MIND MAPS Mainframes Mappe concettuali sui punti chiave della Unit. Glossario visuale di termini specifici incontrati nel testo. Hewlett Packard Pagine di approfondimento di temi connessi al capitolo. AUGMENT ED REALITY CLOUD COMPUTIN G Programmed using BASIC language and equipped with small display, keyboard BIG DATA and printer Personal computers IBM 5150 (1981) IBM PC, IBM Compatible and Apple MacIntosh It was still very expensive and had low power at Increasingly powerful ly lower costs and user-friend interface 47 GLOSSARY COMPUTERS Screen Notebook Portable computers Netbook PDA (Personal Digital Assistant) Hand-held computers INDUSTRY 95 CYBERSE CURITY INTERNET OF THINGS Smartphone Tablet Progress in the electronic n fields led the productio of smaller and lighter computers with powerful batteries and low energy consumption Small-sized and power reduced notebook suitable for web browsing, e-mailing and word processing of Used to manage lists contacts and a calendar of commitments of The parallel evolution led PDA and mobile phones one to the production of device including the functions of both devices y Tactile display technolog made devices more Using compact and lighter. of touch screen instead in keyboard and progress the led fields the electronic production of thin hand rs. held portable compute SYSTEM INTEGRAT ION 3D-printer Desktop Personal Computer CLIL External Hard Drive Printer Scanner Joystick Mainframe computer Sensor Speaker Microphone Touchpad Modem Touchscreen Monitor Mouse USB Key/ Memory stick INDUSTRY ary glossary• gloss ary• glossary• glossary• gloss ary• glossary• glossary • gloss GLOSSARY its A key contribution to Alan creation was given by Turing One of the original von programmers was John of Neumann, the creator the architecture of modern computers Eniac (PART 2) We are currently experienc ing the fourth step of technolog evolution which is character ical ised by a series of standards known as Industry 4.0. (paradigms) Such paradigms are a multifactorial complex of applications allowing process optimisation due to their interconnection with manufacturing and marketing processes . The core of Industry 4.0 is digital technology. In order to comply with this industrial system, plants ought to satisfy as many paradigms as possible (see picture below). 4.0 AUTONOM OUS ROBOTS SIMULATIO N IT Systems and Networks ADDITIVE MANUFACTUR ING 1. Look at the image above. Using a bilingual or a monolingual dictionar define in your own words y, try to the different features of Industry 4.0. You can examples from the topics also make you have studied in IT Systems and Network your school-work experien s or during ce. • Autonomous robots • Internet of Things • Simulation • Additive Manufacturing • Cybersecurity • System integration • Augment ed Reality • Cloud Computing • Big Data 189 4. Network Administrator 2 Software and Web Designer 4 74 Software designers specify the structure of information to be used as input and output of an application, the nature of the user interface and the sequence of processing. The designers also dictate the order in which the system will be constructed, the timescale for each section and the format for the on-screen and hard-copy outputs. Web designers also define the graphical layout and navigation structure of a website to comply with the client’s requirements. The key skills of a designer are: • strong written and verbal skills; • analytical mind; • logical approach to problem solving; • interpersonal skills; • an understanding of the interaction between business operations and technology; • meticulous attention to detail; • adaptability, ability to respond to changing circumstances; • being a web designer requires technical knowledge of the Internet. JOBS IN ICT La unit Jobs in ICT fornisce consigli utili e propone attività pratiche per facilitare l’inserimento degli studenti nel mondo del lavoro. 3 key skills: competenze chiave changing: mutevole Software and Web Developer 76 Network administrators are responsible for the security and administration of networks. Their work may involve overseeing the installation and configuration of new hardware and software and ensuring their compatibility with the other nodes of the network. Network administrators must also keep network hardware efficient and update software to ensure that problems are fixed. The administrative tasks involve setting up user accounts and passwords, ensuring that the network is secure and that users are using it legitimately and ensuring that there is an effective back-up system (see Unit 10 for more information on network accounts). The key skills of a network administrator are: • strong technical knowledge; • practical problem-solving skills; • understanding of the overall technology needs of the organisation; • good interpersonal skills. GLOSSARY timescale: arco di tempo, lasso di tempo Network Administrator 75 GLOSSARY Software and web developers, also known as ‘programmers’, write the code that tells the computer how and when to perform the functions specified in the system design. They need an understanding of general programming structures and principles and a specialist knowledge of one or more programming languages, e.g. Visual Basic, C++ etc. (see Unit 7 for more information on structures and programming languages). Their work involves writing step-by-step instructions in the appropriate language to build the applications required by the user. Web developers also need to know the HTML language which is used to create the pages of an Internet site. The rules, instructions and structures are completely different from other programming languages. Graphics, communications and networking skills are important for a web developer to build attractive web pages. Both software and web developers must perform not only coding tasks, but also debugging and maintenance tasks. Debugging means testing the program or the website, finding errors and correcting them before releasing the application to users. Maintenance is an activity performed after implementation, to amend the original code if errors occur, to improve performance or to add new functionalities. The key skills of a programmer are: • logical approach to problem solving; • ability to concentrate on one task; • ability to learn effectively; • attention to detail; • ability to communicate with users and designers; • ability to work in a team. oversee (v.): supervisionare legitimately: legittimamente READING COMPREHENSION 1. Match the beginning of each sentence with the correct ending. 1. 2. 3. 4. 5. 6. 7. 8. A. ranging from technical to communicative ones, to perform their job at their best. B. and include the choice of an application structure, layout, input and output, according to the client’s needs. C. are also known as software and web developers. D. of all the hardware and software of a specific network. E. as well as preventing illicit use by unauthorised users, are some skills of a network administrator. F. web developers use HTML language. G. interpersonal skills and resilience are typical features of a web designer. H. to both software and web developers. Great attention to detail, logical approach to problem solving, The management of accounts, passwords and back-ups, Coding, debugging and maintenance tasks are activities belonging In order to create the pages of an Internet site Network administrators deal with the efficiency and security Programmers need different kinds of skills, The tasks of a software designer are different Programmers, who are IT high specialists and technicians, 233 230 Appendix 2. GRACE HOPPER 5. ……………… Assembly set The United Nations General interlinked global up in 2015 a list of 17 SDGs, that goals under the acronym ‘blueprint to a be to up drawn were sustainable achieve a better and more are intended to future for all’. These goals 2030. Squiseat be achieved by the year (Zero Hunger) fits into the second goal Production). ible Consumption and (Respons one and the twelfth …… 6. ………… held every year by the Day 2019, a one-day event the We took part in Start-up s of people involved in that brings together thousand University of Bologna the jury! by selected start-ups. We got world of innovation and very few people and a with p WhatsAp on group portions he had We first created a chat t told us how many food restauran the of restaurant: the owner down the orders on a sheet it to our clients, writing left and we communicated service, driving our scooters y provided the delivery of paper. We then personall through the streets of Bologna. 7. ……………… it was time to switch platform quickly and we realised Our popularity grew very us to have an unlimited . This IM software allowed and start using Telegram as a digital waiter. a bot, which basically worked chat group and to create directly with our personal y, the client interacted g. When checking the availabilit and software developin te on the organisation bot, allowing us to concentra 7. Women in ICT 92 ‘I had a running compiler , and nobody would touch it because, they carefully told me, computers could only do arithmetic; they could not do programs .’ Grace Brewster Murray Hopper was an American computer scientist and United States Navy rear admiral. A true pioneer of computer programming, she was one of the first programm ers of the Harvard Mark I computer and invented one of the first compiler-related tools. She made the idea of machine-independ ent programming languages popular, which later led to the development of COBOL, an early high-level programming language still in use today. She started her computin g career when working on the Harvard Mark I team led by Howard H. Aiken. In 1949 Hopper joined the Eckert–Mauchly Compute r Corporation and was part of the developm ent team that designed the UNIVAC I computer in 1944. While working at Eckert–M auchly she began developing the compiler. Hopper firmly believed that it was possible to write computer code in English by using a programming language that was based on English words. The compiler would convert that code into machine code that would be understoo d by computers. By 1952, she had finished her compiler, which was written for the A-0 System programming language. APPENDIX Una rubrica finale di approfondimento su case studies e personaggi di spicco nell’ICT. GLOSSARY compiler: compilatore READING COMPREHE NSION 1. Who… (Left to right) Alberto Drusiani, Ossama Gana, Gabriele Calarota and Luca Morosini 1. graduated in Physics at Cambridge Universit y? ……………………………… ……………………………… ……………………………… 2. used English words for a programming language ………… ? ……………………………… ……………………………… ……………………………… 3. was a US Naval Officer? ………… ……………………………… ……………………………… ……………………………… 4. contributed to the development of non-refle ………… ctive surfaces on compute ……………………………… r screens? ……………………………… ……………………………… 5. worked with a Nobel Prize winner? ………… ……………………………… ……………………………… ……………………………… 6. developed the first compiler in computing ………… history? ……………………………… ……………………………… ……………………………… ………… B1 B2 Overall LISTENING Comprehension Overall READING Comprehension (Common European Framework) INVALSI A fine volume, una simulazione completa della Prova Nazionale Invalsi. Un’altra prova è presenti sul sito dell’Editore (trinitywhitebridge.co.uk). Inquadra il QR Code per accedere alle tracce audio e ai materiali digitali! (Common European Framework) Audio 1. TASK IDENTIFIER TITLE 8. TASK IDENTIFIER TITLE 97 Customer’s Complaints at the Computer Shop NUMBER OF WORDS LENGTH OF SOUNDFILE (minutes) 03:07 READING BEHAVIOUR LISTENING BEHAVIOUR Quick, selective listening Cyber Security 361 Quick selective reading GENERAL FOCUS Reading for specific information and important details GENERAL FOCUS Listening for specific information and important details CEFR LEVEL B2 CEFR LEVEL B1 TEST METHOD Short Answer Questions NUMBER OF ITEMS 8 TEST METHOD Multiple Matching NUMBER OF ITEMS 9 Cyber Security Customer’s Complaints at the Computer Shop Listen to a dialogue between a clerk and a customer at a computer store. First you will have 1 minute to study the task below, then you will hear the recording twice. While listening, match the clerk’s questions (1-9) with customer’s answers (A-L). There are two answers that you should not use. The first one (0) has been done for you. After the second listening, you will have 1 minute to check your answers. 0 How can I help you, Sir? Q1 Do you have your store receipt with you? Q2 What seems to be the problem? Q3 Could I take a look? Q4 Could I ask a few questions? Q5 How long do you use it for before it overheats? Q6 Do you notice any loss of function? Q7 What do you usually do on the laptop? Q8 Is the area where you use the laptop exposed to direct sunlight or heat? Q9 Do you sit on the bed when using the laptop? C A Sure, go ahead. B That depends C I’d like to make a complaint. D I use it to check my emails. E I think it’s overheating. F It usually feels very hot after one or two hours. G It’s usually on top of the covers on my lap. H Yes, I do. Here it is. I That’s probably why it’s overheating. J Not at all. K Yes, of course. L The touchpad becomes less sensitive to my touch, actually. Read the review about cyber security, then answer the questions (1-8) using a maximum of 4 words. Write your answers in the spaces provided. The first one (0) has been done for you. The definition of cyber security is often confused with the meaning of information security. Information security, often referred to as ‘IT security’, looks to protect all information assets, whether as a hard copy or in digital form. Cyber security is a subset of information security. It specifically focuses on protecting computer systems and their components – including hardware, software and data – and digital infrastructure from attack, unauthorized access or being otherwise damaged or made inaccessible. Data centres, websites, programs, servers or accounts can all be exploited through a cyber-attack. Effective cyber security uses risk management to ensure these controls are deployed cost-effectively – in other words, based on the likelihood of the risk occurring, and the worst possible impact if the threat materializes. In recent years, cyber security has come under intense media scrutiny due to the rapid development of cyber risks in both size and number, and the degree of impact on individuals, governments and organizations. Most well-informed organizations now consider cyber security a critical business issue. What are the consequences of a cyber-attack? Cyber-attacks can cause significant disruption and damage to even the most resilient organization. Impacted organizations stand to lose assets, reputation and business, and face fines and remediation costs. The most effective strategy to mitigating and minimizing the effects of a cyber-attack is to build a solid foundation upon which to grow your cyber security technology stack. Solution providers often tell their clients their applications are 100% compatible and will operate seamlessly with the current IT infrastructure, and for the most part, this is true. Problems arise when we start adding IT security solutions from different manufacturers. Regardless of the granularity of their configuration settings, technology gaps will always be present. Contents 1. HARDWARE, BITS AND CODES 1. Computer Architecture …………………… 8 2. History of Computers ……………………… 12 3. The CPU ……………………………………… 20 4. The Motherboard …………………………… 22 5. Memory ……………………………………… 25 6. Bits and Codes ……………………………… 26 7. Binary Codes and ASCII Code …………… 28 MIND MAP ………………………………… 30 GLOSSARY ………………………………… 31 2. INPUT, OUTPUT AND STORAGE DEVICES 1. Types of Computers ……………………… 32 2. The Computer System …………………… 35 3. Computer Storage ………………………… 40 4. Bits and Codes Part 2: How Big Is a Bit? From Valves to Transistors and Integrated Circuits …………………… 44 MIND MAP ………………………………… 46 GLOSSARY ………………………………… 47 3. FROM MAINFRAMES TO SMARTPHONES 1. Mainframes, the First Electronic Computers …………………………………… 48 2. Personal Computers ……………………… 50 3. Portable Computers, Notebooks and Netbooks ……………………………… 52 4. PDAs, Tablets and Smartphones ………… 54 MIND MAP ………………………………… 58 GLOSSARY ………………………………… 59 4. AUTOMATION AND ROBOTICS 1. Introduction to Automation …………… 60 2. Using PCs in Automation – Microcontrollers ………………………… 66 3. Open Source Computer Boards ………… 70 4. Domotic Applications ……………………… 72 5. Industrial Applications …………………… 74 MIND MAP ………………………………… 78 INDUSTRY 4.0 …………………………… 79 5. OPERATING SYSTEMS AND SOFTWARE 1. What Is an Operating System? …………… 80 2. A Bit of History ……………………………… 84 3. Operating Systems for Personal Computers …………………………………… 88 4. Mobile Operating Systems MIND MAP ……………… 92 ………………………………… 94 INDUSTRY 4.0 …………………………… 95 6. APPLICATION SOFTWARE 1. Word Processors and Spreadsheets …… 96 2. Presentation Software …………………… 100 3. Graphics Software ………………………… 102 4. Development Tools ……………………… 104 MIND MAP ………………………………… 108 INDUSTRY 4.0 ………………………… 109 7. ALGORITHMS AND PROGRAMMING LANGUAGES 1. Algorithms …………………………………… 110 2. Writing Algorithms Using a Flow Chart ………………………………… 113 3. Programming Languages ……………… 116 MIND MAP ………………………………… 118 MOVIES AND MORE ………………………… 119 8. NETWORKING AND TELECOMMUNICATIONS 1. Sharing Resources ………………………… 120 2. LAN and WAN ……………………………… 122 3. Telecommunications ……………………… 124 4. Wi-Fi and Cellular Data Technologies … 128 MIND MAP ………………………………… 132 MOVIES AND MORE ………………………… 133 9. THE INTERNET 1. How the Internet Developed …………… 134 2. Internet Telephony ……………………… 137 3. The Internet and Its Core 4. E-Mails ……………… 140 ……………………………………… 146 5. The WWW (World Wide Web) …………… 148 6. Search Engines …………………………… 150 7. Social Networks …………………………… 153 MIND MAP ………………………………… 154 MOVIES AND MORE ………………………… 155 10.SYSTEM ADMINISTRATION AND SECURITY 1. Computers and Network Accounts …… 156 2. Encryption and Cryptography ………… 158 3. Viruses and Antiviruses ………………… 160 4. Firewalls ……………………………………… 163 MIND MAP ………………………………… 166 MOVIES AND MORE ………………………… 167 11. DATABASES 1. Using Databases to Manage Large Amounts of Data ………………………… 168 2. Relational Models ………………………… 171 3. Database Management Systems (DBMSs) ……………………………………… 175 4. Data Warehouses and Data Mining …… 177 MIND MAP ………………………………… 180 MOVIES AND MORE ………………………… 181 12. JOBS IN ICT 1. How ICT Has Led to Changing Work Patterns ……………………………… 182 2. Software and Web Designer …………… 188 3. Software and Web Developer ………… 188 4. Network Administrator ………………… 189 5. SEO and SEM Specialist 6. Curriculum Vitae ………………… 190 ………………………… 192 7. Covering Letter …………………………… 196 8. Job Interview: Dos and Don’ts ………… 198 MIND MAP ………………………………… 200 TASK: A PPT ABOUT YOUR SCHOOL-WORK EXPERIENCE …………………………… 201 13. SAFETY 1. Safety Signs ………………………………… 203 2. Work Safety: 10 Useful Tips ……………… 206 3. Body Parts ………………………………… 209 MIND MAP ………………………………… 212 MOVIES AND MORE ………………………… 213 APPENDIX 1. Marina Vriz ………………………………… 214 2. MUSA ………………………………………… 217 3. ‘Doctor, Doctor, I’ve got Backache.’ …… 221 4. CNA Pensionati with the Aldini Valeriani Institute Is Focusing on Digital, Narrowing the Gap, Transmitting Knowledge, and Encouraging the Generation-to-Generation Handover … 224 5. QubicaAMF ………………………………… 226 6. A Squiseat APPetite! ……………………… 229 7. Women in ICT ……………………………… 232 INVALSI TRAINER …… 238 Audio 1 HARDWARE, BITS AND CODES • Computer Architecture • History of Computers • The CPU • The Motherboard 1 • Memory • Bits and Codes • Binary Codes and ASCII Code Computer Architecture Introduction SPEAKING – GROUP WORK 1. These ten communication inventions changed the world forever. What do you know about each of them? These dates may be useful for your research: 3500 BC, 100 BC, 1453, 1837, 1896, 1926, 1943, 1973, 1983, 1996. • Wi-Fi Technology • Writing • Mobile phone • The computer • The Internet • The telegraph • Paper • The printing press • The radio • The television CHECK YOUR KNOWLEDGE 2. Complete the following sentences with the words in the box. television cell American Chinese Egyptians printing press computer 1. 2. 3. 4. 5. 6. 7. The ………………… told stories with pictographs. The ………………… invented paper 1,000 years before it arrived in Europe. Before the invention of the …………………, scribes had to write out books by hand. The inventor of Morse Code was ………………… . There is more than one inventor of the ………………… . Konrad Zuse invented the ………………… . The phones you carry with you are mobile or ………………… phones. SPEAKING – PAIR WORK 3. Complete the following sentences with the words in the box. • How do you think the inventions in the above exercise helped the spread of English? • How can you use these inventions to learn English? 9 1. Computer Architecture Alan Turing and ‘Intelligent Machines’ The pioneering mathematician Alan Turing is often considered the father of modern computer science. His idea of creating a machine to turn thought processes into numbers was a turning point in the history of computers. Turing, born in London in 1912, was fascinated by science throughout his childhood. While studying Maths at Cambridge in the 1930s, he developed some of his most significant mathematical theories. Despite his brilliance, he suffered from a feeling of isolation, and found it difficult to make friends. After graduating, Turing went to Princeton in the US, where he began work on what was later to become the first digital computer program – the Turing Machine. His revolutionary idea was for a machine that would read a series of ls and 0s from a tape. These described the steps needed to solve a problem or task. But it was only years later that technology had advanced sufficiently to transfer these ideas into real machines. Turing’s experiments helped the Allies win World War II by decoding encrypted German communications. The wartime German computer Enigma generated a constantly changing code which was impossible for people to decipher. But Turing’s creation of Colossus – the first fully electronic digital computer – managed to crack Enigma’s codes. After the war Turing continued research into digital computers including developing the Automatic Computing Engine, a large electronic digital computer. He wrote an article called ‘Intelligent Machinery’, which was one of the first to deal with the concept of artificial intelligence. He believed an intelligent machine could be created by following the model of the human brain. He compared devices such as cameras and microphones to parts of the human body and his views often put him in conflict with other scientists. In 1950 he devised the Turing Test, which has now become a standard measure of artificial intelligence. The test consisted of an interrogator in a separate room asking questions via keyboard to both a person and an intelligent machine. If, after a reasonable amount of time, the computer answers cannot be distinguished from those of the person, then the machine can be described as ‘thinking’. Turing always refused to conform to accepted ideas. At school he simply ignored subjects that did not interest him. He was an atheist and also felt marginalised because of his homosexuality. His life ended sadly when he committed suicide in June 1954 but he left the world a permanent legacy. 1 GLOSSARY thought process: processo mentale step: passo, fase the Allies: gli Alleati (durante la Seconda guerra mondiale) human brain: cervello umano thinking: pensante legacy: eredità 10 1. Hardware, Bits and Codes VOCABULARY 4A. Use a monolingual dictionary and orally explain the following words taken from the passage above. Can you understand them all? • Computer science • Turning point • Encrypted • Code • To crack • Marginalised 4B. Now try to write down your own definition of an ‘intelligent machine’. You can use either the words from your list or synonyms. …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… READING COMPREHENSION 5. Read the short biography of Alan Turing and make notes about major events in his life. Birth ………………………………………………………………………………………… Education ………………………………………………………………………………………… Career Death Before WW2: ……………………………………………………………………… During WW2: ……………………………………………………………………… After WW2: ……………………………………………………………………… ………………………………………………………………………………………… READING COMPREHENSION 6. Read the passage again and decide if the following statements are true (T) or false (F). 1. 2. 3. 4. 5. 6. Turing had the idea of using binary numbers to program computers. His ideas on programming were immediately applied to the computers of the time. Colossus created secret messages that Enigma could not decipher. Turing believed that the computers of his time were identical to the human brain. The ‘Turing Test’ is to find out if computers are more intelligent than human beings. At first, many of Turing’s ideas were not accepted by other scientists. T WRITING 7. Using your own words, summarise Turing’s important contributions to… 1. computer programming; 2. the development of the computer; 3. the study of artificial intelligence. …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… F 11 1. Computer Architecture MOVIE TIME • Pirates of Silicon Valley – Official Trailer 8. Watch the trailer for Pirates of Silicon Valley. The trailer starts with the speaker saying: ‘They were two twenty-year-old kids who took on the world… and took on each other…’ 1. Look for the phrasal verb ‘take on’ in a monolingual dictionary and find a suitable synonym. ……………………………………………………… ……………………………………………………… ……………………………………………………… 2. Who are the two main characters of the story? Have you ever heard their names? What are they famous for? ……………………………………………………… ……………………………………………………… ……………………………………………………… 3. What can you infer about their relationship from the trailer? ……………………………………………………… ……………………………………………………… ……………………………………………………… VIDEO 1-2 9. Watch the videos on Von Neumann computer architecture and make a list of the important features to remember and which you will discuss, together with these questions, with your classmates. 12 1. Hardware, Bits and Codes 2 History of Computers To instruct an electronic device (computer) to perform a task of yours, you need to have some understanding of these two things: – the history; – the components and how they coordinate with each other. Many discoveries and inventions have directly and indirectly contributed to the development of the personal computer (PC). The first computers of any kind were simple calculators. Even these evolved from mechanical devices to electronic digital devices. Here is a timeline of some significant events in computer history. 1617: John Napier Creates ‘Napier’s Bones’ Wooden or Ivory Rods Used for Calculating John Napier was a very famous mathematician of his time. He was born in 1550 in Edinburgh, Scotland. He introduced logarithms and the modern notation of decimals. Admitted to the University of St Andrews when he was only thirteen years old, Napier came back to his homeland by 1571 and married Elizabeth Stirling the year after. At the castle of Gartness, Napier explored his interests in the field of Religious Politics, Agriculture and Mathematics. For more than twenty years, Napier worked on a very complex idea that held great value for Physical Science. A device called Napier’s rods or bones shows his creativeness in the field of mathematics: multiplication, division and many other mathematical GLOSSARY functions could be done mechanically. wooden: di materiale ligneo This device helped in analogue rod: bastoncino computers and slide rules. Although he homeland: terra natale device: dispositivo never invented the natural logarithm logarithm function: funzione function, it is sometimes known as logaritmica the ‘Napierian Logarithm’. 2 13 2. History of Computers 1642: Blaise Pascal Introduces the Pascaline Digital Adding Machine 3 Blaise Pascal was a French mathematician, physicist and religious philosopher, born on 19 June 1623, in Clermont-Ferrand, France. Pascal laid the foundation of probability theory and further validated Evangelista Torricelli’s theory concerning the cause of barometrical variations and, during the 20th century, the Pascal (Pa) unit was named after the thinker in honour of his contributions to the understanding of atmospheric pressure and how it could be estimated in terms of weight. Pascal’s inventions and discoveries were instrumental in developments in the fields of Geometry, Physics and computer science, influencing 17th-century visionaries like Gottfried Wilhelm Leibniz and Isaac Newton. He is also widely known for his body of notes posthumously released as the Pensées. In 1642 Blaise Pascal started work on a calculator dubbed the Pascaline, inspired by the idea of making his father’s job of calculating taxes easier. The Pascaline was a numerical wheel calculator with movable dials, each representing a numerical digit. The invention, however, was not without its glitches: there was a discrepancy between the calculator design and the structure of French currency at the time. Pascal continued to work on improving the device, but the Pascaline was never a big seller. In the late 1960s, Swiss computer scientist Niklaus Wirth invented a computer language and insisted on naming it after Pascal. This was Wirth’s way of memorialising Pascal’s invention of the Pascaline, one of the earliest forms of the modern computer. Pascal died in Paris on 19 August 1662. GLOSSARY lay (v.): porre foundation: basi, fondamenta concerning: che riguardano weight: peso posthumously: postumo glitch: inconveniente tecnico currency: valuta 14 1. Hardware, Bits and Codes 1822: Charles Babbage, the Father of Computing 4 Charles Babbage was known for his contributions to the first mechanical computers, which laid the groundwork for more complex future designs. Babbage was born in London in 1791 and very early on developed a love of Mathematics. At Cambridge he received an honorary degree in Mathematics, but he was disappointed by the quality of the Maths teaching and joined the Analytical Society – a group of like-minded students interested in exploring Maths issues. It was as a student that he conceived of an idea to try and do calculations with a machine. It was after looking at a table for logarithms (many of which were wrong), that he thought it would be better to try and work them out systematically. Babbage achieved notable results in Cryptography, though this was still not known a century after his death. As early as 1845 Babbage had solved a cipher that had been posed as a challenge by his nephew Henry Hollier, and in the process he made a discovery about ciphers that were based on Vigenère tables. He realised that enciphering plain text with a keyword rendered the cipher text subject to modular Arithmetic. During the Crimean War of the 1850s, Babbage broke Vigenère’s autokey cipher as well as the much weaker cipher that today is called Vigenère cipher. His discovery was kept a military secret and was not published. Credit for the result was instead given to Friedrich Kasiski, a Prussian infantry officer, who made the same discovery some years later. However, in 1854, Babbage published the solution of a Vigenère cipher, which had been previously published in the Journal of the Society of Arts. In 1855 Babbage also published a short letter, ‘Cypher Writing’, in the same journal. Nevertheless, his priority wasn’t established until 1985. Babbage’s machines were among the first mechanical computers. He directed the building of some steam-powered machines that achieved modest success, suggesting that calculations could be mechanised. While Babbage’s machines were mechanical and unwieldy, their basic architecture was similar to a modern computer. The data and program memory were separated, operation was instruction-based, the control unit could make conditional jumps, and the machine had a separate I/O unit. GLOSSARY groundwork: lavoro preparatorio develop (v.): sviluppare conceive (v.): ideare, elaborare challenge: sfida as well as: così come, al pari di previously: precedentemente, in precedenza 15 2. History of Computers 1860: Herman Hollerith – IBM 1924 5 In the 1880s the American inventor Herman Hollerith devised a system of encoding data on cards by means of punched holes. He combined this with a new method of automatically reading the data using metal pins which could pass through the holes and set up electrical circuits. Hollerith’s machine was used for calculating statistics and sorting information. The Tabulating Machine Company which he set up in 1896 eventually became International Business Machines Corporation – IBM – in 1924, a pioneer in the production of computers. GLOSSARY punched: perforato pin: puntina metallica, spillo sort (v.): organizzare pioneer: pioniere, precursore John Presper Eckert and John Mauchly GLOSSARY come into being (v.): avere origine absolutely: assolutamente vacuum tube: valvola termoionica miniaturisation: miniaturizzazione tiny: minuscolo 6 In 1946 these two American engineers designed ENIAC (Electronic Numerical Integrator and Calculator), the first general-purpose electronic computer. It came into being after the work of several other inventors who had experimented the use of Electronics to process data and here it is absolutely worth mentioning again the British mathematician Alan Turing. ENIAC was a large, stand-alone machine operated with punched-card programs. It was 24 metres long, weighed 30 tons, and contained 17,000 vacuum tubes linked by 800 kilometres of wiring. It was considered immensely useful at the time, especially when compared to handoperated calculators. Over the following 25 years computer development was characterised by increasing miniaturisation. Following the invention of the transistor in 1947 and the integrated circuit (which you will study in the following unit) in 1958, American engineer Marcian Hoff built the first microprocessor in 1971, combining all the basic elements of a computer on one tiny silicon chip. 16 1. Hardware, Bits and Codes Steve Jobs 7 The entrepreneur and inventor Steve Jobs (San Francisco 1955 – Palo Alto 2011) was one of the most influential developers of the modern computer. It was in 1975 that, working in his family’s garage with his friend Stephen Wozniak, he designed and built the Apple I, one of the very first personal computers. Jobs and Wozniak founded what is considered the world’s biggest start-up, the Apple Computer Company, in 1976. Immediately after that, the Apple II personal computer was produced and greatly appreciated. In 1984 Apple introduced the Macintosh, the first commercial PC with a Graphical User Interface (GUI). The user was presented with a list of choices (menu) with pictures (icons) arranged into boxes (windows) representing applications and programs. It was with the help of a mouse that the user could select an icon and run a program. It was the first time that anyone could use a computer with no special training. Over the years, Apple has developed well-designed innovative products which have continuously advanced personal computers: from the lightweight portable laptop (the PowerBook in the early 1990s) to the most popular tablet, the iPad, in 2010. It came naturally for the company to expand into the field of mobile phones and Internet services with the iPhone and iTunes. GLOSSARY entrepreneur: imprenditore design (v.): progettare, pianificare greatly: largamente, molto representing: che rappresenta, raffigurante anyone: chiunque lightweight: leggero field: campo, ambito 17 2. History of Computers Bill Gates The American computer scientist and businessman Bill Gates has built his reputation primarily in the field of software. With his company, Microsoft, founded with partner Paul Allen in 1975, he created a range of standardised easy-to-use programs which enabled ordinary people to put their PCs to practical use. When Microsoft began, computers were considered as just complex tools for technicians but Gates had a vision of ‘a computer on every desk and in every home’. In 1981 Microsoft released the DOS (Disk Operating System) for the first IBM PCs, followed in 1985 by Windows, which borrowed ideas from Apple’s GUI system and rapidly became the leading operating system worldwide. As computer hardware developed, with growing multimedia and Internet capabilities, Microsoft created the software to enable it to work through, for example, programs for word processing, spreadsheets, graphics and web browsing. 8 GLOSSARY businessman: uomo d’affari, imprenditore easy-to-use: di facile utilizzo, semplice da usare tool: strumento, attrezzo borrow (v.): mutuare, prendere in prestito spreadsheet: foglio di calcolo 18 1. Hardware, Bits and Codes READING COMPREHENSION 1. Read the computer history timeline and find out when the following first appeared. 1. 2. 3. 4. 5. 6. 7. 8. The Windows Operating System ……………………………………………………………… The Microsoft Company ………………………………………………………………………… A commercial computer inclusive of mouse, windows and icons ………………………… Personal computers …………………………………………………………………………… An electronic computer that could be used for different tasks …………………………… Mechanical calculators ………………………………………………………………………… Laptop computers ……………………………………………………………………………… An automatic calculating machine …………………………………………………………… READING COMPREHENSION 2. Who… 1. devised a system of encoding data on cards by means of punched holes? …………… ……………………………………………………………………………………………………… 2. created the first ‘computer on a chip’? ………………………………………………………… 3. founded Microsoft with Bill Gates? …………………………………………………………… 4. founded Apple with Steve Jobs? ……………………………………………………………… 5. built the first automatic calculator? …………………………………………………………… 6. devised a machine with all the basic elements of a modern computer? ………………… ……………………………………………………………………………………………………… 7. created the first calculating machine run by electricity? …………………………………… ……………………………………………………………………………………………………… 8. produced an Operating System for the first IBM PCs? ……………………………………… READING COMPREHENSION 3. What information can you infer from the short paragraphs about other important people who contributed to the creation of the computer? ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… READING COMPREHENSION 4. Read the computer history timeline and decide if the following sentences are true (T) or false (F). T F 1. Babbage’s analytical engine worked with electricity. 2. Pascal’s calculator was based on the decimal numbering system. 3. The DOS Operating System was built around the use of a mouse. 4. Bill Gates created new types of computers. 5. Steve Jobs helped to make computers more user-friendly. 6. ENIAC was the first electronic computer to use transistors. 7. Babbage and Hollerith devised the same system for programming calculators. 8. The analytical engine was built in 1833. 19 2. History of Computers Where Are Computers Used? Computers have an enormous range of applications in many different fields. A. Computers have opened a new era in manufacturing and consumer-product development. In design offices, special programs enable engineers and architects to create 3D-models on a computer screen. In factories other applications help managers to plan production and control automated machinery. B. Researchers use computers to collect, store, manipulate and analyse data. Running simulations is an important application: data representing a real-life system is entered into the computer, and the data is manipulated to study how the system behaves in different conditions. Chemists, for example, use computer simulations to design and test models of new drugs. Meteorologists base their predictions on simulated models of weather conditions. C. Computers play a vital role in national and local administration. They are essential, for example, in compiling population data and other statistics, paying social security benefits, handling tax records, maintaining criminal records and innumerable other administrative tasks. D. All modern systems are dependent on computers. They operate telephone switching systems, coordinate satellite operations and control the equipment for television and radio broadcasting. Local area networks connect the computers in separate departments of businesses and other institutions while the Internet links computers all over the world. E. Computers are increasingly being used for teaching in schools and universities. Computerised lessons range from simple repetitive exercises to complex interactive simulations. Certain programs have become essential teaching tools in medical schools and many other training centres, including flight simulators to train pilots. Many reference works are available either on CD/DVD or through the Internet, and traditional textbooks are being replaced by e-books read on computers. F. Video games are one of the most popular PC applications. The constantly improving graphics and sound capabilities of PCs have made them popular tools for artists and musicians. Painting and drawing programs enable artists to create realistic images and animated displays. Musicians can use computers to create multiple-voice compositions and to play back music with complex variations. The film industry is a major user of computer technology to create special effects and computer-generated images. GLOSSARY range: gamma, varietà enable (v.): rendere in grado di, consentire machinery: macchinari industriali behave (v.): comportarsi drug: farmaco compile (v.): compilare task: compito, attività equipment: attrezzatura all over the world: in tutto il mondo increasingly: sempre più training centre: centro di formazione painting: relativo alla pittura musician: musicista READING COMPREHENSION 5. Choose the correct heading for each paragraph (A-F). 1. Education 2. Government …… …… 3. Entertainment 4. Industry …… …… 5. Science …… 6. Telecommunications …… READING COMPREHENSION 6. Match each word or phrase (1-6) to its correct sentence ending (A-F). 1. 2. 3. 4. 5. 6. Architects Film directors Government agencies Scientists Telecoms engineers Training Institutions use computers to… A. collect and organise bureaucratic information. B. construct precise models of buildings. C. create spectacular special effects. D. allow practice in simulated real-life situations. E. improve the efficiency of telephone networks. F. test theories in varying simulated conditions. 20 1. Hardware, Bits and Codes 3 The CPU 9 CPU is the abbreviation of Central Processing Unit and is the computer component that carries out the instructions contained in a program using the working and the I/O memory. If we compare a computer to a human being, the CPU is definitely the brain. The main components of a CPU are the Arithmetic and Logic Unit (ALU), which is the processing component where the logic and arithmetic operations are processed, and the Control Unit (CU), whose task is to coordinate all the actions needed for the processing of a single instruction or set of instructions. The Control Unit communicates with the working memory and input/output devices to give the ALU the correct sequence of data and instructions to process and to take the results from it. Apart from the ALU and Control Unit, the CPU also contains memory components called registers, where data (operands) are loaded from time to time and are required by the ALU for every single operation. The result of every operation executed by the ALU is placed in a register called an ‘accumulator’ and later moved by the Control Unit to the working memory in order to free some space for the next computation results. The term CPU was not used during the production of the first electronic calculators because of the dimensions of the electronic components at the time. That is, thermionic valves, the ALU and the Control Unit were placed in two different rooms, so they were two different blocks located in different places. The first CPU ever put into business was the IBM 709 Central Processing Unit, which had thermionic valves, but was situated in one room only and used in an IBM computer called IBM 709 Data Processing System in 1958. With the introduction of transistors and integrated circuits, the CPU has gradually reduced in size, from occupying a whole room to a single electronic board that you could hold in one hand as an integrated circuit. This is the shape that everybody knows nowadays because it is in every personal computer and is known as a microprocessor. The first CPU, even if in limited numbers, started to be sold in 1971. It was fully contained in a monolithic integrated circuit and was the Intel 404 microprocessor designed by an Italian, Federico Faggin, who later made other Intel microprocessors with even better performance. After working for Intel, Federico Faggin founded and directed Zilog, the first company which produced only microprocessors and which later gave birth to the famous Z80, a microprocessor which is still being produced today and which was the main component of several successful personal computers made in the 1980s. Because of these products, which increasingly became more powerful and cheaper, Federico Faggin made a remarkable contribution to the spread of personal computers and electronic devices in general. GLOSSARY carry out (v.): eseguire processing: elaborazione loaded: caricato because of: a causa di, in ragione di whole: intero shape: forma microprocessor: microprocessore remarkable: notevole 21 3. The CPU The CPU CHECK YOUR KNOWLEDGE 1. Answer the following questions by choosing the correct option. 1. What is the purpose of the CPU? A. To create data. B. To store data. C. To process data. 2. What does the Control Unit do? A. It controls and monitors communications between the computer and any attached hardware. B. It holds the data and programs that the CPU needs. C. It carries out calculations and logic operations. 3. What does the Arithmetic and Logic Unit do? A. It controls and monitors communications between the computer and any attached hardware. B. It holds the data and programs that the CPU needs. C. It carries out calculations and logic operations. 5. How many instructions can a CPU process at a time? A. One. B. Many. C. It does not process instructions. 6. When the CPU fetches the instruction from the main memory, where does it store it? A. In the Control Unit. B. In the Arithmetic and Logic Unit. C. In the Immediate Access Store. 7. What is it called when the CPU carries out the action of an instruction? A. Fetching the instruction. B. Decoding the instruction. C. Executing the instruction. 4. What can often be referred to as the registers in a CPU? A. The Control Unit. B. The Immediate Access Store. C. The Arithmetic and Logic Unit. Wise people say that laughter is the best medicine - have a go! Last summer, an unlucky computer programmer drowned at sea. Many people were on the shore and heard him cry out in despair ‘F1! F1!’, but nobody understood. (F1 = Help) From www.academictips.org 22 1. Hardware, Bits and Codes 4 The Motherboard 10 The motherboard is an electronic board which constitutes a physical and electrical support for the components of a computer, especially the CPU and memories. Like all electronic boards, the motherboard is a printed circuit board where all the electronic components are soldered to make the system work. The bus, which is the set of links that allows the CPU, memory and peripherals to communicate with each other, is one of the fundamental components of the architecture of a computer and is made with appropriate copper tracks inside the motherboard. The first motherboards had quite a number of expansion slots that allowed other boards, used to manage various input and output devices such as the keyboard, mouse, video, printers and storage devices (hard disk, floppy disk, CD and DVD players), to be connected to them. Modern motherboards integrate all the electronics needed to create a complete computer: video card, USB ports for connecting a keyboard, mouse, printer and even the board for the network connection thanks to the recent progress in the production of increasingly complex and smaller integrated circuits. These features make it extremely easy, at least for insiders, to assemble a personal computer. You can just plug in the CPU and the memory and connect the mass storage devices through special cables to the specially made connectors on the motherboard. Probably the most difficult operation during the assembly phase is inserting the whole thing in a case equipped with the power supply which is needed to provide the right electrical parameters to all the components, to make them work properly. In choosing a motherboard we need to take into account the necessary CPU to work with; in fact every motherboard contains a socket that holds an integrated circuit or a microprocessor corresponding to the desired CPU. The main difference between microprocessors is the number and positioning of their pins and the data that is sent and received through them. The socket connections must correspond to the chosen CPU pins, otherwise the system might not work properly or, even worse, it can get damaged. These are the reasons why companies produce more than one type of motherboard, so it can support families of CPUs; therefore, a group of CPUs share the same pins. GLOSSARY motherboard: scheda madre printed: stampato copper: rame expansion slot: slot di espansione feature: caratteristica power supply: fonte di alimentazione socket: presa support (v.): sostenere, supportare 23 4. The Motherboard READING COMPREHENSION 1. After reading the passage, answer the following questions. 1. What is a motherboard? ………………………………………………………………………… ……………………………………………………………………………………………………… 2. Why can it be considered an electrical support? …………………………………………… ……………………………………………………………………………………………………… 3. What is the function of the bus? ………………………………………………………………… ……………………………………………………………………………………………………… 4. What are the main features of modern motherboards? ……………………………………… ……………………………………………………………………………………………………… 5. What is it important to do during the assembly phase of a motherboard? ………………… ……………………………………………………………………………………………………… 6. What is the role of a socket within the motherboard? ………………………………………… ……………………………………………………………………………………………………… 7. What is important to remember in order to avoid the risk of damaging the system? …… ……………………………………………………………………………………………………… 8. Why are there different types of motherboards on the market? …………………………… ……………………………………………………………………………………………………… TRANSLATION 2. Translate the following sentences into English. 1. I computer sono usati per vari scopi come scrivere, elaborare dati e informazioni. ……………………………………………………………………………………………………… 2. La scheda madre funziona da centro delle comunicazioni. ……………………………………………………………………………………………………… 3. Più in fretta lavora la CPU, più potente è il computer. ……………………………………………………………………………………………………… 4. Il codice ASCII onnipresente è stato originariamente definito come un set di caratteri a sette bit. ……………………………………………………………………………………………………… 5. L’unità di capacità di stoccaggio di misura è il byte. ……………………………………………………………………………………………………… 24 1. Hardware, Bits and Codes PET Listening – Part 2 11 3. For each question, choose the correct answer. 1. You will hear two friends talking about watching films on the computer. What kind of solution does the man suggest? A. To buy a new computer. B. To install a new graphics card. C. To adjust the picture quality of the screen. 2. You will hear two friends talking about a new computer. The woman thinks that A. her device seems unable to manage more programs open at the same time. B. she really can’t manage with that new computer. C. she should add some extra RAM memory. 3. You will hear two friends talking about some videos to share. What’s the best way to do that? A. Copying them on the computer’s hard disk. B. Adding a new USB port. C. Transferring them on an external hard disk. 4. You will hear a man complaining about his computer. What does his friend suggest him to do? A. He thinks his computer is too old and slow, especially for playing computer games. B. He wonders if he could buy a new microprocessor. C. She proposes him to upgrade the CPU. 5. You will hear two friends talking about the new speakers she’s bought. What does the man propose? A. He suggests her to get new ones. B. He proposes to change the sound card of the computer. C. He suggests to check the sound quality. 25 5. Memory 5 Memory 12 The component of the computer used to store or remember information. All computers have some internal memory located within the system and close to the central processor. One of the fundamental components of computer architecture is the working memory, which holds data and instructions required for the processing done by the CPU and which stores the results from every computation. The working memory is better known as RAM in modern computers. Random Access Memory is electronic memory available as integrated circuits. From the logic point of view, we can think of the memory as a set of cells where every cell can contain a byte, which is equal to an alphanumeric character. Each cell is identified by a progressive number called ‘address’, which unambiguously identifies that cell, thus allowing the CPU to select any single cell to read or edit its contents. The term Random Access refers to the way that the CPU reaches the various memory cells, that is, via their address instead of being accessed sequentially like in memory tapes, where the desired cell is found by analysing the cells one by one. The ‘random’ term could be misleading because there are no random things in the mechanisms of memory management. The main features of all memories, including RAM, are storage capacity and access time. The former is the amount of data that can be stored, while the latter is the read/write speed of data in the memory itself. The storage capacity unit of measurement is the byte, which corresponds to the amount of memory needed to store an alphanumeric character as well as the size of a single cell. In modern computers, especially when referring to RAM or storage devices (hard disk, CD and DVD), the capacity is expressed in multiples of bytes: kilobytes, megabytes, gigabytes and terabytes. A kilobyte equals 1,024 bytes (2 to the power of 10), a megabyte equals 1,024 kilobytes, a gigabyte equals 1,024 megabytes, and a terabyte equals 1,024 gigabytes. To have a reasonably accurate idea of size, we can replace the factor 1,024 with 1,000, which allows an easier calculation. We can therefore say that a kilobyte is approximately 1,000 bytes, a megabyte is approximately one million bytes, one gigabyte is about one billion bytes, and so on. The access time is the time span that goes from the moment when a memory device (RAM or mass memory) receives the request from the CPU to read or write data in a particular cell, to the time when the data is actually read or written. Since the writing operation is usually more expensive in terms of time, the access time is related to writing. The access time is measured in submultiples of a second and is generally expressed in nanoseconds (billionths of a second) for electronic types of memories like RAM, and in milliseconds (thousandths of a second) for mass storage devices such as hard disk devices, which are way slower because of the necessity to move mechanical parts to terminate their operation. GLOSSARY store (v.): immagazzinare hold (v.): tenere, contenere cell: cella thus: in modo da, così VOCABULARY the former… the latter: il primo/i primi… il secondo/i secondi allow (v.): permettere, consentire submultiple: sottomultiplo – PAIR WORK 1. Read the passage and with a classmate look for the definitions of the following terms. 1. RAM 2. Working memory 3. Milliseconds 4. Address 5. Storage capacity 6. Memory 7. Gigabyte 26 1. Hardware, Bits and Codes READING COMPREHENSION 2. Read the passage and decide if the following sentences are true (T) or false (F). Correct the false ones. T F 1. ‘RAM’ is not available as integrated circuits. ……………………………………… 2. Access time is measured in multiples of bytes. …………………………………… 3. RAM is a typical feature of modern computers. …………………………………… 4. Terabytes are multiples of bytes. ……………………………………………………… 5. Access time, as well as storage capacity, is available only in specific types of computer memory. …………………………………………………………………… 6. Hard disk devices are slow because they lack memory.…………………………… 7. 1,024 kilobytes make a megabyte. …………………………………………………… READING COMPREHENSION 3. Reorder the multiples of bytes, starting with the smallest one. …… Gigabyte 6 …… Kilobyte Bits and Codes We have seen that a byte is the unit of data storage capacity for the memory, and corresponds to the space needed to store an alphanumeric character. Despite its reduced capacity, the byte is not the smallest information unit that can be memorised in a computer – the bit is. The meaning of the word ‘bit’ also comes from the words binary digit, a number that can assume two values only: 0 and 1. Other information, such as true or false, or yes or no, can be associated with these values. It is possible to represent (encode) any number or any generic information by using a set of bits in a binary system. For instance, if we want to represent the traffic light state, we can associate 11 with green, 00 with red, 01 with amber and 10 with blinking amber. As the example shows, the higher the amount of information to represent is, the higher the amount of bits to associate with each information (to have a string of zeroes and a bit that identifies each piece of information in a unique way) is going to be. We can say that a byte is a string of 8 bits since we need 8 bits to represent any of the standard alphanumeric keyboard characters. We can ask ourselves why computer memory is represented as sets of binary digits such as 0 and 1. Well, the answer is quite simple: 0 and 1 are values that can be easily generated, …… Terabyte …… Megabyte 13 memorised, processed and transmitted by electronic circuits. Let’s analyse this picture to clarify the above statement: a lamp will turn on as we turn its switch on, and will turn off as we turn its switch off. Both switch states can be represented with values like 0 when the switch is on and 1 when it’s off. Indeed, a computer can be seen as a gigantic matrix of switches operated by appropriate electrical signals rather than by our manual intervention. The first electronic computers had these switches made with vacuum tubes, GLOSSARY despite: nonostante digit: cifra value: valore blinking: lampeggiante keyboard: tastiera switch: interruttore 27 6. Bits and Codes modern computers use transistors, located directly inside as integrated circuits. We might ask ourselves ‘What is a bit?’. Well, we could say that it is a transistor with infinitesimal dimensions within a memory chip or a CPU. The invention of the transistor, as we know it today, was made by William Shockley, who designed it in 1948 and received a Nobel Prize for Physics in 1956 along with colleagues Walter Brattain and John Bardeen. A drastic reduction in the size of electronic equipment, which is one of the main obstacles to the development of increasingly complex and powerful computers, was made possible with the use of transistors instead of vacuum tubes. VS GLOSSARY inside: all’interno instead of: in luogo di, invece di VOCABULARY 1. Match the pictures with the words in the box. string CPU vacuum tubes matrix transistor electronic circuit 1. ……………………………… 2. ………………………………… 3. ……………………………… 4. ……………………………… 5. ……………………………… 6. ……………………………… READING COMPREHENSION – PAIR WORK 2. After reading the passage, answer the following questions with a classmate. 1. 2. 3. 4. 5. 6. 7. What is a byte? Is the byte the smallest information unit that can be memorised in a computer? What does ‘bit’ stand for? How many values can a binary digit have? Why is using a set of bits in a binary system important? Why is a byte said to be a string of 8 bits? To what extent do the components of the first electronic computers and the modern ones differ? 8. Why was William Shockley awarded the Nobel Prize for Physics in 1956? 28 1. Hardware, Bits and Codes 7 Binary Codes and ASCII Code 14 The computer is an electronic machine that is able to recognise only two values: zeroes and ones. Obviously, these values cannot be intended as we understand them, but they correspond to electrical signals or, more precisely, to voltage levels: 0 corresponds to zero volts and the value 1 corresponds to a voltage of a few volts. 5 volts are quite often used to represent the value 1 even though modern personal computers tend to use lower voltage levels to optimise performance and power supply consumption. If we have only two digits available, this does not imply a limitation on the amount and nature of information that can be stored and processed by a computer, but only a tie that must be respected for their representation, or their encoding. Thanks to techniques like floating point representation, we can display either large or small numbers without using long and difficult sequences of 0s and 1s. When the information to represent is not a numeric value, then we should associate to each piece of information a sequence (binary string) of zeros and ones in such a way as to make each element identified by distinguishing it from others. This is called ‘encoding’. The more information there is to be encoded, the longer the binary strings will be. To clarify the concept of encoding, let’s assume we have to represent the four compass points. We can associate North with 00, South with 01, East with 10 and West with 11. But even if we had to represent the intermediate points NE, SE, NW and SW we would not have any available long string combinations of zeros and ones formed by at least three digits or three bits. In this way we can associate a binary string with any distinct information and get, for example, 000 for North, 001 for South, 010 for East, 011 for West, 100 for North East, 101 for South East, 110 for North West and finally 111 for South West. Encoding can also be done by using more binary digits than what is strictly necessary, and so by GLOSSARY referring to the previous example we could have to select strings of four or more bits using only a portion voltage: tensione elettrica available: disponibile, a disposizione of possible distinct combinations arising from them. tie: vincolo In this case, the encoding is defined as redundant encoding: codifica and is mainly used in telecommunications for the arise from (v.): verificarsi, avere origine da recognition and automatic error correction in data redundant: ridondante transmission. 29 7. Binary Codes and ASCII Code Data encryption requires the producers of digital electronic systems to adopt some specific rules. For example, a manufacturer of keyboards cannot adopt a coding of its own choice as we did for the cardinal points, but must respect a standard which is known as ASCII code. This encoding guarantees that by connecting the keyboard produced by company X to the computer produced by company Y, when we press ‘A’ the computer will recognise the code sent by the keyboard as the character ‘A’. ASCII stands for American Standard Code for Information Interchange and is the standard for the exchange of information. It provides the basis to associate a string of eight binary digits, or a byte to every character, and then justifying what we have previously said: one byte corresponds to the memory space required to contain an alphanumeric character. GLOSSARY justify (v.): spiegare, giustificare alphanumeric: alfanumerico VOCABULARY 1. Use a monolingual dictionary and orally explain the following words taken from the passage above. Do you understand them all? • Sequence • Binary string • To encode • Redundant • Encryption • To require • Abbreviation • Alphanumeric Meet a Very Special Computer – HAL 9000 Hal 9000 is a peculiar computer indeed. It is one of the main characters – in a way, the protagonist – of Stanley Kubrick’s film 2001: A Space Odyssey. As the title suggests, the story takes place on the Discovery One spaceship which is controlled and maintained by the high-tech computer Hal 9000. 2001: A Space Odyssey was filmed and released in 1968, and being a science fiction movie, the computer was given features that made it very different from real computer machines of that time. Hal 9000 can: • speak; • recognise faces and people; • read lips; • play chess; • express and infer emotions. PET Writing – Part 3 2. Read the following quotation and write a short text to comment it and express your point of view. Write your answer in about 100 words. ‘I do not fear computers. I fear the lack of them.’ (Isaac Asimov) ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… MIND MAP Amount of data that can be stored Read / Write speed of data in the memory itself is is Storage capacity Access time Main features WORKING MEMORY known as RAM (Random Access Memory) holds from logic point of view stores Data and instructions required by CPU Results from every computation Is a set of cells each of them containing a byte GLOSSARY 31 Microprocessor ALU (Arithmetic and Logic Unit) Motherboard Binary Code Pin CDs/DVDs Plug Computer Punched cards CPU (Central Processing Unit) Socket CU (Control Unit) Spreadsheet Enigma Machine Switch GUI (Graphical User Interface) Transistor Keyboard Vacuum Tube glossary • glossary• glossary• glossary• glossary• glossary• glossary• glossary Alphanumeric Audio INPUT, OUTPUT AND STORAGE DEVICES • Types of Computers • The Computer System • Computer Storage 1 Types of Computers When we speak about computers we can refer to any device used to perform calculations with numbers, even a simple abacus. However, nowadays we normally think of a computer as an electronic device which carries out tasks or calculations by following a specific series of instructions called ‘a program’. A computer is a combination of hardware and software. Hardware refers to all the pieces of equipment that you can see and touch, for example the keyboard, the screen and, most important of all, the Central Processing Unit (CPU), a microprocessor which functions as the brain of the computer controlling all its actions. Software refers to all the programs which tell the hardware what to do. Computers come in all shapes and sizes, from a tiny embedded computer built inside a microwave oven to a gigantic mainframe computer which can be as big as an entire room. Embedded computers are microchips found inside a variety of machinery and equipment, including pocket calculators, smartphones, car engines and video game consoles. They are pre-programmed to carry out a very specific, limited number of tasks. Mainframes are large powerful super computers with thousands of linked microprocessors, used by governments and universities to perform highly complex calculations. The most common type of computer is called a ‘personal computer’ because it is designed to be used by one person at a time, and has developed into a number of different forms. 2 • Bits and Codes Part 2: How Big Is a Bit? From Valves to Transistors and Integrated Circuits 15 A picture showing Alessia Ranzi, Alessandra Rebecchi and their students from Aldini Valeriani High School in Bologna at Cosworth Electronics UK. GLOSSARY abacus: abaco screen: schermo built inside: costruito all’interno embedded: integrato mainframe: elaboratore centrale at a time: alla volta, per volta 33 1. Types of Computers READING COMPREHENSION 1. Read the passage and give a simple explanation of the following terms. 1. 2. 3. 4. 5. 6. Hardware …………………………………………………………………………………………… Software ……………………………………………………………………………………………… Program ……………………………………………………………………………………………… Personal computer ………………………………………………………………………………… Embedded computer ……………………………………………………………………………… Mainframe computer ……………………………………………………………………………… VOCABULARY 2. Choose the correct name (A-I) for the computer in each picture. A. Notebook/Laptop …… B. Smartphone …… C. Personal computer …… D. Desktop …… 2 3 1 6 4 E. PDA (Personal Digital Assistant) …… F. Tablet …… G. Device with embedded computer …… 5 7 8 H. Mainframe computer …… I. Netbook …… LISTENING 9 16 3. Listen and decide which device corresponds to each of the following descriptions. 1. They allow the user to access the Internet and make phone calls. ………………………………………………………………………………………………………… 2. Their shape and screen size makes them suitable for watching videos and reading e-books. ………………………………………………………………………………………………………… 3. They are as powerful as desktop computers and are easier to transport. ………………………………………………………………………………………………………… 4. They are very easy to carry and are mainly used to store data. ………………………………………………………………………………………………………… 5. They consist of separate components which need to be connected. ………………………………………………………………………………………………………… 6. They were designed particularly for web browsing and e-mail. ………………………………………………………………………………………………………… 34 2. Input, Output and Storage Devices CHECK YOUR KNOWLEDGE 4. With the help of the pictures below describe the range of computers now in use. 3 1 2 VOCABULARY 5. Match each word or expression (1-15) with the correct definition (A-O). Report orally the Italian translation of the words to the teacher. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 1. Back-up Bluetooth To configure To crash To digitise To erase Driver Hertz High-definition To log on Peripheral Portable Universal Serial Bus (USB) 14. To upgrade 15. Wi-Fi A. A copy of the information held on a computer, stored separately from the computer. B. A piece of hardware, such as a printer, which is external to a computer but connected to it and controlled by it. C. A piece of software which allows a peripheral device to work with a computer. D. Technology allowing two electronic devices which are close together to communicate using radio waves and without wires. E. A unit of frequency equal to one cycle per second. F. A way of connecting a device to a computer using wires so that they can work together. G. A way of connecting computers or electronic devices to a network without using radio waves. H. Having a high quality screen which can show images in great detail. I. Light and easy to carry. J. To arrange a computer or other electronic system so that it works with other equipment. K. To connect a computer to a computer system so that you can start working. L. To make a device or program better and be able to do more things. M. To remove information from a computer memory. N. To suddenly stop functioning. O. To translate information into a digital form. TRANSLATION 6. Translate the following sentences into English. 1. I computer sono usati per controllare i movimenti dei robot industriali. ………………………………………………………………………………………………………… 2. Un modem comunica con altri computer usando le linee telefoniche. ………………………………………………………………………………………………………… 3. Il mouse è un piccolo congegno attivato dalla mano che controlla il movimento del punto di inserimento sullo schermo. ……………………………………………………………………… ………………………………………………………………………………………………………… 4. I mainframe possono elaborare più informazioni e risolvere i problemi più complessi di qualsiasi altro tipo di computer. ………………………………………………………………… ………………………………………………………………………………………………………… 35 2. The Computer System 2 The Computer System A computer is a complex device consisting of many different components. This hardware can be divided into four groups corresponding to the four basic computer functions. The computer • takes in data; • processes the data according to the instructions in the programs; • shows the results of this processing to the user; • stores these results in its memory. WARM-UP 1. Match each word listed below with its correct definition. 1. Input is A. B. 2. Processing is 3. Output is 4. Storing is C. D. the equipment which displays the results of the computer work (printer, screen etc.). the equipment needed to feed data into the computer (keyboard, mouse etc.). the hardware which functions as the computer memory (hard disk). It allows storage of data so that it can be used again in the future. the equipment which follows the orders of programs to transform data. The most important element is the microchip called the Central Processing Unit (CPU). Hardware Groups All the different pieces of hardware are somehow interlinked through a communication network called a ‘bus’. The centre of communications is the computer principal circuit board, known as the ‘motherboard’, which works under the control of the CPU. The CPU is therefore the most fundamental element of computer hardware with a double function. It processes the data the users input into a computer. At the same time, it also controls the operations of all the other pieces of hardware so that the computer functions as a single unified system. The faster the CPU works, the more powerful the computer is. The speed of a CPU is determined by its clock frequency and is measured in hertz (Hz), cycles per second, with each cycle representing one elementary operation. A CPU with a clock speed of 4GHz (gigahertz) can perform 4 billion operations every second. The faster the clock, the more instructions the CPU can execute per second. GLOSSARY interlinked: interconnesso unified: unificato perform (v.): compiere 36 2. Input, Output and Storage Devices READING COMPREHENSION 2. Read the passage and match the beginning of each sentence with the correct ending. 1. 2. 3. 4. 5. 6. 7. 8. A bus Computer hardware A CPU A hard disk A motherboard An input device An output device The clock speed A. B. C. D. E. F. G. H. can be divided into four groups. feeds data into the computer. functions as the computer memory. indicates how fast the computer can work. is a communication network linking the hardware. is the computer central circuit board. processes data and controls computer operations. shows the results of the computer work. VOCABULARY 3. Match the pictures of input and output devices (1-15) with their name (A-O). K. Scanner …… G. Microphone …… L. Touchscreen …… …… H. Printer …… M. 3D-printer …… D. Keyboard …… I. Touchpad …… N. External hard drive …… E. Mouse …… J. Modem …… O. USB key A. Joystick …… F. Speaker B. Monitor …… C. Sensor …… …… 1 2 3 5 4 6 8 7 9 11 10 13 14 12 15 37 2. The Computer System VOCABULARY 4. Match the names of input and output devices from the previous exercise with the following descriptions. A. Joystick 1. In addition to the letters of the alphabet, this device also includes function keys to perform special tasks and keys to control the movement of the cursor on the screen. B. Monitor 2. A portable storage device which is generally used to back up computers, thus avoiding data loss. 3. Registers changes in the external environment, for example temperature or light, and converts them into digital data which can be stored by the computer or trigger it into taking action. C. Sensor D. Keyboard E. Mouse 5. Enables communication between computers over telephone lines by converting digital data into telephone signals and vice versa. F. Speaker 6. A device that uses light sensors to digitise photographs and other illustrations, translating them into numerical form for processing by a computer. G. Microphone 7. This device usually takes the form of a flat screen panel with a display based on liquid crystal technology. Older models use a cathode ray tube. H. Printer I. Touchpad 9. This device is usually light and small so it is very easy to carry around in your pocket and bag to store information and data. J. Modem 10. Transforms digital signals into sound waves which can be heard by the user as, for example, music or speech. Scanner 11. This device enables the user to activate the computer by using a finger to touch symbols or words shown on the screen. K. L. M. Touchscreen 3D-printer N. External hard drive O. USB key 4. By moving this device around any flat surface, the user can direct the movement of the cursor on the screen. It can give instructions by selecting icons on the screen and clicking on a button. 8. Produces output on paper. The most common types are inkjet, spraying liquid ink, or laser, using a dry ink called toner. 12. By moving a finger around a small area of sensitive plastic, the user can control the movement of the cursor on the screen, select icons and give instructions by clicking on a button. 13. This device converts sound waves into electronic signals which can be read by the computer and stored in its memory. 14. This device manufactures three-dimensional solid objects from a digital file. 15. This device has a part which can move in different directions and the movement is translated into corresponding signals to be shown on a screen or to control the actions of a robot. 38 2. Input, Output and Storage Devices LISTENING 17 5A. You will hear a speaker talking about the components inside a computer. Decide if the following sentences are true (T) or false (F) and correct the false ones. T F 1. There are five major components in a PC. ……………………………………………… 2. The motherboard is comparable to the brain of the computer. ………………………… 3. CPU stands for Central Procession Unit. ………………………………………………… 4. The speaker compares the CPU with the brain of the computer. ……………………… 5. The people who design CPU chips often hide drawings or pictures under the cover of the CPU. ……………………………………………………………………… 6. The hidden pictures or drawings are usually very large. ……………………………… 7. RAM stands for Random Access Memory. It holds the data of the software which is running. …………………………………………………………………………… 8. Adding RAM to speed up a computer is an extremely difficult operation to perform. …………………………………………………………………………………… 9. The video card connects to the CPU via a video card slot. …………………………… 10. The purpose of the video card is to create images on the monitor. ………………………………………………………………………………………………… 11. There can be up to four video cards on a single computer machine. ………………………………………………………………………………………………… PET Listening – Part 4 18 5B. For each question, choose the correct answer. Now you will hear the second part of the recording about computer components. 1. The power supply usually sits A.at the bottom of the case. B.at the top of the case. C.between the CPU and the motherboard. 2. The hard disk holds information A.only when the computer is on. B.whenever the computer is connected to a power source. C.even when the computer is off. 4. When donating or recycling our old computer, it is useful to remember that it may contain a lot of data and personal information. According to the speaker, the best way to make sure that no data is available on the PC is A.to destroy the hard drive. B.to delete every file carefully and then empty the trash bin. C.to install a proper anti-virus software. 3. The optical drive is placed A.at the rear of the PC. B.at the top of the case. C.at the front of the PC. 5. CDs and DVDs are read via A.laser technology. B.MRI technology. C.ultrasound technology. 39 2. The Computer System SPEAKING 6. Read the following article on the latest 3D-printed work and report it orally to the class saying what the main advantages of such a creation would be. Dubai has opened what it has said to be the world’s first functioning 3D-printed office building, part of a drive by the Gulf’s main tourism and business hub to develop technology that cuts costs and saves time. The printers – used industrially and also on a smaller scale to make digitally designed, three-dimensional objects from plastic – have not been used much for buildings. This one used a special mixture of cement, a Dubai government statement said, and reliability tests were done in Britain and China. The one-storey prototype building, with floor space of about 250 square metres, used a 6-metre by 36-metre by 12-metre printer, the government said. ‘This is the first 3D-printed building in the world, and it’s not just a building, it has fully functional offices and staff,’ the United Arab Emirates Minister of Cabinet Affairs, Mohamed Al Gergawi, said. ‘We believe this is just the beginning. The world will change,’ he said. The arc-shaped office, built in 17 days and costing about $140,000, will be the temporary headquarters of Dubai Future Foundation – the company behind the project – in the centre of the city, near the Dubai International Financial Center. Gergawi said studies estimated the technique could cut building time by 50-70 percent and labour costs by 50-80 percent. Dubai’s strategy was to have 25 percent of the buildings in the Emirates printed by 2030, he said. (Reporting by Lara Sukhtian; written by Sami Aboudi; edited by Louise Ireland) GLOSSARY 3D-printed office building: edificio a uso ufficio stampato in 3D mixture of cement: amalgama di cemento headquarters: quartier generale READING COMPREHENSION 7. After reading the passage, choose the correct option. 1. Where has the first 3D-printed building been opened recently? A. In Singapore. B. In Paris. C. In Dubai. D. In New York. 2. The 3D-printed building was printed using A. carbon and steel alloy. B. a mixture of cement. C. the latest biotechnologies. D. heat-resistant plastic. 3. In the short run, the building will be used as A. a 5-star Hotel. B. a Financial Centre. C. a Wellness Centre. D. Company Headquarters. 4. How long did it take to finish the building? ………………………………………………… ………………………………………………… 5. How much did the building cost? ………………………………………………… ………………………………………………… 6. According to the United Arab Emirates government A. this is going to be the first and only 3D-printed building as it proved to be too expensive. B. investments will be made for more 3D-printed buildings in the future. C. this technique has proved to be too slow to be profitable. D. 3D-printed buildings are not safe enough. 40 2. Input, Output and Storage Devices 3 Computer Storage 19 Internal Memory The computer works with two types of internal memory. ROM (Read Only Memory) is a small permanent store of data which cannot be erased or changed. It contains essential details about the computer and programs which enable the CPU to start working when the computer is switched on. RAM (Random Access Memory) is the memory used by the computer temporarily to store files and programs which the user is working on at that moment. The computer transfers the data needed from the hard disk to RAM because it can work much more quickly with this form of memory. However, RAM can only keep its contents when the power is on. As soon as the computer is switched off, data is lost unless a copy has been saved on the hard disk or on another storage area. Methods of Storage There are several ways of storing data more permanently, called ‘backing storage’. • The hard disk, the main internal backing storage, consists of magnetised metal disks, one on top of the other. Each disk has thousands of concentric tracks, divided into sectors, where data is stored digitally. The disks spin rapidly while reading or writing data. The hard disk has a large capacity, and is able to store hundreds of gigabytes. You can also add an external drive by connecting a cable to the USB port. • SSDs (Solid-State Disks) use integrated circuit assemblies as memory to store data permanently. Unlike their name suggests, they have neither an actual disk nor a drive motor to spin a disk. They are more resistant to physical shock than electromechanical disks (hard, floppy, optical disks) and run silently and faster. • Optical disks store digital data in the form of small indentations (called ‘pits’) on the reflective surface of the disk. When inserted into the computer disk drive, the data is read by moving a laser beam over the pits and reading the change in position of the reflected beam. The laser can also write data onto an optical disk. • CDs (Compact Discs) can hold up to 700 MB of data. A CD-ROM contains data which can only be read; a CD-R (Recordable) is a blank disk which can be written on only once; a CD-RW (Re-Writable) is a disk on which data can be erased and rewritten repeatedly. • DVDs (Digital Versatile Discs) can hold 4.7 gigabytes of data. Variations include DVD-ROM, DVD-R and DVD-RW. Blu-ray discs can hold up to six times as much data as a standard DVD. • Memory sticks (also called ‘pen drives’) use a technology called ‘flash memory’ to store up to 64 GB of data in conveniently small devices. Data can be read or written by inserting them into the computer USB port. Memory cards, used in digital cameras and mobile phones, also work with flash memory and fit into special slots on the side of many computers. Older forms of data storage include floppy disks, zip disks and magnetic tape. GLOSSARY erased: azzerato, cancellato spin (v.): girare, ruotare cable: cavo neither… nor: né… né indentation: depressione beam: raggio repeatedly: ripetutamente hold (v.): tenere, contenere tape: nastro 41 3. Computer Storage READING COMPREHENSION 1. Read the passage and fill in the missing names in the following sentences. 1. A computer …………………………… contains vital programs which allow the CPU to start working. 2. The 700 megabytes of data on a …………………………… can be read but not changed or added to. 3. An …………………………… disk is read by a laser beam in a computer disk drive. 4. The …………………………… is the main source of backing storage inside the computer. 5. When a computer is switched off the data in its …………………………… disappears. 6. A …………………………… holds data in the form of flash memory and can be plugged into a USB socket. WRITING 2. Using your own words, summarise the key information about computer storage. 1. What is the difference between the two types of internal computer memory? 2. What are the main ways of storing computer data permanently? PET Reading – Part 5 3. For each question, choose the correct answer. PONG, ATARI AND VIDEO GAMES Modern video games are high-tech, three-dimensional, extremely realistic products, involving players of different ages in long gaming sessions, either with friends 1. ……… online. 2. ………, it may sound funny to think that one of the 3. ……… successful video games ever created was a rather plain, two-dimensional table tennis game 4. ……… Pong. It 5. ……… developed and released in the early 1970s 6. ……… Atari – a company 7. ……… products helped create and spread the electronic entertainment industry from the 1970s 8. ……… the mid-1980s. Due 9. ……… the recession of the video game industry – also known as ‘the video game crash’ – 10. ……… 1983 Atari was split and a part of it was later bought by Hasbro. 11. ………, the brand name Atari is still associated with famous arcade games 12. ……… Space Invaders, Centipede, Asteroids, Breakout and many others. 1. A. and 2. A. However 3. A. least 4. A. called 5. A. were 6. A. with 7. A. which 8. A. – 9. A. for 10. A. in 11. A. Eventually 12. A. with B. with B. Because of B. more B. was B. has been B. by B. whose B. at B. by B. – B. Furthermore B. such as C. or C. Finally C. less C. match C. was C. – C. that C. by C. to C. at C. Because of C. as D. – D. Due to D. most D. play D. did D. of D. wherever D. to D. at D. on D. Nevertheless D. such 42 2. Input, Output and Storage Devices Buying Hardware 20 LISTENING 4. Listen and complete the following paragraphs with the words in the box. There is an extra word. increases unit time per system swap file communication memory components faster brain average rate powerful required by chip balanced minute amount The performances of a personal computer depend mainly on three main hardware 1. ……………………: the CPU, RAM and hard disk. As we have seen, the CPU is the 2. …………………… of our computer and it executes the instructions provided by software applications. The performance of a CPU is affected by its architecture, for example a quad core is more 3. …………………… than a dual core. Each CPU ‘core’ in fact is a separate central processing 4. ……………………, which is the part of the CPU that actually does the work. A multi-core 5. …………………… may look like a single CPU chip, but it actually has more than one physical central processing unit on the chip. From the clock it is possible to know the calculation speed of a CPU using the simple formula T = 1/clock, where T is the 6. …………………… needed to perform a single elementary operation. For example, with a clock of 1 GHz (gigahertz) T is 1 nS (a billionth of a second) and with a double clock we have half time, so speed 7. …………………… clock frequency. Since the motherboard and RAM work with a lower clock than CPU, the amount of cache memory integrated in the CPU itself is significant. In fact, cache memory is a kind of RAM that works with the same speed as the CPU and is filled with data and instructions at the same time whenever an operation is being performed by the CPU. If the cache is empty, the CPU must wait until the next data and instructions are fetched from RAM with a consequent slowness of the whole 8. …………………… . The 9. …………………… of RAM is involved with multitasking: more RAM means more applications running at the same time without a significant decrease in performance. Of course, the speed of this 10. …………………… as determined by the clock provided by the motherboard is important as well. In addition, hard disk capacity and performance are central for a 11. …………………… system, not only when retrieving or saving data, but also for multitasking. When RAM is full the operating system can use a percentage of disk space called 12. …………………… as a ‘virtual RAM’ to increase the running of the applications at the same time. A fast hard disk may reduce the decrease in performance when swap file is used. The performance of the hard disk is specified by the time 13. …………………… to move the heads to a track or cylinder (average access time) plus the time it takes for the desired sector to move under the head (14. …………………… latency, which is a function of the physical rotational speed in revolutions per 15. ……………………). A disk with a rotational speed of 7,200 rpm is 16. …………………… than one with 5,400 rpm. The speed of a hard disk is also determined by the data transfer 17. ……………………, that is, the rate at which the data is transmitted to the system. It depends on the interface of 18. …………………… between the hard disk and the motherboard and is measured in megabit 19. …………………… second. 43 3. Computer Storage RESEARCH TASK 5. Mr Travi owns and runs a holiday company called Norfolk Hero Inc. that offers specialist holidays to exotic places around the world. Mr Travi is thinking of buying a computer system for the company and wishes you to advise him on the purchase of the machine. He has a budget of just £1,000. The company needs a computer to perform the following tasks: • design and build a website for the company; • design a colour leaflet showing trips to Timbuktu and Mongolia as possible places of interest; • produce an interactive multimedia presentation for customers; • make a video showing the exotic locations that the company goes to. Use the Internet to find the specifications of at least 3 different types of computer. You may need to use websites of leading computer manufacturers. Specifically, Mr Travi is interested in: • What type of computer he can have within the budget mentioned above. • What speed the processor will be and why this is important. What make of processor is being used. • What resolution monitor comes with the computer. • What the hard drive space is and what RAM is available on the machine. • What peripherals (hardware and software) come with the machine (digital camera, scanner etc.). • What after-sales service is available. • What guarantee the manufacturers can offer. • What printer you would recommend and why. • What storage devices are available with the machine. • What software comes with the package and how much an up-grade to office costs. • What other hardware you would recommend. 1 VIDEO 2 Using a word processor, write a short report to Mr Travi explaining which computer is best for the purpose. Include a picture and make sure that you answer the parts mentioned above. 3 Mr Travi has a real gift for building computers. He is thinking of launching the Norfolk Hero Computer Company and basing it in the town of Swaffham. Find the latest prices for the components necessary to build a computer and make a list, such as motherboard, memory, processor, cable etc. What are their current prices? What hardware can you find? 3 6. Watch the video ‘How to Identify the Components Inside Your Computer’ and write a summary of the information while answering the following questions. • What are the four basic functions of a computer? • What equipment can be used for each function? • Why is the CPU the most important piece of hardware? • Is there a very up-to-date input or output device which has not been mentioned in the text? SPEAKING – CLASS DEBATE 7. Divide the class into two groups and debate the following quotation. Remember to give reasons for your statements. Let your voice be heard! [ ‘Computer games tend to be boys’ games, warlike games with more violence. We have not spent enough time thinking through how to encourage more girls to be involved in computing before coming to college so they can see a possible career in information technology.’ (Freeman A. Hrabowski III) From www.brainyquote.com ] 44 2. Input, Output and Storage Devices 4 Bits and Codes Part 2: How Big Is a Bit? From Valves to Transistors and Integrated Circuits READING COMPREHENSION 1. The paragraphs of the passage have been jumbled. Read them and put them in the correct order from A to F. (……) The image shows different types of transistors, the size and the case depending on the power each transistor is designed for. But it is important to notice that the real size of the ‘semiconductor sandwich’ making up the transistor is a very small fraction of the whole case. Thanks to the reduced dimensions of the real component, it is possible to build a complex electronic device in a single chip of semiconductor, as a computer memory which is made up of a transistor, resistors and other components wired together in an integrated circuit. (……) Since a vacuum tube can reach a size comparable to that of a small glass, the first modern computer memory required a large amount of space to implement a small amount of memory used by the CPU to fetch data and instructions. (……) Computer production took advantage of integrated circuit technology, not only to reduce the size of the memory, but also for the other components like the CPU and peripherals. Today it is possible to integrate an impressive number of transistors in a single chip, e.g. in 2015 the highest transistor count in a commercially available CPU, Intel’s 18-core Xeon Haswell-EP (in one chip of a small number of square millimetres) is over 5.5 billion transistors and this count is going to increase even more. (……) In 1950 three American scientists solved the physical and technological problems of the transistor thanks to an idea dating back to the early 1900s to use semiconductors instead of vacuum tubes to build an amplifier. The original transistor was made of a germanium plate, called a ‘base’, one face of which was connected to an electrode, while on the other face two thinner electrodes were connected: one was called an ‘emitter’, the other a ‘collector’. In this way they had two contact points, one between the base and the emitter and the other between the base and the collector. The well-known transistor graphic symbol (shown in the image) owes its origin to its initial configuration. GLOSSARY semiconductor: semiconduttore comparable to: paragonabile a peripheral: periferica plate: lastra owes its origin: deve la sua origine A (……) ENIAC (Electronic Numerical Integrator and Calculator), the first modern computer, started operating in 1946 and had a memory of only 20 ten-digit signed accumulators. Each digit required 36 vacuum tubes, 10 of which were the dual triodes making up the flip-flops, which are electronic circuits used to store a single bit. (……) A single transistor is only a few millimetres big and by using it to substitute a vacuum tube to build a computer memory we can reduce the space of memory itself or make possible the implementation of a larger amount of memory in the same space. The idea of integrating electronic circuits into a single device was born when the German physicist and engineer Werner Jacobi developed and patented the first known integrated transistor amplifier in 1949 and the British radio engineer Geoffrey Dummer proposed to integrate a variety of standard electronic components in a monolithic semiconductor crystal in 1952. A year later Harwick Johnson filed a patent for a prototype integrated circuit (IC). These ideas could not be implemented by the industry in the early 1950s, but a breakthrough came in late 1958. Three people from three US companies solved the fundamental problems that hindered the industrial production of integrated circuits. Jack Kilby of Texas Instruments patented the principle of integration, created the first IC prototypes and commercialised them, thus starting the age of microelectronics. GLOSSARY patent (v.): brevettare MIND MAP function Process data and instructions and stores results in memory CPU (Central Processing Unit) factors of speed Clock Cores Cache Stores data, instructions and results function COMPUTER includes Memory technology Solid state (integrated circuit) Optical (CD, DVD, Blu ray) Magnetic (hard and floppy disk) function Used to put information into and to get information out of the computer Peripheral devices categories (based on their relationship with the computer) Input (keyboard, mouse…) Output (video, printer…) Input / Output (modem…) GLOSSARY 47 Screen Desktop Personal Computer External Hard Drive Printer Joystick Scanner Mainframe computer Sensor Microphone Speaker Modem Touchpad Monitor Touchscreen Mouse USB Key/ Memory stick glossary • glossary• glossary• glossary• glossary• glossary• glossary• glossary 3D-printer Audio FROM MAINFRAMES TO SMARTPHONES • Mainframes, the First Electronic Computers • Personal Computers 1 3 • Portable Computers, Notebooks and Netbooks • PDAs, Tablets and Smartphones Mainframes, the First Electronic Computers Man has always looked for ways to make calculations and do complex operations. Even before the advent of electronics, there were some mechanical machines which could perform calculations, but their exactness was poor due to the lack of accuracy of their moving parts. One of the most successful examples is the Jacquard loom which could weave complex patterns simply by ‘reading’ the holes suitably punched on cardboard cards: these were the first punch cards. During the ‘Electronic Age’, mechanical parts were replaced by relays and vacuum tubes, yet computers could perform single functions determined by the electronic components used and their connections. These calculators were not programmable, so in order to modify the function it was necessary to use a welder. The first programmable electronic computer was Mark-1 Colossus, used by the British Army during World War II to decipher the coded messages sent by the Germans and anticipate their moves. Alan Turing’s theories (see Unit 1) laid the foundations for the creation of modern computers and gave impulse to the making of Colossus. Due to the secrecy of the Colossus project for war reasons, the ENIAC computer was long believed to be the first programmable electronic computer in history. Built in 1941, the ENIAC consisted of 17,468 vacuum tubes, 7,200 diodes, 1,500 relays, 70,000 resistors and 10,000 capacitors and around five million hand-soldered connections, with the ability to program the operations to be performed. One of the original ENIAC programmers was John von Neumann, the creator of the architecture of modern computers (see Unit 1). After World War II, mainframes continued to grow and became more powerful too, thanks to the invention of the transistor. Transistors, replaced the valves, consequently reducing the size of computers. From their use in war, mainframes later spread to universities and industry. They are still used for specific applications, especially for calculations in the field of scientific research. Nonetheless, the progress of electronics, with its continuous production of smaller and less expensive components, has led to a widespread use of PCs. GLOSSARY due to: in ragione di, a causa di lack: mancanza loom: telaio 21 cardboard: cartone in order to: allo scopo di, al fine di welder: saldatore coded: codificato, in codice hand-soldered: saldato a mano spread (v.): diffondersi 49 1. Mainframes, the First Electronic Computers The Jacquard loom Mark-1 Colossus VOCABULARY 1. Scan the passage and look for the English translation of the following words. 1. Cercare …………………………………… 7. Diodo ……………………………………… 2. Eseguire …………………………………… 8. Condensatore ……………………………… 3. Telaio ……………………………………… 9. Sostituire …………………………………… 4. Scheda perforata ………………………… 10. Calcoli ……………………………………… 5. Saldatore (di parti metalliche) …………… 11. Diffuso, esteso …………………………… 6. Decifrare …………………………………… READING COMPREHENSION 2. Read the passage and decide if the following sentences are true (T) or false (F). Correct the false ones. T F 1. The first machines able to do calculations were invented after the advent of electronics. ………………………………………………………… 2. Changing the function on the earliest computers was not an easy task. ……………………………………………………………………………………………… 3. The electronic computer Colossus was used to decipher coded messages during World War I. ……………………………………………………………………… 4. The Colossus project was classified. ………………………………………………… 6. Mainframes were no longer used after World War II. ………………………………… 7. The invention of the transistor had little effect on the size of computers. ……………………………………………………………………………………………… 8. Nowadays, personal computers are cheaper and more convenient to use than mainframes. ………………………………………………………………………… PET Speaking 3. Answer the following questions orally. • Is there a personal computer in your home? • What kind of computer is it? • What do you use it for? • What are the advantages of using a PC at work/school, in your opinion? • Can you think of any downsides in using personal computers? Give examples. 50 3. From Mainframes to Smartphones 2 Personal Computers From the end of the 1960s, attempts were made to make computers extremely widespread, thus overcoming the problems of cost and size which were typical of mainframes. In 1957, the Italian Company Olivetti, stimulated by Enrico Fermi’s studies in the development of electronic computers, launched ELEA 9300, one of the earliest ancestors of modern computers. In the 1970s, Hewlett Packard introduced new computers programmed using BASIC language that could be placed on a desk. These machines were equipped with a small display, keyboard, and even a printer. However, the real impulse for the proliferation of personal computers occurred after 1975, thanks to the possibility of including several microprocessors in single integrated circuits and not by separate components assembled in large containers. The year 1981 witnessed the release of the first of a series of personal computers that became very popular: the IBM 5150, also known as the IBM PC. It was still very expensive, had low power, and needed expensive hard drives or external tape drives to manage large amounts of data. On the other hand, it was a solid and reliable machine and, above all, it was expandable. This key feature was shared only by ‘Apple II’ at that time. Due to its success, the IBM PC became the standard machine in the personal computer industry. However, since IBM supplied wiring diagrams with the PC, information technology industries located in Asia were rapidly able to clone it; after a few years the world was ‘flooded’ with huge amounts of IBM-compatible PCs, which were increasingly powerful and at lower costs. In the meantime, on 24 January 1984, Apple introduced the Macintosh, another innovation designed for large-scale proliferation. This computer was already equipped with a set of graphical interfaces and a mouse. The Macintosh was a huge business success, thanks to a user-friendly approach, especially as to its operating system, the Mac OS. Moreover, the graphical user interface employed easily understandable ‘metaphors’ such as ‘trash bin’, ‘desk’ and ‘window’ (just like the icons we are now familiar with), consequently allowing people with limited computer skills to use computers. 22 GLOSSARY attempts were made: vi furono tentativi earliest: dei primi (in senso cronologico) even: persino assembled: assemblato, montato reliable: affidabile supply (v.): fornire large-scale: su larga scala skills: capacità, abilità 51 2. Personal Computers Following the success of the Macintosh, many of these features were ‘borrowed’ by Microsoft in the creation of its Windows operating system, triggering a legal battle lasting well over a decade. All these events thus contributed to spreading the concept of ‘WIMP’ (Windows, Icons, Menus and Pointer), now a standard in the delivery of all user interfaces for personal computers, no matter what their operating system is. GLOSSARY trigger (v.): scatenare, innescare no matter what: indipendentemente da READING COMPREHENSION 1. Summarise the main events listed in the passage in chronological order by completing the grid. When? SPEAKING Company/Product Features – PAIR WORK 2. Ask and answer questions using the information above with a classmate. Example: – ‘When was ELEA 9300 released on the market?’ – ‘It was launched in 1957.’ Ask the Right Question – Use WH Question Words! Question words are really easy to use. In direct questions, there will always be one and it will be at the very beginning of the question itself. What are you waiting for? Start asking! WHO? WHEN? WHAT? WHY? WHERE? WHICH? HOW? Who was one of the most famous ENIAC programmers? When did Apple release Macintosh? What were Hewlett Packard computers equipped with? Why was it comparatively easy for some IT industries to clone IBM PCs? Where were the first icons used? Which features were ‘borrowed’ in the creation of the Microsoft operating system? How can you explain the meaning of the acronym ‘WIMP’? SPEAKING 3. Look at the pictures of ELEA 9300, IBM 5150 and Macintosh (on the previous page). How different are they from modern computers and laptops we currently use at home and at work? 52 3. From Mainframes to Smartphones 3 Portable Computers, Notebooks and Netbooks READING COMPREHENSION 1. The paragraphs of the passage have been jumbled. Read them carefully and reorder them from A to F. The growing spread of personal computers and the simultaneous reduction of the size of the electronic components made it possible, in the mid-1970s, to manufacture computers that could be transported with ease and used in situations – typically in the industrial field – where a computer alone could cover different areas at different times. In addition, it is important to highlight that in those days computers were rather expensive, so the possibility to use only one of these machines allowed significant savings. (……) After the release of the IBM 5100, lighter and lighter portable devices were made, but it was difficult to go below 10 kg using CRT screens of acceptable dimensions that not only contributed to burden the machine by weighing it down, but affected negatively on the weight of the batteries due to the energy consumption. A (……) The first portable computer released on the market was the IBM 5100 in 1975. It weighed 25 kg and looked rather different to the laptops we know today. What made these computers so heavy were mainly the mass storage (tape drives) and the CRT (Cathode Ray Tube) 5” monitor. (……) The cost of the earliest notebooks was significantly higher than desktop computers having the same performance, mainly because of the high cost of producing TFT monitors. Indeed, the cheapest ones were equipped with a monochrome screen. Improvements in screen production technology and, in general, in the electronics field, have now erased differences in cost between notebooks and desktops by allowing us to choose the type of computer according to the use we make of it, without being particularly influenced by our budget. (……) On the other hand, further progress in the electronic field later led to the production of the CPU and low-energy consumption, small-sized mass memories. Moreover, the construction of even smaller and more powerful batteries and the availability of thin and light TFT (Thin Film Transistors) instead of the old huge and heavy CRT monitors, eventually led to the production of our notebooks or laptops as we know them today. (……) Notebooks are made using two hardware elements of similar size (monitor and computer with embedded keyboard and mouse) which are connected together by one or more hinges so as to form a structure that resembles a notebook. The ability to ‘close’ the computer by superimposing the two blocks consequently means they are safer and easier to carry. (……) Finally, following concerns about the type of use, the netbook appeared – a small-sized, slightly power-reduced notebook suitable for web browsing, e-mailing and word processing. Generally speaking, if you do not need the most advanced applications computers can provide, netbooks are a practical and cost-effective solution, although they are now being replaced by tablets – lighter, more practical and more user-friendly than notebooks. growing spread: crescente diffusione with ease: facilmente lighter and lighter: sempre più leggeri burden (v.): appesantire further: ulteriore instead of: invece di, in luogo di suitable: adatto although: anche se released: lanciato (sul mercato), distribuito because of: a causa di, in ragione di hinge: cardine GLOSSARY VOCABULARY 2A. Read the passage and underline all the linkers and connectors. What purpose do they achieve, in your opinion? …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… 53 3. Portable Computers, Notebooks and Netbooks 2B. Look at the words below. Can you find any synonyms? Look them up in your dictionary! 1. Furthermore: ……………………………… 4. Thus: ……………………………………… 2. Nonetheless: ……………………………… 5. Actually: …………………………………… 3. Finally: ……………………………………… Did you find any synonyms in the passage, too? PET Listening – Part 3 23 3. For each question, write the correct answer in the gap. Write one or two words or a number or a date or a time. You will hear a conversation between Jerry and Sue talking about ‘digital natives’ and ‘digital immigrants’. Jerry and Sue are talking about a 1. ………………… assignment on ICT. ‘Digital natives’ are typically young people who have 2. ………………… with technology and use it not only for entertainment, but also to solve problems, communicate, work with other people and learn. ‘Digital immigrants’ are different, because they’re the ones who have to read 3. ………………… and have troubles in using technology sometimes. The term ‘digital natives’ was first used in 4. ………………… by Marc Prensky in an article. It seems that when you use technology a lot, you can 5. ………………… and learn differently. Digital natives are not very keen on reading; digital immigrants, instead, prefer to 6. ………………… a document so they can read it and take notes from it. CHECK YOUR KNOWLEDGE 4. Test your knowledge on (old) mobile phones by choosing the correct option. 1. The first hand-held mobile 3. How heavy was the first phone dates back to mobile phone prototype? A.the late 1960s. A.1.1 kg. B.the early 1970s. B.0.5 kg. C.the early 1980s. C.1.4 kg. D.the late 1990s. D.0.750 kg. 2. How big was the first mobile phone prototype? A.8 cm long, 2 cm deep and 7.5 cm wide. B.20 cm long, 5.5 cm deep and 6 cm wide. C.23 cm long, 13 cm deep and 4.45 cm wide. D.15 cm long, 15 cm deep and 5 cm wide. 4. How long could mobile phone conversations last? A.Less than 2 hours. B.Less than 1 hour. C.About half an hour. D.About one hour and a half. 6. The first commercially sold mobile phone was released in A.1989. B.1976. C.1983. D.1981. 7. The very first preloaded game on a mobile phone was A.Snake, in 1998. B.Tetris, in 1995. C.Space Invaders, in 1999. D.Pong, in 1989. 8. When were the first apps 5. How long did it take to commercially released? recharge? A.In 1990, by Nokia. A.It took about 4 hours. B.In 2001, by Samsung. B.It took about 10 hours. C.In 1987, by Motorola. C.It took about 6 hours. D.In 2008, by Apple. D.It took about 12 hours. Adapted from ‘A brief history of mobile phones’, wikipedia.org, www.ding.com 0-4 Maybe you are too young to know about the early mobile phones, but carry on and study ICT! SCORE 4-6 Well, either your teacher has given you a couple of hints or you’re a very keen ICT student indeed! 7-8 This can’t be possible unless you ARE an ICT teacher. Well done, anyway! 54 3. From Mainframes to Smartphones 4 PDAs, Tablets and Smartphones 24 As the evolution of personal computers proceeded, towards the mid-1980s new devices were introduced. They were hand-held, you could manage a list of contacts, a calendar of commitments, and they were equipped with other features such as clock and calculator. These brand-new devices were real computers that could fit in the palm of a hand (hand-held computers or palmtop) and were known by the acronym PDA (Personal Digital Assistant). Over time, PDAs were equipped with ever-increasing features such as document management and games, web browsing and e-mailing, as well as real operating systems. In addition, they could sync contacts and your calendar with those on personal computers via cable, infrared or Bluetooth. From the point of view of hardware evolution, there were significant improvements, especially through the use of touch screens of increasingly high quality. Parallel to the evolution of PDAs, from the 1990s there was considerable development of mobile phones with the production of devices with more and more features such as a contact list, a calendar, games and calendar management. That is, the same as the earliest hand-held devices. With this parallel evolution, it was natural to take the next step: to provide PDAs with mobile phone features and to develop the hardware and software of a mobile phone providing it with the most sophisticated features of a hand-held device. This idea led to the production of smartphones, which include the functions of a PDA and a cell phone, thus marking the end of hand-held computers. Tactile display technology was also employed on notebooks between 2000 and 2010 to make the device more compact and lighter, consisting of a single panel where the computer itself and the touch screen were ‘built’ together. In this case, a touch screen was used instead of the keyboard, although it was possible to connect an external keyboard. In some models, the external keyboard was provided directly by the manufacturer in the form of a screen-panel connected to the computer to endow it with the look of a proper notebook. These devices were equipped with the hardware of an actual PC and looked like a tablet, even if of a greater thickness than current tablets. They were called PC-tablets after personal computers, or first-generation tablets. With the evolution of smartphones, whose functions required higher and higher resolution screens and more powerful processors, it was possible to rethink the tablet from the perspective of the architecture of the smartphone, thus leading to second-generation tablets. Indeed, these devices are merely smartphones with screen sizes and functionality like those of a netbook, but smaller and lighter. Many tablets, unlike netbooks, do not require external devices to connect to the Internet when you do not have a Wi-Fi network, thus making it more convenient to use. As a consequence, as mentioned above, netbooks have now been replaced by second-generation tablets. GLOSSARY commitment: impegno brand-new device: dispositivo nuovo di zecca via: attraverso, tramite, via that is: come a dire tactile: tattile manufacturer: produttore thickness: spessore unlike: diversamente da LISTENING 25 1. Listen and match each word listed below with its correct definition. 1. 2. 3. 4. 5. 6. Device PDA Notebook Tablet Smartphone Tactile A. A mobile phone with computerised features which can access web services. B. Relating to or affecting the sense of touch. C. A flat, hand-held, rectangular-shaped computing device. D. Something made for a particular purpose or function. E. A small, light laptop computer. F. A lightweight hand-held digital device capable of managing different functions. 56 3. From Mainframes to Smartphones PET Reading – Part 5 2. For each question, choose the correct answer. ON’ THE ‘APP REVOLUTI Have you 1. ………… counted how many apps are displayed on your tablet or smartphone? I’ve just done that and there are ‘only’ 38. A friend of mine has 2. ………… 150, and as she’s a 3. ………… person, her apps are neatly stored in elegant folders, labelled by topic: ‘Work’, ‘Music’, ‘Social media’, ’Well-being’, ‘Games’, ‘Utilities’ and so on. There is virtually an app – very often, more 4. ………… one – for every situation and need. And they’re 5. ………… easy to use, so colourful and very cheap too – many of us would have trouble thinking of a world with no apps, nowadays, wouldn’t we? Yet it may seem odd to think that our commitment 6. ………… the app world started in about 2007, so it is comparatively a short period of time. Even 7. ………… attempts had been made earlier, what is sometimes referred to as ‘The App Revolution’ is still closely associated with the launch of Apple’s first smartphone, that is, the worldwide-known iPhone, in 2007, and the release of the App Store the following year. At the beginning, there 8. ………… about 500 applications to choose 9. …………, while nowadays there are over one million available. Of course, not only iOS provides apps. Most apps can be 10. ………… either in the iOS or the Android version, both operating systems being used by customers on different devices. I could linger on the topic for hours, but 11. ………… on a minute… what’s that sound? Oh dear! My calendar’s reminding me 12. ………… my dentist’s appointment! 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. A. always A. for A. clean A. that A. so A. with A. though A. are A. about A. found A. wait A. of B. never B. about B. messy B. then B. not B. at B. but B. wasn’t B. at B. find B. tell B. that C. ever C. with C. tidy C. than C. such C. by C. yet C. were C. from C. finding C. why C. to D. tried D. because D. cheerful D. this D. are D. to D. some D. was D. to D. founded D. hold D. at 57 4. PDAs, Tablets and Smartphones PET Writing – Part 1 3. This is part of an e-mail you have received from a Scottish penfriend. In my free time I like playing games on my tablet. My favourite one is ‘Clash of Clans’. Do you like playing videogames? What are your favourites? My nick is ‘McBraveOne’. What’s your nickname? How often do you play, and how long? Write a reply to your penfriend and answer his/her questions in about 100 words. ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… SPEAKING – CLASS DEBATE 4. Divide the class into two groups and debate the following statement. Remember to give reasons for your ideas. Let your voice be heard! [ Should students be allowed to use smartphones in class? Could they be used as a tool to improve education and teamwork or are they just another way to lose yourself and be distracted? ] MIND MAP Colossus Mainframes Eniac Hewlett Packard Personal computers IBM 5150 (1981) IBM PC, IBM Compatible and Apple MacIntosh A key contribution to its creation was given by Alan Turing One of the original programmers was John von Neumann, the creator of the architecture of modern computers Programmed using BASIC language and equipped with small display, keyboard and printer It was still very expensive and had low power Increasingly powerful at lower costs and user-friendly interface COMPUTERS Notebook Portable computers Netbook PDA (Personal Digital Assistant) Hand-held computers Smartphone Tablet Progress in the electronic fields led the production of smaller and lighter computers with powerful batteries and low energy consumption Small-sized and power reduced notebook suitable for web browsing, e-mailing and word processing Used to manage lists of contacts and a calendar of commitments The parallel evolution of PDA and mobile phones led to the production of one device including the functions of both devices Tactile display technology made devices more compact and lighter. Using touch screen instead of keyboard and progress in the electronic fields led the production of thin hand held portable computers. GLOSSARY 59 Notebook/ Laptop Battery PDA (Personal Digital Assistant) Capacitor Pointer Cardboard card Relay Diode Resistor Display Smartphone Icon Tablet Loom Trash bin Netbook Welder glossary • glossary• glossary• glossary• glossary• glossary• glossary• glossary App Audio 4 AUTOMATION AND ROBOTICS • Introduction to Automation • Using PCs in Automation – Microcontrollers • Open Source Computer Boards • Domotic Applications • Industrial Applications WARM-UP brainstorming • Have you ever heard the word ‘Automation’? • What does it usually refer to? • Can you think of any examples of automation you know? 1 Introduction to Automation 26 A. Humans have always tried to apply their invention of machines to the fields of trade and commerce, just think of the machines designed by Leonardo da Vinci with applications in agriculture and industry. The concept of automation can be defined as machines that are capable of replacing human functions through automatic process control. One of the first examples of ‘automated control’ is the water clock (shown left). Water clocks, as well as other instruments such as oil lamps, wine dispensers and water tanks, were equipped with float-valve regulations. These devices have been used since ancient times (Greek, Arabic and Egyptian societies). GLOSSARY field: campo, ambito replace (v.): sostituire tank: cisterna For further information on water clocks and on the history of automated control engineering, go to the YouTube video provided by the Edison Tech Center: www.youtube.com/watch?v=KlxYtk4Fiuw&noredirect=1. 61 1. Introduction to Automation On the right: a fantail, that is, one of the earliest feedback control mechanisms mentioned in recorded history. A fantail is essentially a small windmill mounted at the rear of a windmill. This device was patented in 1745 by Edmund Lee, an English blacksmith, and was later perfected on mills around Leeds and Hull towards the end of the 18th century. Nowadays we can spot fantails on all types of traditional windmills and are especially useful where changes in wind direction are frequent. B. Whenever a computer is used with a machine to replace human toil, the automation concept can be better explained and understood as the use of machines that control other machines in the performance of a production process. As a machine capable of processing large amounts of information rapidly, the computer proves to be the most efficient device to handle an automation process. GLOSSARY fantail: rotore ausiliario at the rear: nella parte posteriore spot (v.): avvistare, scorgere amount: quantità C. Actually, the statements above should not be such surprising news, since we have all seen TV commercials and videos of automated factories, quite often in the automotive field, where robots are used to assemble a product. What is perhaps not easy to understand is how an electrical signal, which contains either information or a command, can be converted into a corresponding mechanical action, and vice versa. D. A computer on its own is unable to control the reality around it. We know that software is necessary for it to perform the functions we want it to execute. To do so, however, we also need to equip our machine with ‘senses’ similar to the human body’s that requires the five senses to interact with the outside world. This can be achieved by using so-called transducer devices, which can measure a physical quantity through an element called a sensor, and turn it into an electrical value that will be proportional to the initial physical quantity. In this way, for example, it is possible to ensure that a computer can acquire the temperature of a room by means of a suitable transducer and decide, based on a previously set reference value, whether to turn on air conditioning, heating or neither of them. E. Furthermore, when dealing with automated factories, we should point out that an opposite conversion also needs to be performed. That is, an electrical command – supplied by a computer – has to be changed to a mechanical movement. When dealing with rotating movements, electric motors are used directly as Direct Current servo motors (gear motors), actuators (servo) or stepper motors. In case of rectilinear movements, linear actuators – devices able to turn the rotary motion of an electric motor into a linear displacement of a mechanical element – are used. F. Automation is now a reality not only in factories, but also in our everyday life. Good examples are on-board computers that equip not only luxury cars but also city cars and home automation, which we shall deal with later in this unit (see Domotic Applications). The current spread of automated technology was made possible not only through the evolution of computers, but also to the possibility of making transducers increasingly accurate and reliable. The transducer is, in fact, a critical component of an automation system because it is often in contact with the external environment and it is likely to be operated in highly variable weather conditions. Possible threats therefore include sudden changes in temperature and pressure (e.g. in a weather station) or the presence of corrosive agents which tend to wear out the device thereby making it useless or, even worse, altering the value of the measure. GLOSSARY surprising: sorprendente either … or: o … o unable: non in grado di so-called: cosiddetto transducer: trasduttore actuator: attuatore stepper motor: motore passo-passo factory: fabbrica through: tramite, mediante, attraverso environment: ambiente threat: minaccia useless: inutile 63 1. Introduction to Automation READING COMPREHENSION 1. Match the headings (1-7) with the paragraphs (A-F). There is an extra heading. 1. 2. 3. 4. Automation today Transducer devices Origins of automation Beyond automation …… …… …… …… 5. Automation and computers …… 6. What automated factories need …… 7. Examples of automated facilities …… READING COMPREHENSION 2. After reading the passage, choose the correct option. 1. Ever since ancient times A. humans have dreamt of computers to help them. B. humans have tried to ease their labour by using machines. C. humans have firmly refused to be helped by machines. 2. Automation implies A. interaction between humans and machines. B. separation between computers and humans. C. interaction between computers and machines. 3. ‘Automated factory’ means A. a factory ruled by automated machines. B. a factory with a high rate of automation. C. a factory where workers are useless. 4. Transducer devices A. are just like the human body as they have electrical sensors. B. need no sensors to collect and process electrical data. C. employ sensors to measure physical quantities and turn them into electrical data. 5. In automated factories A. electrical commands need to be changed into mechanical movement and vice versa. B. only the conversion from electrical impulse to mechanical movement is relevant. C. what really matters is the conversion from mechanical movement to electrical impulse. 6. Nowadays, automation A. is relevant and employed in the industrial field only. B. can be found mainly in the automotive industry. C. is widespread in a number of different applications. 7. Some of the threats transducers face A. depend on the reliability of their sensors as they are not high-tech enough. B. are due to varying outdoor conditions. C. can be overcome by using transducers only inside sheltered buildings. READING COMPREHENSION 3. Match the beginning of each sentence with the correct ending. 1. Ever since ancient times, water clocks and other tools A. in places where frequent changes in wind direction occur. 2. In simple words, we can say that a fantail is basically B. were equipped with valves to regulate the flow of liquids. 3. Transducers can measure a physical quantity through sensors 4. C. a small windmill mounted at the rear of a windmill. On-board computers like car equipment and home automation 5. Fantails are still employed nowadays and prove to be particularly useful D. show how automation has become an important part of both the work environment and everyday life. E. and turn it into an electrical value. 64 4. Automation and Robotics READING COMPREHENSION 4. Complete the passage below with the words in the box. Some words may have to be slightly changed. sensor active system type bulb torque energy device transducer often from even What Is a Transducer? A transducer is an electronic 1. ………………………… that converts energy from one form to another. Common examples include loudspeakers, microphones, thermometers, position and pressure 2. ………………………… and even antennae. Although not commonly thought of as 3. …………………………, photocells, LEDs (light-emitting diodes), and even common light 4. ………………………… are transducers. Transducers are 5. ………………………… used in the fields of automation, measurement and control 6. …………………………, where electrical signals are converted to and 7. ………………………… other physical quantities such as energy, force, 8. …………………………, light, motion and so on. In other words, transduction is the process of converting one form of 9. ……………………… to another. There are different 10. ………………………… of transducers, such as 11. ………………………… or passive sensors, actuator and 12. ……………………… bidirectional transducers. 65 1. Introduction to Automation PET Reading – Part 5 5. For each question, choose the correct answer. LEONARDO DA VINCI’S AMAZING MACHINES Leonardo da Vinci 1. ……………… born in Vinci – a small town 2. …………… northern Tuscany – in 1452 and 3. ……………… in Amboise, France, in 1512. He was a scientist, a talented painter, sculptor and poet, a brilliant inventor, an 4. ……………… in anatomy and a skilled engineer. Being a man and a scholar of the Renaissance, he sought to intersect and involve different fields of human knowledge. As a 5. ……………… of fact, his detailed drawings and sketches, his notes and Codes – which 6. ……………… inspired contemporary writers like Dan Brown, the author of The Da Vinci Code, 2003 – tell us about physics, mechanical engineering, classical 7. ……………… and medical observation. Above all, they reveal Da Vinci’s outstanding creative 8. ……………… and ability to 9. ……………… tools for a future time he would not obviously witness. In the Leonardo Da Vinci Museum in Rome, for example (www.museodavinci.it), visitors can have a 10. ……………… at amazing, crafted life-size machines based on Leonardo’s 11. ……………… and notes. Some are truly impressive, but the 12. ……………… astonishing one is maybe… the bicycle. What a genius he was! 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. A. is A. in A. die A. expert A. question A. has A. study A. strength A. imagine A. see A. paintings A. very B. was B. at B. is dead B. scientist B. matter B. had B. studied B. energetic B. build B. watch B. drawings B. more C. being C. on C. was dead C. good C. problem C. would have C. studies C. power C. think C. show C. dreams C. most D. would be D. – D. died D. intellectual D. issue D. have D. students D. energy D. paint D. look D. Renaissance D. less 66 4. Automation and Robotics 2 Using PCs in Automation – Microcontrollers As explained in the previous passage, computers – often personal computers – can be used in the field of automation as a machine for process control. Obviously, this machine has to be connected to appropriate sensors and actuators in order to monitor the process and perform appropriate actions. The connection between the computer, transducers and actuators is achieved through specific expansion cards serving the purpose of all new peripherals, input for the transducers and output for the actuators. In the case of industrial application, the computer is often used in an environment that is not suitable for a standard personal computer, mainly because of the presence of dust and of different temperatures to those of a normal office. For these reasons, industrial PCs are likely to be included as 27 part of the production processes. These machines are equipped with the same functional characteristics of standard personal computers, but are designed to withstand the possible harsh environment changes of a workshop in terms of temperature, dust, humidity, vibration and power surges. Moreover, industrial PCs are made with electronic components of higher quality and with special attention to the cooling system. Furthermore, keyboards, monitors and cases are built in such a way as not to let moisture and dust in. GLOSSARY achieved: raggiunto dust: polvere withstand (v.): sostenere, resistere a cooling system: impianto di raffreddamento Industrial PCs in a workshop The extraordinary progress of electronics, especially in the field of manufacturing of integrated circuits with an increasing number of transistors on an equal surface, has contributed to the production of increasingly powerful and complex microcontrollers. The microcontroller is nothing more than a proper computer, integrated in a single chip: it is equipped with a microprocessor, memory and input/output, it is often programmed with high-level languages such as C (see Unit 7) and requires, in most cases, very few electronic components to interface with the outside world. These components are specifically necessary when the card has to control devices powered at 220 volts or higher. In this case, for example, they need to be interposed between the card and the relay devices. Thanks to microcontrollers (also known as an MCU, a Micro Controller Unit), it has been possible to replace costly industrial personal computers with simpler and cheaper cards within the automation process control. In automation, the computer often performs a single program and does not require continuous intervention by an operator via a keyboard and monitor which might result in a waste of money as well as space. This is why in workplaces where the interaction of the machine with a human operator is non-existent or, at any rate, infrequent, an ‘embedded’ card is preferred, meaning a computer without a monitor, mouse and keyboard on which a specific program is loaded. The program itself is included in the system to be controlled. Currently, the majority of embedded systems are based on microcontrollers. The programming of embedded systems is achieved by using a personal computer on which the program is developed and subsequently loaded onto the card through a link that can be serial, USB or even in the local network. Should you need to make updates to, and carry out maintenance on, the embedded software system, just connect the card to a personal computer via a communication port (serial, USB, Ethernet) and then transfer the updates developed on the PC card. As part of industrial processes, where it is necessary to manage even greater power, the employed embedded system is the PLC (Programmable Logic Controller). The PLC also executes a program in which analogue and digital signals, which come from transducers, are processed and generated to the actuators in an industrial plant. PLCs are specifically designed for industrial applications. This is why they contain the power electronic devices required to drive devices supplied with 220 volts or higher, which is unlike previous systems. GLOSSARY increasing: crescente microcontroller: microcontrollore interposed: interposto, frapposto within: all’interno, nell’ambito di waste: spreco, dispendio loaded: caricato maintenance: manutenzione analogue: analogico previous: precedente A microcontroller Programmable Logic Controller 68 4. Automation and Robotics READING COMPREHENSION 1. Read the passage and decide if the following sentences are true (T) or false (F). 1. Expansion cards act as peripherals, connecting computers to transducers and actuators. 2. Industrial applications of computers pose no safety issues. 3. Only temperature changes can affect computer operating conditions. 4. When used in a workshop, PCs are equipped to resist potentially hazardous conditions. 5. Microcontrollers are chip-integrated computers. 6. Microcontrollers can be programmed in C language only. 7. The use of MCUs has enhanced automation process control. 8. In highly automated workplaces, embedded cards are usually preferred to computers. 9. Personal computers are definitely more expensive than embedded cards. 10. Computers are useless for the programming of embedded systems. 11. PLCs are widely employed in the industrial field. 12. PLCs are unable to handle devices that are supplied with over 220 volts. 13. We can state that PLCs are powerful and flexible devices. T F DID YOU KNOW THAT …? PLCs are widely employed in industrial applications, but not only! Actually, we can find PLCs in surprisingly different fields including alarm systems, home automation control units and even… roller coasters! PET Listening – Part 3 28 2. For each question, write the correct answer in the gap. Write one or two words or a number or a date or a time. You will hear a short description of ‘The Three Laws of Robotics’ by Isaac Asimov. The 1. ………………… law says that a robot can’t harm a human being or allow a human being to come to harm. Number 2. …………………: a robot must obey the orders given to it. But under no circumstances a robot can’t be ordered to 3. ………………… a human being. Rule number three: a robot must protect its own existence unless that violates rules #1 or 4. ………………… . A robot must proceed to self-destruction if it has to follow an order or to save a 5. ………………… . 69 2. Using PCs in Automation – Microcontrollers LISTENING 3. Listen to the extract again and decide if the following sentences are true (T) or false (F). 1. If a robot sees a human being in a dangerous situation, it can keep still and avoid acting. 2. A robot must obey anyone’s orders. 3. A robot must protect human lives. 4. A robot can never protect its own existence. 5. Self-destruction is inconceivable for a robot. 6. Robots can choose which rules to follow. T F SURFING THE INTERNET 4. Now surf the Internet for information about Isaac Asimov and answer the following questions. 1. When and where was he born? ………………………………………………………………… ……………………………………………………………………………………………………… 2. Where did he spend his childhood? …………………………………………………………… ……………………………………………………………………………………………………… 3. What is he famous for? …………………………………………………………………………… ……………………………………………………………………………………………………… 4. What was his job? ………………………………………………………………………………… ……………………………………………………………………………………………………… 5. What are his best-known works? ……………………………………………………………… ……………………………………………………………………………………………………… 6. When did he die? ………………………………………………………………………………… ……………………………………………………………………………………………………… 7. To what extent did his works influence other authors? ……………………………………… ……………………………………………………………………………………………………… VIDEO 4 5. The video Animatronics Showreel shows some animatronics which have been used in recent movies. Animatronics are also used in dark rides and amusement parks. Some of them are amazing. Have a look! SPEAKING – CLASS DEBATE 6. Divide the class into two groups and debate the following quotation. Remember to give reasons for your statements. Let your voice be heard! [ ‘I don’t believe in afterlife, so I don’t have to spend my whole life fearing hell, or fearing heaven even more. For whatever the tortures of hell, I think the boredom of heaven would be even worse.’ (Isaac Asimov) ] 3 Open Source Computer Boards The gradual spread of microcontrollers and the consequent lowering of their cost have contributed to the development of electronic programmable cards, which allow the creation of automated controls and home automation with an ease that was unthinkable only a few years ago. Basically, these cards have a microcontroller and a few other components for the management of the clock and the power supply. More specifically, they are made up of a series of connectors used to join sensors, amplifiers and relays that constitute the ultimate ‘meaning’ of our system and allow the microcontroller to communicate with the outside world. The ease of use of these cards is not only from the hardware point of view, but also the software one, as it is possible to program them in complex programming languages such as C++ and Python and no longer in Assembler which, in addition to being particularly difficult, does not allow the programmer high productivity. Notwithstanding the purely technical details, the most surprising phenomenon linked to these devices is that the projects they contributed to developing are ‘open source’ electronics. This concept applies not only to the software that was developed for applications of these cards – thus extending it – but also to the electronic schemes used to design their own interface with the various sensors and external devices. With a simple web search, it is possible to get an idea of the amount of projects and applications that have been shared in the last few years. Among the main open source cards, it is worth 29 remembering Raspberry Pi. It was designed and made in the United Kingdom with the aim of producing a very low-cost computer – all in all, it costs a few dozen euros – to be used for educational purposes in developing countries. This card, which is based on the Linux operating system, was such a success that it exceeded all expectations: from a planned initial production of 10,000 items, about a million were manufactured in a year. The reasons for this success can be credited to the small size, easy interfacing and the wide availability of programs and solutions offered by the Linux world. All reasons that allow Raspberry Pi to operate not only as a personal computer, as initially planned, but also as an embedded system. Currently one of the most successful ones is the Arduino card. This Italian project arose from an idea by Massimo Banzi, a computer expert and teacher, between 2001 and 2002 in Ivrea – the Italian city that experienced the glories of Olivetti, a famous Italian manufacturer of typewriters, computers, tablets, smartphones, printers and other business products like calculators and fax machines. Arduino allows the creation of highly technological applications starting from a basic knowledge of Electronics and Programming. It is basically a very cheap card – its cost is similar to Raspberry Pi’s –, which fits in the palm of a hand and allows the easy application of sensors, actuators and other electronic components and the possibility to program them easily. The success of this card can also be attributed to its system of cross-platform development that can interface with both Mac and PC. GLOSSARY lowering: riduzione they are made up of: sono costituiti da notwithstanding: a parte, tralasciando aim: scopo planned: pianificato, programmato knowledge: conoscenza interface: interfaccia 71 3. Open Source Computer Boards READING COMPREHENSION – WRITING 1. After reading the passage, answer the following questions. Then, use your answers to write a summary of the text you have just read. 1. 2. 3. 4. 5. 6. What do electronic programmable cards allow us to do? What are their main components and what purpose do they perform? List the advantages of electronic programmable cards. What is Raspberry Pi? What was it initially meant for? List the features of Arduino mentioned in the passage. Reading – Part 1 2. For each question, choose the correct answer. PET NO TEXTING WHILE DRIVING Hi Liz, the concert starts at 8 p.m. Lets meet at 6 at Gate 5. Tube stop is Circo Massimo. CU there! Oak Tree County Library Opening times 9 a.m. - 14 p.m. Mon-Wed-Fri 8.30 a.m. - 17 p.m. Tue-Thu A. It is forbidden to use your mobile while driving. B. If you’re driving, you’re not allowed to text. C. In case you’re driving, you can text after the sign. A. Liz is meeting her friend at the tube stop at 6 p.m. B. Liz and her friend are meeting two hours before the concert. C. Liz and her friend are meeting at Gate 5 just before the concert starts. A. You can’t borrow or return books at 7.45 on Thursday mornings. B. The library will be open at 4 p.m. on Friday afternoons. C. You can’t borrow or return books on Mondays after 9 a.m. 4 Domotic Applications The word domotics is made up of two words: Domus, a Latin word meaning ‘home’, and Robotics, which is a cross-curricular science dealing with the improvement of the quality of life inside a home or in any place where people live or work. This discipline benefits from the contribution of other branches of learning such as architecture, civil and environmental engineering and electrical engineering. Nonetheless, the real turning point was the development of electronics, telecommunications and Information Technology, as it made domotics widespread and available to people on a large scale. Currently, domotics displays many different applications ranging from a basic on/off control switch for appliances to the full control of the electrical and electronic devices of the whole building. Moreover, the constant development of portable devices such as PCs, smartphones and tablets, together with the growing spread of broadband Internet connections, have allowed house remote control through an Internet-connected PC – frequently, smartphones and tablets. It is now possible, for instance, to remote-switch home appliances on and off, set the air conditioning system and even monitor rooms via a webcam, provided a web connection is available. These applications allow us to witness the expansion of Internet not only to a virtual world, but also to our everyday environment made of real places and objects. That is, ‘The Internet of Things’. Not only do domotic applications contribute to improving our lives by making them more and more comfortable, they also offer advantages in a variety of different fields, e.g. increasing safety and security through the management of alarm systems and video surveillance or of sensors detecting gas leaks. In addition, domotics contributes substantially to energy saving – with positive environmental benefits – due to the use of applications that optimise the switching on and off of air conditioning or heating systems. Other ways to save energy can be achieved through the management of the lighting system, e.g. switching lights off when not needed or 30 automatically opening curtains or blinds whenever sunlight is detected. All these applications allow remote interaction by the user who can choose interactively what operations to perform via any Internet-connected computer. The user can choose to operate – by switching home appliances on and off, for instance – or simply monitor the working conditions of the home automation system. Due to open source electronic cards such as Raspberry Pi and Arduino, a large number of amateurs can now design and assemble a lot of these applications. Just a few years ago, this would have required advanced electronics and IT skills and knowledge. Domotics is becoming more and more accessible – not only for customers of home-automated products, but for people who are willing to make them as well. GLOSSARY cross-curricular: interdisciplinare turning point: punto di svolta remote-switch: telecomandare leak: perdita, fuga whenever: ogniqualvolta amateur: dilettante, non professionista willing: desideroso 73 4. Domotic Applications VOCABULARY 1. Look for the synonyms of the words below in the passage. You may use a monolingual dictionary if needed. 1. Branch of learning ……………… 10. Progress…………………………… 2. Significantly ……………………… 11. Domotics ………………………… 3. Situation, Setting ………………… 12. Enhancement …………………… 4. Nevertheless ……………………… 13. Antitheft alarm …………………… 5. Accomplished …………………… 14. For instance ……………………… 6. Accessible………………………… 15. Entire ……………………………… 7. Exhaustive ………………………… 16. Thanks to ………………………… 8. Benefits …………………………… 17. Treasure (to) ……………………… 9. Sensed, Perceived ……………………………………… PET Speaking 2. Look at the pictures below and describe one to a classmate using your own words. Then swap roles. 1 FCE 2 3 Speaking 3. You are about to buy your dream home, so you would like it to be equipped with the best facilities and appliances money can buy. You are currently designing home automation. Look at the floor plan below and decide how your future home has to be arranged from this point of view. Then explain your choices. (4 minutes) 74 4. Automation and Robotics 5 Industrial Applications 31 The best-known industrial application – and perhaps, the most important – lies in CNC (Computerised Numerical Control) machines. These high-tech machine tools have almost taken over traditional lathes for product manufacturing due to their enhanced versatility. As their name suggests, the movements of these machines are controlled by an integrated computer executing an operation worksheet-based program depending on what item to manufacture. The same machine can be used to make different products, depending on the program loaded onto the computer. Needless to say, manufacturing new items entails the involvement of a skilled IT technician to write and run the program needed to create the operation worksheet. That is, the sequence of actions and movements the machine has to perform to complete the part. In most cases, in order to program these machines, it is not necessary to use a programming language, as the CAD (which stands for Computer-Aided Design) software allows us to draw the part to be manufactured. The CAD drawing is then shifted to a CAM (short for Computer-Aided Manufacturing) software to be analysed and translated into CNC machine instructions. The CNC-integrated computer reads the instructions and the machine is thus able to start the production process. Furthermore, CAD and CAM software are becoming more and more sophisticated and are now able to draw and manage 3D-chart templates of complex items and products. It is worth highlighting that 3D-printers can also be considered to be CNC machines. Thanks to their now affordable price, these new-generation printers are widely used in DIY (Do-It-Yourself) as well as in the industrial field. Unlike Computerised Numerical Control lathes, 3D-printers shape items using melted plastic material, whereas CNC lathes manufacture the part by removing unwanted material from a raw block. Thanks to this specific feature, 3D-printers do not need complex CAM software. Moreover, some CAM programs are available for free, which helps people looking for 3D-printing adventures to reduce costs and the initial outlay. When dealing with industrial automation or automated factories, people normally think of robots – that is, machines substituting workers in dangerous situations or very tiresome tasks. As we have all seen on TV, some factories have completely automated assembly lines where machines assemble parts automatically – e.g. in the automotive industry – and human involvement is limited to mere control and supervision. Within these applications, we can witness extremely high integration and interaction between electronics and mechanics as far as automated controls are concerned. The new word ‘Mechatronics’ has been coined to describe this. Needless to say, within this specific field dealing with programmable devices, electronics and Information Technology need to be interconnected. The most widely used electronic devices in automation are PLCs, as they mix computer ‘intelligence’ with ‘strength’ – which is achieved thanks to specifically designed components. This combination gives us the ability to control the movements of machines requiring considerable power, strength and resistance. GLOSSARY lathe: tornio operation worksheet: ciclo di lavoro draw (v.): disegnare it is worth highlighting: vale la pena sottolineare melted: sciolto, fuso initial outlay: investimento iniziale tiresome: faticoso assembly line: catena di montaggio high: elevato requiring: che richiede Automated assembly line in the car industry READING COMPREHENSION 1. After reading the passage, choose the correct option. 1. CNC machines are widely used A. because they are more modern than traditional machine tools. B. thanks to their low cost. C. because traditional lathes need more maintenance. D. because of their versatility. 2. CNC-integrated computers A. need to be programmed for every single item to manufacture. B. need no maintenance. C. need new programming when changing the kind of item to make. D. are very easy to troubleshoot. 3. In order to program CNC machines A. CAD software is required. B. CAD and CAM software are employed. C. a specific programming language is needed for successful programming. D. CAM software is required. 4. 3D-printers A. are equated with CNC machines. B. work in the same way as CNC lathes. C. need more manufacturing time than CNC lathes. D. are more versatile than CNC machines. 5. 3D-printers A. need no CAM software to work. B. can be used for DIY only. C. can use inexpensive software. D. need an IT engineer to work. 6. The term ‘Mechatronics’ A. is a new word used in the automotive industry only. B. means that mechanics is more important than electronics in automated systems. C. refers to the integration of mechanics and electronics in automation. D. hints at the fact that electronics is somehow more relevant in automated process than other branches of engineering. 7. In automated factories, robots are often employed A. because workers are useless. B. in complex operations only. C. to reduce troubleshooting. D. in hazardous and tiring tasks. 8. The use of PLCs in automated factories A. is due to the combination of different performing abilities. B. is limited to the car industry. C. is very dangerous and should be avoided. D. is suitable for large factories only. 76 4. Automation and Robotics SPEAKING – PAIR WORK 2. Work with a partner and answer the following questions. • Have you ever seen a 3D-printer? What was it like? • Have you ever used one? • How does it work? • Can you give at least 5 examples of what you can print with one? • Have you ever seen an automated assembly line/factory? Give details. • What was it like? • In your opinion, what are the advantages of using CNC machines and robots in workplaces? • Can you think of any downsides in employing automated machines and robots in factories? PET Writing – Part 2 3. You have received the following text message from your friend Matt, who is spending a holiday in Italy with his family. Write your answer in about 100 words. ………………………………………………………………………… ………………………………………………………………………… ………………………………………………………………………… ………………………………………………………………………… ………………………………………………………………………… ………………………………………………………………………… ………………………………………………………………………… ………………………………………………………………………… ………………………………………………………………………… Yesterday I went to a big amusement pa rk nearby and tried the coolest roller coas ter EVER! I LOVE th e thrill it gives you! I en joy dark rides too – Ja net screams all the tim e there J. How do you like amusement parks? What’s your favo urite ride? CU soon 10:07 AM ✓✓ FCE Writing – Part 1 4. Write an essay of 140-190 words in an appropriate style commenting on the following quotation by the famous writer Isaac Asimov, expressing your opinion on the issue and giving reasons for your statements. ‘It is change, continuing change, inevitable change, that is the dominant factor in society today. No sensible decision can be made any longer without taking into account not only the world as it is, but the world as it will be.’ (Isaac Asimov) ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… 77 5. Industrial Applications MATCHING – FALSE FRIENDS 5. False friends can be really a nuisance… even when studying a foreign language! Some of them may be tricky, but you can use your monolingual dictionary to match the words with their definitions. There are two extra ones you do not need. 1. Attic 2. Sensitive 3. Sympathy 4. Attend (to) 5. Sensible 6. Annoy (to) 7. Confidence 8. Scholar 9. Pretend (to) A. Someone who is able to take good decisions and judgements that are based on reason rather than on emotions. B. A person who has gained extensive knowledge of a particular subject – usually of an academic subject. C. A strong and sharp smell or taste, usually unpleasant. D. Someone who shows a deep understanding of other people’s feelings and emotions. E. To be present at. F. A feeling of sorrow, e.g. for someone who has suffered a misfortune. G. To act in a way as to make people feel angry or irritated. H. To make plans and preparations for an event to happen at a future time. I. A magazine containing stories told in pictures. J. To act in a way that could make people believe that it is the case, even though it is not. K. A room on the top of a house, just below the roof. L. Belief in the reliability of a person or thing; a feeling of being certain. 10. Arrange (to) FALSE FRIENDS – WORDSEARCH 6. Find 8 very famous false friends. Help yourself with the definitions. 1. 2. 3. 4. 5. 6. 7. 8. A small restaurant where food or snacks are sold, as in a school: C _ _ _ _ _ N A large area of land in the country, with some property on it: E _ _ _ TE A disagreement over a particular topic: A _ _ _ _ _ NT A place where people can borrow books, newspapers or magazines: L _ _ _ _ _ Y Someone who shows courage: B _ _ _ _ A publication issued at regular intervals: M _ GA _ _ _ _ Someone who gives birth to or brings up a child: P _ _ _ _ _ An unpleasant and unfortunate event that happens by chance: _ CC _ _ _ _ T T T P A R E N T M D H D C O R X N T A E C A N T E E N F G B T S L S D E E Y A R L Y Q I M T E O Z A G E C U B M J U I V Y C G E Q R G T N E A R X G H T A X E N A S T J N C R R V W E N E S T A T E Y S MIND MAP COMPUTERS IN AUTOMATION connected to Sensors connected to Actuators function based on Industrial PCs based on based on PLC (Programmable Logic Computers) Microcontroller boards can manage function employed in employed in Greater power than an industrial PC or a microcontroller board Monitor the process Perform actions according to events detected by sensors Embedded system programmed by Communication interface: video and keyboard are not present INDUSTRY 4.0 WARM UP 79 (PART 1) – PAIRWORK 1. Complete the spidergram below with all the words that in your opinion relate to Industry 4.0, then compare it with your classmates. Industry 4.0 MATCHING 2. Complete the drawing with the correct label. A. Mass production Assembly line Electricity B. Computer and automation C. Mechanisation Water power Steam power D. Cybernetic systems When talking about Industry 4.0, we may also refer to it as the Fourth Industrial Revolution. It relies on digital technology to build models, as well as to manage communication and production processes. CLIL History 3. Find information about the First, Second Third and Fourth Industrial Revolutions. You can use the WH-questions (When? Where? What?) to help you organise the information. CLIL ICT 4. In pairs, summarise your report in a multimedia presentation. You can add images, maps and photographs to clarify your ideas. Each pair will then show and report it orally in class. Assembly line Model T machine Spinning Jenny Industrial robot Numerical control machine Audio 5 OPERATING SYSTEMS AND SOFTWARE • What Is an Operating System? • A Bit of History • Operating Systems for Personal Computers • Mobile Operating Systems 1 What Is an Operating System? 32 After covering the hardware features of a computer, in this unit we are going to focus on the basic software generally supplied by the manufacturer: the operating system. An operating system (OS) is a program that permits the user to control the basic functions of a computer, thus allowing the user to communicate with the hardware using input/output peripherals, as well as managing files and data by specific application programs. User Interface The operating system allows the user to ‘speak’ with the hardware and one of its most important features is that it must be easy to use. In other words, it has to be ‘user-friendly’. The first operating systems like MS-DOS were text-based and the user communicated with the hardware by typing commands into the keyboard. This way of communication is very difficult, especially for a non-skilled user, due to the number of commands and syntax to remember. Thanks to Steve Jobs, modern operating systems now provide users with a more intuitive Graphic User Interface (GUI). Through a GUI, the user can give the system a command by pointing a mouse to an object displayed on the screen such as an icon, a window, a button or text. GLOSSARY supplied: fornito syntax: sintassi Main Components and Multitasking The user interface is the component of an operating system between the user and the rest of the system. With this component it is possible to access the other parts of an OS designed to perform a specific function. For example, the file system is the component of an OS which is specifically developed to manage the files stored in every mass storage device of a computer. By means of this component, users can issue commands and, depending on the (available) interface, copy, move, rename or delete files or folders in a disk. Other components manage the peripherals and the memory, and each of these is controlled by the kernel that provides the most basic level of control over all of the computer hardware devices. The kernel manages memory access for programs in the RAM and determines which programs gain access to hardware resources etc. A specific memory managing technique that can provide a modern operating system with an important feature is called multitasking, which permits the running of multiple independent programs on the same computer, thus giving the impression that it is performing the tasks at the same time. Since most computers can do at most one or two things at a time, this is generally done via time-sharing, which means that each program uses a share of the computer time to execute. BIOS The operating system of a personal computer is stored on the main hard disk. This memory support allows users to choose which operating system to install (Windows, Linux…) and an easier way to update it, by simply uploading installation files from the producer’s website. The operating system is loaded on the memory at the power on of the computer, but this means that another program is needed to tell the hard disk to start and load the OS. This program is called BIOS, which stands for Basic Input Output System, and is embedded on a memory chip of the computer. At the power on the hardware is designed to read the memory chip containing the BIOS first and perform the program stored in it. This initial operation is called ‘bootstrap’ and the term derives from the Anglo-Saxon idiom ‘To pull oneself up by one’s bootstraps’, that is, put on your boots and stand up alone without any help. The expression was later introduced into computer language to describe the initialising process of a PC thanks to BIOS, so operating systems could ‘stand up by themselves’. GLOSSARY by means of: tramite, mediante, attraverso folder: cartella running: esecuzione, attività update (v.): aggiornare bootstrap: tirante initialising: inizializzazione 82 5. Operating Systems and Software READING COMPREHENSION 1A. After reading the passage, answer the following questions. 1. 2. 3. 4. What is an operating system? What does it allow the user to do? How does it manage files and data? What is the main and most important feature of an operating system? 5. Why were the first operating systems complicated to use? 6. What does the acronym GUI stand for? 7. What does a GUI allow the user to do? 8. What does ‘user interface’ mean? 9. Are there any examples of user interface in the passage? 10. Why is the kernel important? 11. What does multitasking permit? 12. What does ‘bootstrap’ mean and how does it work? 13. Where does this term stem from? 1B. Now use your answers to summarise orally the passage about operating systems. DID YOU KNOW THAT …? The word Bios comes from ancient Greek meaning ‘life’. It is still widely used in modern languages as a prefix. Can you think of any English and Italian words containing it? LISTENING 33 2A. Listen to the recording and fill in the blanks. The recording is taken from a video, which is the reason why the tone is rather informal. WHAT IS THE BIOS AND WHAT DOES IT DO? I want to 1. ……………………… to you about the BIOS. The BIOS 2. ……………………… for basic input/3. ……………………… system. The BIOS is the first 4. ……………………… program that 5. ……………………… when you start up your system. The first time you press the 6. ……………………… button on your computer, the 7. ……………………… goes into 8. ……………………… . Your next 9. ……………………… might be: ‘What does the BIOS 10. ………………………?’ The BIOS is 11. ……………………… a program that 12. …………………… your operating system, such as 13. …………………… 7 or even the Linux-based operating 14. …………………… what to do. It also 15. ……………………… all the parameters for the hardware that’s 16. ……………………… inside of your computer. The next question you 17. ……………………… have is: ‘Where is the BIOS 18. ………………………?’ The BIOS is 19. ……………………… on what is called a ROM or Read 20. ……………………… Memory chip on the motherboard. The 21. ……………………… sits inside of your computer. 83 1. What Is an Operating System? 2B. After checking the passage, complete the following sentences. 1. 2. 3. 4. BIOS stands for ………………………………………………………………………………… . The BIOS goes into action …………………………………………………………………… . ROM stands for ………………………………………………………………………………… . The BIOS is stored ……………………………………………………………………………… . Idioms What is an idiom? According to the Collins Cobuild Dictionary, ‘an idiom is a group of words which, when they are used together in a particular combination, have a different meaning from the one they would have if you took of all the individual words in the group.’ MATCHING Get one’s ducks in a row, that is ‘to prepare things well and be organised’ – IDIOMS 3. Idioms are widely used in the English language. You will find some of them listed below. Can you match each one to its meaning? Have a try! There is an extra description. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Apple of my eye Rain cats and dogs A piece of cake Out of the blue Back to square one A grin like a Cheshire cat Kill two birds with one stone Beat around the bush Every cloud has a silver lining Flog a dead horse SPEAKING A. To insist on something that has already been talked about or that nobody can change. B. To avoid talking directly about an unpleasant topic. C. To choose between two disagreeable situations. D. To accomplish two goals with one single action. E. A loved or very cherished person. F. A large and wide smile. G. To start something from the very beginning… again. H. There are positive aspects even in the worst situations. I. An easy task to do. J. To rain heavily. K. Suddenly and unexpectedly. – CLASS DEBATE 4. Divide the class into two groups and debate the following quotation. Remember to give reasons for your statements. You may use practical examples taken from your everyday experience. Let your voice be heard! [ ‘I fear the day that technology will surpass our human interaction. The world will have a generation of idiots.’ (Albert Einstein) ] 2 A Bit of History 34 Since operating systems are closely related to the computer hardware, we can talk about the evolution of operating systems starting from the architecture of the computers on which they run, distinguishing a number of distinct phases or generations. The first generation dates back to the 1940s. The Earliest Electronic Digital Computers The 1940s: First Generation The earliest electronic digital computers were designed to perform a single specific function depending on the electronic circuits wired into them. The only way to change the function of these computers was to change the electronic circuit structure. For this reason, the earliest electronic digital computers had no operating system. Machines at that time were so basic that programs were often entered one bit at a time on rows of mechanical switches (plug boards). Programming languages were unknown at that time, including Assembly languages. It can be said that operating systems as we now know them were unheard of. The Early 1950s: Second Generation By the early 1950s the routine had somehow improved with the introduction of punched cards. The General Motors Research Laboratories implemented the first operating systems in the early 1950s for their IBM 701. The systems that characterised the 1950s were mainframe computers, i.e. a single computer with a number of terminals depending on the number of users and which generally ran one job at a time. A user program had to be added to a process queue together with those of other users and wait for its turn to run. GLOSSARY since: poiché wired: collegato, cablato i.e.: dal latino id est, che significa vale a dire, ossia queue: coda 85 2. A Bit of History The 1960s: Third Generation The systems of the 1960s were able to take better advantage of the computer resources by running several jobs at once. In accordance with this innovation, operating systems designers developed the concept of multiprogramming in which several jobs are simultaneously present in the main memory; a processor can be switched from job to job as needed, to keep several tasks (jobs) advancing while having the peripheral devices in use. For example, on the system with no multiprogramming, when the current job paused to wait for other I/O operations to complete, the CPU simply sat idle until the I/O finished. The solution for this problem was to partition the memory into several pieces, with a different job for each one. While one job was waiting for I/O to complete, another one could use the CPU. Further on: Fourth Generation With the development of LSI (Large Scale Integration) integrated circuits (chips), the operating system became part of the age of the personal computer and the workstation. Microprocessor technology evolved so much that it was now possible to build desktop computers as powerful as the mainframes of the 1970s. The most important early operating system was Microsoft MS-DOS, or PC-DOS when supplied by IBM. It derived from the CP/M-80, an operating system based on the famous Z80 microprocessor. The personal computer compatible with this OS had a small-integrated boot program (BIOS) in a memory chip (ROM) which loaded the OS itself directly from the disk. The decreasing cost of display equipment and processors made it practical to provide graphical user interfaces for many operating systems, such as the generic X Window System that is provided with many Unix systems, or other graphical systems such as Microsoft Windows, the Commodore’s Amiga OS, Atari’s TOS, Apple’s Mac OS, or even IBM’s OS/2. The original Graphical User Interface (GUI) was developed on the Xerox Alto computer system at Xerox Palo Alto Research Center in the early 1970s and sold by many vendors throughout the 1980s and 1990s. Since the late 1990s there have been three operating systems in widespread use on personal computers: Microsoft Windows, Apple Inc.’s OS X, and the open source Linux. GLOSSARY switched: cambiato, spostato idle: inattivo as powerful as: potente come decreasing: in diminuzione, ridotto, calato throughout: nel corso di, durante tutto, per tutto l’arco di 86 5. Operating Systems and Software READING COMPREHENSION 1. Summarise the main events listed in the passage in chronological order by completing the grid. When? Company/OS Features READING COMPREHENSION 2. Read the passage again and decide if the following sentences are true (T) or false (F). T 1. The first operating systems date back to the 1950s. 2. First-generation computer machines had no proper OS. 3. Punched cards were a significant improvement in the late 1960s. 4. Prior to multiprogramming, memory partition was a failure. 5. Multiprogramming means that the processor can run several jobs at the same time. 6. The OS eventually became part of computers due to LSI circuits. 7. MS-DOS and PC-DOS are completely different operating systems. 8. BIOS is a boot program that loads the OS automatically. 9. The GUI was first developed by Apple Inc. 10. Since the 1990s only two main OSs have been used in computers. 11. Linux is an open source OS. PET F Speaking 3. Ask and answer the following questions with a classmate, then switch roles. • What kind of operating system is your mobile/smartphone provided with? • Do you own any other devices that have a different operating system? Which OS? • In your experience, what are the differences and similarities between different operating systems? • Can you give any practical examples? • Have you ever used an open source operating system? • Can you explain in your own words the main differences between open source operating systems and operating systems like Android or iOS? • Look at the picture below. Do you agree or disagree with its meaning? Who could make such a statement? Give reasons. If your child can use a smartphone, they can easily operate any of the above! 87 2. A Bit of History FCE Speaking 4. Role-play a complete dialogue using the information provided. You may take notes prior to the speaking exercise and search the Net for information in English if needed. Then swap roles. (4 minutes) A. You work as a shop assistant in a large shop in town. The shop sells high-tech devices such as mobile phones, smartphones, tablets, notebooks and computers. Some items may also be second-hand, but in perfect condition and with a 6-month warranty. Your goal is to find the product that best fits the customer and sell it to him/her. B. You are one of the four customers below. Have a look at who you are and what you are looking for in the shop. Name: Kate Pedrosa Age: 29 Occupation: Primary school teacher She has been working with children for 8 years and she loves it, which is why at home she sometimes surfs the Net to find new activities to do at school with her pupils. Her sister Ramona lives in Mexico – her native country – and they often chat and see each other on Skype. She is looking for a new computer because her old one has become too slow. She would like to find a bargain, as she is saving money for her holidays in Mexico. Name: Jonah Jamesboy Age: 56 Occupation: Director of the local newspaper and journalist He normally uses instant messaging, social networks, net surfing, apps to write and collect articles, videos and pictures for his job. He makes a lot of phone calls, often abroad. He is looking for a handheld device so he is not burdened by too many things to carry when travelling on business. He has no budget limitations, but does not like wasting money. Name: Paddy O’ Brien Name: Milly Blooms Age: 16 Age: 35 Occupation: Student Occupation: Attorney Paddy lives a highly connected life. Like most teenagers, he can’t live without music, instant messaging, and social networks. He loves watching hip-hop videos on YouTube and sometimes uploads self-made music videos of his rehearsals with his band ‘Warriors and Scarecrows’. He loves playing online racing games as well but at present he’s studying for his A-level exams so he doesn’t have much time to spare. Yesterday his mobile phone fell in the bathtub, so he urgently needs a new one but he can’t afford a very expensive one. Her job can be rather stressful, so in her spare time she sometimes relaxes on social networks, instant messaging, working out (jogging and swimming), and long walks in the woods. She loves listening to music while jogging. She normally uses her mobile at work, but she has an office phone, too. She is looking for a new smartphone. She’d love to find a waterproof one. She’s well-off but she definitely doesn’t want to pay too high a price. 88 5. Operating Systems and Software 3 Operating Systems for Personal Computers 35 There are many operating systems that you can install on a personal computer, but there are three main ones: Linux, Mac OS and Windows. Linux Linux is a family of operating systems whose architecture is very similar to Unix’s, a well-known network operating system implementing the TCP/IP network Internet protocol. ‘Linux’ is named after Linus Torvalds, a student at Helsinki University who started to write this free operating system and who sent an invitation e-mail to a large community of programmers asking them to help in its development. The final X in the name is a reference to the close links between Linux and Unix. Linux is a free software and an open source development. It is not restricted by property code, i.e. no company or individual owns this operating system and anyone is free to make copies and redistribute it. Moreover, Linux is an open source program and people can make changes to its source code to suit their own needs and these source code modifications are licensed under a General Public License (GPL). Not only is Linux a single operating system with a free licence, it is a family OS and it is even possible to choose the most suitable distribution (Ubuntu, Debian, Red Hat…) according to the user’s needs. Mac OS GLOSSARY well-known: noto, conosciuto free: gratuito, libero need: bisogno, esigenza, necessità ensuing: relativo, derivante discourage (v.): scoraggiare, dissuadere On 24 January 1984, Apple Computer Inc. introduced the Macintosh personal computer, known as the Macintosh 128K model. The operating system of the early Macintosh was called ‘System Software’ or ‘System’, and its ensuing series was later renamed Mac OS after System 7. The Macintosh platform is credited with having popularised the concept of the graphical user interface. Nowadays, the Mac OS X version is the preinstalled operating system on Apple personal computers. Even if the modern Mac’s hardware is not different from another type of PC and the Mac OS X can run smoothly on typical PCs, the Apple licence agreement and the way they limit their software discourage people from installing it on a computer other than Apple. The most important element of this operating system is the powerful and easy-to-use graphical interface that allows the user to manage and configure every resource and peripheral without being a computer expert. The latest versions of Mac OS are closely related to Linux, in fact they are Unix-compatible and they can run Unix applications. Such operating systems with this feature are called ‘Posix systems’. 89 3. Operating Systems for Personal Computers Windows The first independent version of Microsoft Windows – version 1.0, released on 20 November 1985 – was originally going to be called ‘Interface Manager’, but Rowland Hanson, the head of marketing at Microsoft, convinced the company that the name ‘Windows’ would be more appealing to customers. Windows 1.0 was not a complete operating system, but rather an ‘operating environment’ requiring the text-based MS-DOS operating system and extending it with a graphical user interface. Microsoft had worked with Apple Computer to develop applications for Apple’s new Macintosh computer, which featured a graphical user interface. As part of the related business negotiations, Microsoft had licensed certain aspects of the Macintosh user interface from Apple; in a later lawsuit, a district court summarised these aspects as ‘screen displays’. In the development of Windows 1.0, Microsoft intentionally limited its borrowing of certain GUI elements from the Macintosh user interface, to comply with its licence. The first version of Windows running on a workstation as a fully operating system and not as an operating environment was Windows 95 in 1995. Many versions have been developed since 1995 not only for workstations, but also for servers with network configuration and administration features. Windows 10 is currently installed on personal computers. It is an improved version of Windows 8 which allows the user to choose between a standard graphic interface and the same interface of a Windows Mobile smartphone or tablet. Choosing this second interface is convenient for non-expert users and whenever a computer is equipped with a touch screen. GLOSSARY appealing: accattivante, invitante, di interesse lawsuit: azione legale comply with (v.): osservare, rispettare currently: attualmente 90 5. Operating Systems and Software READING COMPREHENSION 1. Quickly scan the passage again and take notes on the pros and cons of the OSs mentioned, including their development. Operating system Pros Cons Linux Mac OS Windows 5 VIDEO 2. Watch the video The Story of Linux and fill in the blanks. This video is about the story of 1. ……………………, on the occasion of its 20th anniversary. Name Linus Torvalds Occupation Computer science 2. ……………………… In those days, he lived in 3. ……………………… . On 8th August 4. ……………………… Linus wrote a post that has become one of the most famous entries in computer history, telling about his 5. ……………………… . Later on, this 6. ……………………… source project started spreading around the • the freedom to 12. ……………………… the software to suit your needs; • the freedom to share the software with your 13. ……………………… and neighbours; • the 14. ……………………… to share the changes you make. 7. ……………………, with a large number Linux has had an outstanding success since of developers contributing to its improvement. 1991 and a lot of companies, such as Red Linus called his OS kernel Linux and chose Hat and 15. ………………………, have a penguin as a 8. ……………………… . adopted it. Torvalds decided to use a penguin The speaker’s opinion is that Linux has because of a little incident at the revolutionised computing and is still doing it: 9. ……………………… . every three months, another version of Linux He also made a crucial decision, choosing is 16. ……………………… . the 10. ……………………… created by The final part of the video shows how Linux is Richard Stallman. This licence allows very now being used and spread in different fields important freedoms, such as: of our lives, i.e. the Internet, phones, • the freedom to use the software for 17. ………………………, computers as well as any 11. ………………………; in many devices we use every day. 91 3. Operating Systems for Personal Computers PET Reading – Part 1 3. For each question, choose the correct answer. Cranberry Hotel Help us protect the Earth. Do not waste water! Please use your towel more than once. If you hang your towel on the towel rail, we won’t change it. You will get a new towel if you leave the old one in the shower or on the floor. Thank you! Glory Days Music Lounge & Shop Showing this card will entitle you to get a complimentary Glory Days ML souvenir with at least a $25 purchase in the Café or Vintage Shop. Cedar Town Science Museum Opening Times – Daily 9 a.m. - 5 p.m. Admission charges Adults 12 Concessions 6 School children, students, trainees 5 Family ticket (up to 2 adults + up to 3 children aged 0-16) 18 A.If you drop your towel on the floor, you will be fined. B.You are not allowed to hang towels on the rail. C.You can decide when your towels need to be changed. A.If you spend $25 in the shop, you will receive a present. B.If you show the card and spend $25 in the café, you can have a gift. C.You can get a gift if you buy products or merchandise for $20 and show the card. A.Only large families can buy a family ticket for the Science Museum. B.Only students can buy a discounted ticket. C.You can visit the museum on weekdays, too. Hi mum, we’re planning our summer holidays but it’s becoming very complicated indeed! Dan needs a rest after these last few terrible months and doesn’t want to drive too far. The twins have already told the whole school that we’re heading to Orlando. Janie’s been dreaming about Venice for ages but the fares are terribly high these days. And me – well, I was going to ask you if you’d be willing to host all of us at the farm, would you? J Love, Megan A.Megan is going to decide for the whole group. B.Planning summer holidays is easy in Megan’s family. C.The twins can’t wait to go on holiday to the farm. 92 5. Operating Systems and Software 4 Mobile Operating Systems READING COMPREHENSION 1. The paragraphs of the passage have been jumbled. Read them carefully and reorder them from A to F. (……) Today the market for mobile devices and particularly smartphones is the battlefield for three operating systems: Google Android, Apple iOS and Microsoft’s Windows Phone (WP). While the platform of the ‘big G’ equips devices from different manufacturers, iOS and WP are reference operating systems for the iPhone and Microsoft Lumia smartphones respectively. Regarding Android and iOS, the battle later extended to tablets, while in this area Windows offers tailor-made solutions. All three competitors own an Application Store Market to distribute Applications for both desktop and mobile devices and for each operating system several apps for many different purposes are now available. (……) In June 1998, Symbian Limited (formerly Symbian Foundation) was founded and in 2001 the first version of Symbian OS 6.x was released. It was one of the most famous and popular systems equipping the first smartphones, especially those made by Nokia. (……) Until 2006 the market for operating systems for mobile devices was in an ‘embryonic’ state, as the ‘phone’ was the core around which the operating system features were designed. Other designers started planning electronic diaries (such as the calendar, address book and notes) and enhancing telephone functions. (……) After 2006, Google and Apple entered the mobile device market. Mere ‘phone’ functions became marginal and the new heart of the operating system was ‘the application’. As a consequence, the development of mobile applications became an important employment opportunity for programmers. Apple’s goal was to bring the Application Store Market – whose Linux version for desktop computers had existed for years – to mobile devices. A (……) A mobile operating system or ‘mobile OS’ is a program that controls a mobile device in the same way a PC operating system controls a desktop computer or a laptop, dealing with issues related to the nature of the mobile device. These include limited memory and CPU resources, the absence of external power, the need for wireless technology to access the Internet (Wi-Fi, GPRS, HSDPA...), input methods (touch screen, mini keyboards) and reduced display dimensions. (……) Symbian was equipped with platforms for application development such as Java, Python and C++, which are also standard tools for desktop computers. Many Java and C++ programmers started to write applications not only for personal computers, but also for smartphones: these are the so-called Apps. On 11 February 2011, Nokia announced that it would use Microsoft’s Windows Phone OS as its primary smartphone platform, while Symbian would be gradually wound down. GLOSSARY battlefield: arena, campo di battaglia tailor-made solutions: soluzioni (proposte) su misura enhance (v.): potenziare issue: questione wound down: dismesso, abbandonato A 93 4. Mobile Operating Systems 2. The following words are taken from the passage you have just reordered. How would you translate them into Italian? You may use a dictionary, if needed. 1. Manufacturers …………………………… 5. Goal ………………………………………… 2. Released …………………………………… 6. Wireless …………………………………… 3. Embryonic ………………………………… 7. Equipped …………………………………… 4. Marginal …………………………………… 8. Core ………………………………………… PET Writing – Part 1 3. Below is a letter you have received from your friend Claire, who is particularly keen on learning and attends a high school in Dover. Hi Sue, we had a substitute teacher in Psychology class today. We spoke about different aspects of education and an interesting lesson came out of this topic. Before the bell rang, she wrote a quotation on the board and asked us to reflect on it. Here it is: ‘Don’t limit a child to your own learning, for he was born in another time.’ (Rabindranath Tagore) I’m sure you’ll be impressed too and I’m dying to know what you think of it! Write back soon Claire Write your answer to Claire in about 100 words. ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… FCE Writing – Part 1 4. Your town sponsors a journalist award for high school students and you intend to take part with an article on education. Some quotations are provided and may be used in the article to support your ideas. Write your article in 140-190 words in an appropriate style. • ‘Education is the most powerful weapon which you can use to change the world.’ (Nelson Mandela) • ‘The function of education is to teach one to think intensively and to think critically. Intelligence plus character – that is the goal of true education.’ (Martin Luther King) • ‘It is a miracle that curiosity survives formal education.’ (Albert Einstein) • ‘Observation more than books and experience, more than persons, are the prime educators.’ (Amos Bronson Alcott) MIND MAP SOFTWARE Operating system Operating systems for PCs Application software Word processor Linux Microsoft Word Windows Open Office Writer Mac OS Google Docs Mobile operating systems Spreadsheet IOS Microsoft Excel Android Open Office Calc Google Sheets Presentation software Microsoft Power Point Open Office Impress Google Slides Graphics software CAD programs Paint / Draw programs and Photo Manipulation programs Development tools Classic development environment Integrated development environment INDUSTRY 4.0 95 (PART 2) We are currently experiencing the fourth step of technological evolution which is characterised by a series of standards (paradigms) known as Industry 4.0. Such paradigms are a multifactorial complex of applications allowing process optimisation due to their interconnection with manufacturing and marketing processes. The core of Industry 4.0 is digital technology. In order to comply with this industrial system, plants ought to satisfy as many paradigms as possible (see picture below). CYBERSECURITY INTERNET OF THINGS AUGMENTED REALITY BIG DATA CLOUD COMPUTING INDUSTRY 4.0 AUTONOMOUS ROBOTS SYSTEM INTEGRATION SIMULATION CLIL ADDITIV E MANUFA CTURIN G IT Systems and Networks 1. Look at the image above. Using a bilingual or a monolingual dictionary, try to define in your own words the different features of Industry 4.0. You can also make examples from the topics you have studied in IT Systems and Networks or during your school-work experience. • Autonomous robots • Simulation • System integration • Internet of Things • Cybersecurity • Cloud Computing • Additive Manufacturing • Augmented Reality • Big Data Audio 6 APPLICATION SOFTWARE • Word Processors and Spreadsheets • Presentation Software • Graphics Software • Development Tools WARM-UP brainstorming • Have you ever used a word processor? To do what? • Do you know what a spreadsheet is? • What are the main advantages of writing a text using a word processor over a hand-written document? 1 Word Processors and Spreadsheets VOCABULARY 1. Match the pictures (1-8) with the words (A-H) describing them. A. Italics ……… E. Bold B. Fonts ……… F. Spreadsheet ……… C. Underlined ……… G. Chart ……… D. Grid ……… H. Crossed ……… Game over 1 2 ……… 3 Phil - Dentist’s Game over 4 He lives in Rome at 5 p.m. Game over 5 6 CU there at 8! 7 Somewhere, over the rainbow… 8 97 1. Word Processors and Spreadsheets Word Processors 36 A word processing program, or word processor, is the most commonly used computer software application. The main advantage of a word processor over a typewritten or hand-written document is that the user can keep going back to the document and amend it. Previously this would have meant retyping or rewriting the whole text or ruining its appearance by crossing out or using correcting fluid. This is the Editing function of a word processor, which allows the user to keep returning to a document to change, add or delete text before printing it and thus saving paper. Another important feature of a word processor is the Formatting function, which is used to alter the appearance of the text’s size, font, colour and style (bold, italic, underlined…). The paragraph style can also be set to determine line spacing and text alignment and many other functionalities to create a document that looks consistent with its purpose and audience. Because of these features, word processing programs have largely replaced typewriters and pen and paper in both the domestic and business environment. Spreadsheets GLOSSARY amend (v.): correggere, apportare modifiche delete (v.): cancellare, eliminare audience: astanti, pubblico 37 A spreadsheet is an information-processing tool that organises data into rows and columns. Each data is stored in a cell and identified by the intersection of a row and a column. A cell can contain numeric values, but also a formula to calculate new values involving data stored in other cells of the document. Modern spreadsheets are extremely versatile and may be used to create graphical displays or simple databases, but their predominant use is the processing of statistical and financial data. Their ability to embed mathematical and statistical functions makes them the ideal electronic replacement for traditional accounts books, inventory sheets and budget summaries. An important use of spreadsheets is Modelling, which is setting up a sheet to insert various data into predefined cells so that users can produce a variety of outputs to test different scenarios. For example, a model of how fast a checkout staff-member in a supermarket can serve each customer can help to work out the average queue time per customer. By increasing the number of staff packing or working till queue time should show different outcomes and this can help management to decide how many staff they ideally need if they want to keep queue times to an acceptable level. This is known as running ‘What if’ scenarios. In this example the predefined data is changed to answer the questions: ‘What if I employed more staff?’ and ‘What if I employed less staff?’ GLOSSARY row: fila versatile: versatile replacement: sostituzione average: medio 98 6. Application Software PET Reading – Part 3 2. For each question, choose the correct answer. 1. Word processing programs 4. The versatility of spreadsheets A. are not suitable for tablets and A. has led them to substitute word smartphones. processing programs. B. can amend only some kinds of B. is limited to the financial and statistical texts. fields. C. allow editing and formatting. C. is being slowed down by inventory sheets, account books and budget D. allow video-making. summaries. 2. Formatting a text may include D. is leading them to substitute old account A. deleting text before printing. books and budget summaries. B. changing font type. 5. Modelling is an important feature of C. writing an essay. spreadsheets because D. avoiding wasting paper. A. it allows the user to be connected to the Internet. 3. Spreadsheets B. it allows the creation of simulation A. normally contain data. models. B. are very useful for essay writing. C. it helps supermarket managers to C. cannot include text. dismiss employees. D. keep data stored and organised in long rows. D. it reduces customer queues. What If …? • What if I employed more staff? • What if my car hadn’t broken down on my sister’s wedding day? • What if I started a diet? • What if your parents decided to move to Australia and start a new life there? The questions above deal with different situations, but they have something in common: they are all hypotheses. In other words, we can consider them as conditional sentences. Note that ‘What if’ + Past Simple refers to something that might happen in the future (even though we cannot be sure about it) just like the 2nd Conditional. However, ‘What if’ + Past Perfect refers to a situation that is bound not to be fulfilled, just like the idea of unreal past expressed with the 3rd Conditional. WRITING 3. Now it’s your turn. What if you wrote five questions using ‘What if’ + Past Simple and five using ‘What if’ + Past Perfect? The best question might win a prize! 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… LISTENING 4. Surf the Internet and listen to What if, a song by the English band Coldplay. Fill in the missing words in the numbered gaps. WHAT IF What if there was no 1. ……………………… Nothing wrong, nothing right What if there was no 2. ……………………… And no reason, or rhyme What if you should 3. ………………………That you don’t want me there by your side That 4. ………………………don’t want me there in your 5. ……………………… What if I got it wrong And 6. ……………………… poem 7. ……………………… song Could put right what I got wrong Or 8. ……………………… you feel I belong What if you should decide That you don’t want me there by your 9. ……………………… That you don’t want me there in your life Ooh ooh-ooh, that’s right Let’s take a 10. ……………………… try to put it aside Ooh ooh-ooh, that’s right 11. ……………………… can you know it, if you don’t even 12. ……………………… . Ooh ooh-ooh, that’s right Every 13. ……………………… that you take Could be your biggest mistake It could 14. ……………………… or it could break That’s the risk that you take What 15. ……………………… you should decide That you don’t want me there in your life 16. ……………………… you don’t want me there by your side Ooh ooh-ooh, that’s right 17. ……………………… take a breath try to put it aside Ooh ooh-ooh, that’s right How can you 18. ……………………… it when you don’t even try Ooh ooh-ooh, that’s right Oh – Ooh ooh-ooh, that’s right 2 Presentation Software Presentation software is used by anyone who wishes to display information intended for an audience and is particularly useful in a school or business environment. This kind of application can make presenting information more dynamic and interesting when used in conjunction with a projector and audio equipment. Text and images can be animated and timed to appear at a given time by clicking the mouse. Multimedia files such as sound effects and video files can be added to the presentation to make it more appealing to the audience. Teachers, university lecturers, students and professionals involved in corporate training all use presentation software to present their projects, research or thesis to their audience. A very common example is 38 high-school students during their final exams and displaying their project essays via PowerPoint. The ability to combine a range of different data into a logical and simple layout has attracted many types of users who can constantly modify their presentation to improve it and enhance what they have done after each show, sales pitch or lesson. A presentation document is divided into slides; each slide is a single screenshot corresponding to a particular focus. The transition between slides can be activated by clicking the mouse, a key stroke or as in a show with pre-set timing. There are also special wireless devices with function switches to navigate throughout the slides; usually these devices embed a laser pointer to help the speaker during the presentation. Some Functions Text is very important in a presentation for the audience because using too many multimedia elements in a document can take up a lot of memory and resources with a high risk of slowing down the presentation. This is the main reason why editing and formatting are important functions for both word processors and presentation tools. As we have previously seen, editing allows the user to keep revising a document and adding or deleting text until they are happy with the content, whereas formatting is used to alter the appearance of the text’s size, font, colour and style. A presentation program allows the user to import any text they wish, but it can also import different objects. These objects may include graphs created with a spreadsheet program, images from a digital camera or a graphics software, and also audio and video files. By using these options, users can easily create exciting multimedia presentations. One set of functions to be found in a presentation package relates to the way text and objects appear on the screen. For example, instead of displaying a flat, still text, it can be made to move from one side to another and reach its position on the screen or emerge gradually from a point, or even spin in from the middle of the screen. These types of effects liven up the slide show and capture the audience’s attention. Similar functions can be used to define slide transition, a function to define the way each slide merges into another, for example as one slide finishes it ‘dissolves’ into the next. GLOSSARY in conjunction with: insieme a, in modo congiunto thesis: dissertazione di laurea, tesi sales pitch: discorso promozionale, legato alle vendite slow down (v.): rallentare whereas: mentre flat: piatto, bidimensionale liven up (v.): ravvivare, animare, rendere più vivace 101 2. Presentation Software READING COMPREHENSION 1. Read the passage again and decide if the following sentences are true (T) or false (F). 1. 2. 3. 4. 5. 6. Presentation software applications are mainly useful in business environments. Users can freely add animation and videos to suit their needs. Slide shows should contain no videos. Changing font size implies you cannot add any animation. Multimedia elements should not be used in presentations. Large amounts of multimedia elements may have negative effects on the slide show. 7. Users can activate slide transition by pre-set timing only. 8. Varying text effects can prevent the audience from being unfocused. 9. Only professionals can use presentation software applications effectively. T F READING COMPREHENSION 2. Scan the passage and write statements about all the options you can add to a slide show using a presentation software application. PET Listening – Part 4 39 3. For each question, choose the correct answer. You will hear a woman talking about cool PowerPoint tricks to look like a ‘tech genius’. 1. According to the speaker, how many ways are there to look like a ‘tech genius’? A. Four. B. Three. C. Two. 2. Using a live poll means that A. the audience can vote using their own devices. B. the audience will challenge the results. C. the results won’t be shown in real time. 3. One of the advantages of using a live text box is that A. you can easily cheat by altering the scores in real time. B. you can use it to write down your audience’s answers in real time. C. you can use it together with a live poll. FCE 4. The last tip the speaker gives for a successful presentation is to A. catch up with you slides. B. have fun with your slides. C. spice up your slides. 5. Which adjectives does the speaker use to describe how animation and effects should be? A. Astonishing and amazing. B. Stunning and unexpected. C. Lively but soothing. Speaking 4. Your best friend has been given an assignment to make a PPT about his school. It has to be about 5 slides long and include text and some images. Short videos are allowed and animation is valued. However, there is a problem – your friend has never used a presentation program and really needs help! Give him/her instructions to complete the assignment, using your own words. The deadline is tomorrow! (5 minutes) 102 6. Application Software 3 Graphics Software 40 Graphics software is designed to allow the user to store, manipulate and print graphical images. There are different varieties of graphics software, each designed for a different purpose, but the main ones are Computer-Aided Design programs, Photo Manipulation programs and Paint/Draw programs. Computer-Aided Design (CAD) Programs CAD programs require a high level of knowledge and are used by engineers, designers and architects to draw and design objects. These programs use vector-based images, representing them as geometric objects such as lines, curves and polygons based on mathematical equations. By using this format, they can be changed or scaled-down without losing quality and can take up less memory and resources of an equivalent bitmap image. The efficiency in the manipulation of this vector-based format allows the user to view objects from different perspectives and model them at different stages of design. For example, a car may be shown both as a sketch and as the final product. Photo Manipulation Programs Thanks to the spread of low-cost digital cameras and the increased quality of integrated cameras in smartphones and tablets, more and more people, professionals and non-professionals, are using digital format cameras to take their photographs and their computers to store them. These programs work with bitmap format images, made up of collections of tiny squares (pixels), allowing users to manipulate their size and shape. Photo manipulation software has grown in popularity and there is a variety of applications now available, some aimed at the professional, some at the home user. These programs are equipped with a wide range of special effects to change functions like colour, light or contrast. One of the most well-known effects is the red eye removal filter, which allows the user to get rid of red eyes when a flash is used when taking a photograph of a person. GLOSSARY vector-based image: rappresentazione grafica vettoriale, immagine vettoriale scaled-down: in scala ridotta professional: professionista square: riquadro get rid of (v.): sbarazzarsi, eliminare, rimuovere 103 3. Graphics Software Paint/Draw Programs The purpose of Paint/Draw programs is to facilitate the user in the creation of images. With these programs, a document is a sort of ‘blank canvas’ to be painted by the user by means of a set of graphical tools that are a computerised equivalent of pencils, brushes, paint sprays, colour palette and so on. The image built up by the user can be edited and modified with the addition of new elements and new effects. These programs are used by both general users and professional artists in ‘Computer Art’ or ‘Digital Art’. They can also be used in adverts and TV programs. An evolution of these programs is Computer Animation Software, used by animators to create animated cartoons or to add effects in movies and video games. GLOSSARY blank canvas: telo bianco, foglio bianco brush: pennello advert: messaggio promozionale (pl. adverts = ads) READING COMPREHENSION 1. After reading the passage, answer the following questions. 1. What is graphic software designed for? 2. Can you find any examples of graphic software in the passage? 3. What does ‘CAD’ stand for? 4. What are the main advantages of this software? 5. Is CAD a software anyone can use? Why?/Why not? 6. What are the reasons for the growing popularity of photo manipulation programs? 7. Is their use for professionals only? 8. List some of the functions this kind of software allows the user to perform on pictures. 9. What is the purpose of Paint/Draw programs and what do they allow the user to do? 10. What are some of the professional applications for this kind of software? WRITING – SPEAKING 2. Now use your answers to summarise the passage you have read. Practise your summary orally as well. PET Speaking 3. Answer the following questions orally. • Have you ever used Paint? Do you normally use it? How good are you at it? • What can you use Photoshop for? How does it differ from Paint? • Do you think that only models and famous people use photo manipulation programs? Give reasons. • If you saw an edited picture of your best friend on their Facebook wall, what would you think? • Some people could be tempted to ‘remove’ their friends or girlfriend/boyfriend from pictures after breaking up or after an argument. What’s your opinion on this issue? 104 6. Application Software 4 Development Tools READING COMPREHENSION 1. Complete the paragraphs below with the words in the box. Some words may have to be changed slightly. understand translate consist submit word execute software call support source language editor A development tool or 1. ……………………… development tool is a computer program that software developers use to create, maintain, or otherwise 2. …………………… other programs and applications. Classic Development Environment Before the spread of development tools a programmer used a text 3. ……………………… program to write the instructions in a programming language. These instructions are written at a high-level language, which 4. ……………………… of a small set of 5. ……………………… that are typically instructions in English. In general, this language is 6. ……………………… programming language (Basic, Pascal, C, Java). The program written in a high-level programming language is called 7. ……………………… code and can’t be executed directly by a machine that 8. ……………………… only binary code like a computer. After writing a program in a high-level 9. ……………………… with a text editor, a software developer must 10. ……………………… the source code to a compiler. A compiler is a program that 11. ……………………… source code into a binary code, called machine language or 12. ……………………… code because it can be interpreted and executed by a computer. LISTENING 41 2. Listen and match the beginning of each sentence with the correct ending. 1. Software development tools are used 2. Compilers serve the purpose 3. 4. 5. ‘Executable code’ means that Instructions are written using Compilers are submitted A. to translate source code into a binary code. B. a small set of words resulting in English-written commands. C. source codes by programmers. D. by developers to create, support and enhance programs and applications. E. only computers can interpret and run it. Integrated Development Environment The growing complexity of today’s programs makes it difficult to approach software development in the ‘traditional’ way. The development of a graphic user interface or a well-formatted print report can be almost impossible to achieve with a bare text editor. Nowadays, most programmers use software development tools to increase their productivity. These tools integrate not only an editor and compiler, but also other important widgets such as graphic WYSIWYG screen and report designer. WYSIWYG means What You See Is What You Get: a programmer can draw a graphic interface without writing any line of code and letting the development tool translate the drawing into source and machine code. There are many other important features shared by most of the main development tools, but one of the most important ones is a smart text editor, which can check the syntax code written in real time, therefore avoiding many errors before compiling the source code. These smart editors also help developers to avoid errors with an auto-complete function: when starting to write an instruction a smart tag appears near the first typed characters suggesting the possible instruction starting with these characters. Moreover, a source code written by a text editor of an integrated development tool is 42 more readable as it uses different colours to distinguish instructions from other elements of a program (variables, comments etc.). It also offers an auto-indent function to organise the distribution of the instruction in the source code efficiently. Choosing which development tool is suitable for us depends on the computer and the programming language we want to use. For example, for Macintosh with Mac OS, there is a free tool called ‘Xcode’ to develop C, C++ and Objective-C programs for both computers and mobile devices. A Java developer can use a free multiplatform tool (available for PC, Mac and Linux computers) called ‘Eclipse’ that can also be used to develop applications for Android mobile devices. A good solution for developers in the Windows environment is ‘Visual Studio’, which allows the use of many programming languages (Basic, C etc.), and can be employed to develop websites or applications for computers and mobile devices. GLOSSARY bare: semplice, essenziale, spoglio widget: congegno grafico, dispositivo source: sorgente, origine, fonte auto-indent function: funzione (funzionalità) di rientro automatico employed: utilizzato, impiegato 106 6. Application Software READING COMPREHENSION 3. Scan the passage and write down the words the descriptions below refer to. 1. They prevent mistakes in the syntax code. ……………………………………………………………………………………………………… 2. They provide developers with a wide range of functions, including computer and mobile device application development. ……………………………………………………………………………………………………… 3. They are designed to incorporate widgets, editors and compilers. ……………………………………………………………………………………………………… 4. Their proficiency is enhanced by software development tools. ……………………………………………………………………………………………………… 5. They show smart suggestion tags after the first characters are typed. ……………………………………………………………………………………………………… 6. It organises and distributes the instructions in the source code in the most efficient way. ……………………………………………………………………………………………………… SPEAKING – CLASS DEBATE 4. Divide the class into two groups, A and B. Each group has to defend its own point of view, giving reasons for each statement. Let your voice be heard! [ PET Group A definitely agrees with this quote: ‘Photoshop is an art, and you can do a lot with it. Change the atmosphere through different lighting and make the pictures more interesting.’ (Crystal Renn) Group B firmly endorses this quote: ‘I don’t love Photoshop: I like imperfection. It doesn’t mean ugly. I love a girl with a gap between her teeth, versus perfect white veneers. Perfection is just… boring. Perfect is what’s natural or real; that is beauty.’ (Marc Jacobs) ] Writing – Part 2 5. Your English teacher has asked you to write a short story. The title is ‘A blurry photograph’. Write your answer in about 100 words. ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… FCE Writing – Part 2 6. You recently attended a course on Computer-Aided Design at school. The course lasted four weeks; lessons were twice a week from 2 p.m. to 4 p.m. After the final test, you received the following e-mail. We hope you enjoyed the course and would be grateful if you could provide us with feedback. We would appreciate receiving a report on the course you have just attended expressing your point of view on the follo wing points: • Organisation • Length • Contents • Suggestions Thank you in advance, James H. Denver Easy CAD Team Write your report on the course in 140-190 words in an appropriate style. ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… MIND MAP APPLICATION SOFTWARE Word processor Spreadsheet Presentation software main functions made up of made up of Cells Slides other functions Text editing Text formatting Layout Revision Headers and footers identified by which may contain which may contain Rows and columns Text, images, movies, sounds and animation effects Numbers, text, formulae INDUSTRY 4.0 (PART 3) REVISION 1. Complete the following summary using the words in the box. Computer-Aided may skilled Word carry tools software know In this Unit, you have studied different types of 1. ………………………, such as Spreadsheets, 2. ……………………… Processors, Presentation, Graphic and 3. ……………………… Design software and development 4. ……………………… . You can choose which ones to use according to the task you have to 5. ……………………… out. To do this, you need to 6. ……………………… the characteristics of each software to take a good You also need to be 7. ……………………… in its use, otherwise the output decision on which one to use. 8. ……………………… not be satisfactory. ICT / Citizenship 2. Task: creating a digital safety brochure. Your class is taking part in a European project about the importance of keeping attention high on safety, especially regarding the Covid-19 pandemic. You will work in groups of 4 students; each group has to create a leaflet and show it to the class. To comply with safety rules, only digital leaflets can be shown. CLIL The brochure must include: • facts and figures; • safety measures and PPE (Personal protective equipment, e.g. face masks); • tips to promote safety. You may add music, animations, comics and images to make the digital leaflet more lively and entertaining. 109 Audio ALGORITHMS AND PROGRAMMING LANGUAGES 7 • Algorithms • Writing Algorithms Using a Flow Chart • Programming Languages WARM-UP brainstorming • Have you heard of the term ‘algorithm’? • What do you associate it with? • Where can algorithms be found in everyday life? 1 Algorithms 43 As previously seen, the computer is a complex machine capable of performing an impressive amount of operations per second. Modern computers, including the ones in our homes, have a memory that can hold huge amounts of data – files, movies, sounds or simple text documents. These features allow computers to carry out functions, even very complicated ones. However, to make this possible, we must specify the operations through a set of instructions that allow the machine to process the data appropriately and consequently deliver the required results. This set of instructions is called a program. The aim of a calculator is to solve a problem, which could be mathematical, scientific or economical. However, it is necessary to formulate the problem in such a way that it can be ‘understood’ by the computer, and then studied by an analyst who identifies the set of initial data and instructions that have to be performed to obtain the set of the final data, that is, the results. Even without knowing in detail how a computer is made, we can use it. To start with, we should think of it as a black box that receives data and commands and provides results as shown in the following picture. GLOSSARY huge: ampio, vasto data: dati (dal latino datum = dato) appropriately: in modo adeguato 111 1. Algorithms PROGRAM INITIAL DATA CALCULATOR RESULTS The first step to solving a problem by means of the computer is therefore to identify a method of formulation of the problem and of rules, so that an automatic machine could use it. This means we need to identify a set of elementary operations which, if properly carried out on the initial data, enables the user to obtain results. The sequence of elementary operations describing a method for the automatic resolution of a problem is called an ALGORITHM and a program is nothing but an algorithm expressed in a suitable form for a computer. The term algorithm reportedly derives from the Persian astronomer and mathematician Muhammad ibn Musa al-Khwarizmi (Baghdad, around 780 – around 850), who is considered the inventor of the process that allows the calculation of the multiplication of two numbers by arranging the numbers under each other, a method we still use nowadays. GLOSSARY therefore: quindi, dunque, di conseguenza reportedly: a quanto si dice arrange (v.): disporre, sistemare, ordinare READING COMPREHENSION 1. Read the passage and match the beginning of each sentence with the correct ending. Computer memory 2. 3. In order to carry out functions 1. Solving problems of varying types Initial data and instructions 5. 6. A computer program is 4. Algorithms can be described as A. an algorithm expressed so as to be understood by a computer machine. B. are detected and studied by analysts to get the required results. C. can hold different kinds of data. D. operations in a computer have to be detailed in sets of instructions. E. is the ultimate purpose of computer machines. F. sequences of simple operations used to solve a problem. 112 7. Algorithms and Programming Languages PET Reading – Part 5 2. For each question, choose the correct answer. A MATHS GENIUS FROM THE PAST Muhammad ibn Musa al-Khwarizmi was a Persian mathematician, 1. ……… and geographer during the Abbasid Caliphate and a scholar in the House of Wisdom 2. ……… Baghdad. We know very 3. ……… about his life: his family had Persian origins and he 4. ……… in Greater Khorasan which we now know as Xorazm Region in Uzbekistan. He 5. ……… his masterpiece The Compendious Book on Calculation by Completion and Balancing in 830. In this book, he 6. ……… the first systematic solution of linear and quadratic equations in Arabic, later leading to algebra. Al-Khwarizmi’s contributions to mathematics, 7. ………, astronomy and even cartography established the basis of innovation in Algebra and Trigonometry. 8. ……… being considered one of the fathers of algebra, he also reviewed Ptolemy’s geography and also wrote on astronomy and astrology. He also studied and wrote on mechanical 9. ……… like the astrolabe and sundial. 10. ……… the 12th century, Latin translations of his work had a great influence 11. ……… the advancement of mathematics in Europe. 12. ………, they helped to introduce the decimal positional number system to the 13. ……… world. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. A. astronomy A. of A. few A. was born A. writes A. introduces A. geographer A. Besides A. gears A. On A. about A. Eventually A. West B. astrologer B. with B. much B. born B. written B. introduced B. geography B. However B. devices B. At B. in B. Moreover B. South-West C. astronomer C. at C. little C. is born C. write C. introduce C. geographic C. Finally C. things C. In C. after C. Nonetheless C. Northern D. astrolabe D. in D. lots of D. were born D. wrote D. ’s introduced D. jeopardy D. At first D. objects D. When D. on D. Due to D. Western 2 Writing Algorithms Using a Flow Chart How can we set the rules to solve problems with no ambiguities that would threaten the reliability of the results? As we know, an algorithm consists of a series of elementary instructions to be executed in a given specific order. To ensure that the procedure is successfully completed, each instruction has to be described correctly and without ambiguity. It is possible to formulate an algorithm in human language and this becomes necessary when the problem has to be solved by a human – when a student is struggling with a Maths problem, for instance. However, we ought to be very careful about the words we choose to employ because human language may lead to misinterpretation. To avoid the typical ambiguities human language, it is possible to generate the solving procedure in graphic form without losing its effectiveness. It can also prove Reading instruction: it requires the initial data and it is necessary to specify the requested data. advantageous when this process has to be translated into a program. This form of representation of an algorithm is called a flow chart and consists of graphical symbols where instructions are written. In a flow chart, oriented lines (ending with an arrow at one end) interconnect the graphic symbols. These lines determine the correct order of the sequence of the operations to be performed. The sequence normally develops from top to bottom. Let’s have a closer look at the symbols we can use. GLOSSARY threaten (v.): minacciare, minare we ought to be: è bene essere advantageous: vantaggioso flow chart: diagramma di flusso arrow: freccia Alternative instruction: the processing continues according to the condition indicated within the symbol (true or false). True Writing instruction: it prints the results and it is necessary to indicate the data to be printed. 44 False STOP instruction: it detects the end of the procedure. STOP General instruction: it is necessary to insert the elementary instruction to be performed. START instruction: it detects the start of the procedure. START 114 7. Algorithms and Programming Languages READING COMPREHENSION 1. After reading the passage, answer the following questions. 1. What do algorithms consist of? ………………………………………………………………… ……………………………………………………………………………………………………… 2. What is the condition for a successful procedure to run? …………………………………… ……………………………………………………………………………………………………… 3. What is a flow chart?……………………………………………………………………………… ……………………………………………………………………………………………………… 4. Why is language so important for writing algorithms? ……………………………………… ……………………………………………………………………………………………………… 5. How can we avoid the dangers of ambiguity posed by human language? ……………… ……………………………………………………………………………………………………… 6. What is this symbol and what does it specify? ……………………………………………………………………………………………………… 7. What other symbols can we have in a flow chart? …………………………………………… ……………………………………………………………………………………………………… READING COMPREHENSION – SPEAKING 2. Use your notes to give an oral summary of the passage you have read. ALGORITHMS AND FLOW CHARTS – GUIDED EXERCISE 3. Write an algorithm to read two whole numbers and print the greater one. 1. Read the two numbers A and B 2. If A is greater than B then write A 3. Otherwise write B Flow chart: START READ A ………………… FaLsE tRUE ………………… ………………… WRITE B ………………… 115 2. Writing Algorithms Using a Flow Chart The math teacher was a good dancer – he had algorithm. algorithm noun Word used by programmers when they do not want to explain what they did. LISTENING 45 Listen to the recording and do the following exercises. 4A. Fill in the blanks. The speaker defines an algorithm as a set of ……………… to accomplish a ……………… . 4B. Tick the odd one out. The speaker gives some everyday examples where algorithms are useful for… A. going from home to school; B. making a grilled cheese sandwich; C. scheduling your nutritional habits; D. finding items in a grocery store. 4C. Match the companies with the algorithm used. Some important companies use different kinds of algorithms to suit their needs. For instance: 1. 2. 3. 4. Google Hangouts A. Route-finding algorithm Pixar B. Optimisation and scheduling algorithm Nasa C. Compression algorithm Google Maps D. Rendering algorithm 3 Programming Languages 46 Once you find the algorithm to solve a problem, how do you give instructions to the computer? What language should be used? As we know, a computer is a digital camera. That it, it understands only the binary code and the instructions must consist solely of sequences of zeros and ones. In this case, the language used is called machine language and it is the only language understandable by a computer. For human beings used to communicating in their own language, it is quite difficult to have to express endless sequences of numbers in order to interact with a computer. This was necessary when using the earliest computers and was possible because of their complexity which was far less than that of current machines and such as to allow programmers to handle data and instructions in a binary format. Luckily, it is no longer like this: the instructions are made in a high-level language, which consists of a small set of words that are typically instructions in English. In general, this language is called programming language. There are many programming languages, for example Basic, Pascal, C, Java. Each of these can be used to solve the same problem, depending only on the knowledge of the user: the programmer. Every language sets out very precise rules on how to formulate instructions and define the data. The programmer’s knowledge of vocabulary (together with the set of instructions or keywords) and the syntax and vocabulary of the language chosen is therefore essential. How can you move from an algorithm formulated in a programming language to the corresponding machine language that allows the computer to operate? The programmer writes the program in the chosen programming language. The result of this first phase is one or more text files containing the instructions. In this form, the program is called source code. The source code is subjected to a special program called a ‘compiler,’ which checks the correctness in terms of lexicon and syntax. Once this first check is done, the compiler translates the source code into machine language thus producing the executable code. It is interesting to note that the compiler is intimately linked to the programming language, having to analyse and translate it, and to the type of computer (microprocessor) that must run the machine code produced. Therefore, it is necessary to have a compiler dedicated to each family of microprocessors and to each language. GLOSSARY solely: esclusivamente handle (v.): trattare, maneggiare, disporre di programming language: linguaggio di programmazione keyword: parola chiave lexicon: lessico 117 3. Programming Languages READING COMPREHENSION After reading the passages about algorithms and programming languages, do the exercises below. 1A. Answer the following questions. 1. What is an algorithm? 6. Who decides which programming 2. What is a program? language to use? 3. What is the source code? 7. List the programming languages 4. What does ‘machine language’ mean? mentioned in the passage. 5. What is an executable code? 1B. Complete the sentence. The compiler is a program which translates the ……………… code into ……………… code. PET Writing – Part 3 2. Frank and Joe are 16 years old and close friends. They have known each other since primary school but now they are attending two different high schools. They live in the same neighbourhood, though. It’s Friday afternoon and they are at Joe’s trying to organise the best Halloween party ever thrown in the area. Write the dialogue between the two friends (about 100 words) and remember to include the following points: • where and when the party will take place; • food and beverages; • entertainment (music, games etc.); FCE • how many people to invite; • fancy Halloween costumes. Writing – Part 2 3. You are the editor of your town’s local newspaper and are therefore in charge of the ‘Letters to the Editor’ page. You have just received and read a long handwritten letter from Mr Jones, the town librarian. Here’s an extract from his note. Where is all this compulsive online gaming leading us? Everyone seems to be playing games with smartphones and tablets all the time – on buses, trains, cars, while queuing at the post office or at the supermarket counter, even while driving! People can no longer just communicate with each other. Whole families sit around the same table, each staring at their own hi-tech device. You see people chasing tiny little monsters along the streets. There must have been one in the town library, too, as yesterday a group of five people rushed in frantically holding their smartphones to catch it. I could not believe my own eyes! Write a reply to Mr Jones, expressing your opinion about his concerns and accounting for your statements. Write your answer in 140-190 words in an appropriate style. ………………………………………………………………………………………………………………… ………………………………………………………………………………………………………………… ………………………………………………………………………………………………………………… ………………………………………………………………………………………………………………… ………………………………………………………………………………………………………………… ………………………………………………………………………………………………………………… ………………………………………………………………………………………………………………… ………………………………………………………………………………………………………………… MIND MAP ALGORITHM is suitable form for a computer A sequence of elementary operations describing a method to solve a problem Program Compiler interpreter a graphic method to describe a program described with written using converted in machine language (binary code) by A flow chart A programming language made of made of Graphic symbols and oriented lines Instructions each symbol contains Elementary instruction each symbol corresponds to a single instruction which contain Keywords 119 MOVIES AND MORE Algorithm – Official Trailer Snowden – Official Trailer WARM UP – PAIRWORK 1. Discuss the following questions with a classmate. 1. What does ‘to hack’ mean? Look it up in a monolingual dictionary and explain it in your words. 2. Which words do people and the news usually associate to this verb? You can make examples to support your ideas. 3. How would you explain the meaning of ‘hacker’ to a friend? 4. What do you know about Edward Snowden? Have you ever read about him in the news? 5. What is MIT? WATCHING / SPEAKING 2. Now watch the official trailers of Algorithm and Snowden and discuss the following issues. 1. Do the movies seem to portray hackers in a positive or negative way and why? 2. Do you think the two movies have any features in common? How about possible differences (plot, time, place…)? 3. In the first trailer, the protagonist says: ‘In the late 1950s MIT hackers thought all information should be free’. In the second one, one of the characters says: ‘Most Americans don’t want freedom. They want security.’ What is your personal opinion on these statements? Can you think of any examples in the news nowadays about these issues? Try to make as many examples as you can. Audio NETWORKING AND TELECOMMUNICATIONS • Sharing Resources • LAN and WAN 1 Sharing Resources A computer network describes any situation in which two or more computers are linked together via some form of communication medium for the purpose of exchanging data or sharing resources. For example, in an office, a high-quality and performance printer to be shared between computers could be a better solution than providing each workstation with a small cheap printer. Nowadays, almost every company has its own computers and some peripherals linked to a network environment. Non-networked use of computers, the so-called stand-alone environment, is still the norm in domestic situations, although one could argue that the Internet connection present in almost all houses is rapidly converting domestic users into network users. 8 • Telecommunications • Wi-Fi and Cellular Data Technologies 47 GLOSSARY linked: connesso, collegato one could argue that…: si potrebbe obiettare che… consistent: coerente cost-effective: vantaggioso (in senso economico) repeater: ripetitore, amplificatore del segnale infected: infetto, infettato saving: risparmio, somma risparmiata 121 1. Sharing Resources Advantages Data can be shared and accessed by a wide range of users. This is particularly important when users need to access one or more databases. Without a network, a copy of the database is needed on each workstation. If users make changes on their copy of the data, the integrity of the initial database is compromised and a complex program is consequently required to rebuild a consistent version of the database which includes the changes made by each user. Hardware resources such as printers and scanners can be shared as well – a less expensive solution than providing each user with their own set of peripheral devices. In addition, software resources can be shared instead of buying a single copy for each workstation. Of course, it is necessary to purchase a network licence of the software to share whose cost depends on the number of authorised users, but this is a more cost-effective solution than buying a single licence for each user. Furthermore, backup procedures, which make security copies of important data, are easier as they are centrally located. Users are not responsible for backing up their data: a network manager is responsible for running regular backup tasks. …and Some Disadvantages Setting up a computer network is more expensive than configuring a group of ‘stand-alone’ computers. Usually, for performance reasons, to store the shared data a server – that is, a more powerful computer than the workstation – is employed, in addition to each user’s computers. In addition to the server, installation and configuration of communication devices such as switches, repeaters, cables and connectors are required. Moreover, network management, especially for big organisations, requires a high degree of specialist knowledge and this means that a network manager will have to be employed for this purpose. Finally, networks are particularly vulnerable to viruses. If a machine is infected the virus may spread to the other computers more easily than in a stand-alone environment. Network or Stand-Alone? In analysing the advantages we can see that set-up and maintenance costs are significant in comparison to a stand-alone environment, but in most cases they exceed the savings that result from efficient resource management in a network environment. 122 8. Networking and Telecommunications 2 LAN and WAN 48 One way to classify computer networks is to focus on their geographical extension. According to this criterion, we have Local Area Network (LAN) and Wide Area Network (WAN). Local Area Network A Local Area Network is a short-distance network and it is enclosed within a small geographical area such as a room, an apartment or a building. A closely connected group of buildings, for example a university campus, can be connected with a LAN. The main mode of communication in this kind of network is physical cabling, usually with copper wires. When covering long distances and whenever high performance is required, a combination of optical fibre and copper cable is employed. Due to the constant lowering of costs of wireless devices, Wi-Fi connections are often included within LAN, thus allowing cost-savings and avoiding buying and installing a considerable amount of cabling. In some cases, wireless technology is an obvious choice, for example in buildings of particular historical and artistic interest where it is not possible to install cables without damaging them. Another defining feature of a LAN is that all the network resources are managed by the local network area organisation that uses them. Sometimes we use the term Intranet instead of LAN, yet they are not the same. Put simply, an Intranet is a private computer network that employs Internet protocols and network connectivity to allow users to access a pool of information or operations. In other words, Intranet is a particular kind of LAN. GLOSSARY criterion: criterio (dal greco – pl. criteria) copper: rame defining: caratteristico, distintivo connectivity: connettività kind: tipo, genere literally: letteralmente owned: posseduto, di proprietà di branch: ramo, filiale Wide Area Network A Wide Area Network is a network spread over a large geographical area and it is made by connecting a group of LANs via a wide range of communication media. To build a wireless and satellite WAN, technologies are used in addition to physical cabling thus allowing the network to reach a literally worldwide extension. Unlike a LAN environment, working in a WAN environment will involve using network resources owned and managed by a wide range of local network areas. WAN can be subdivided into public and private. A private WAN is a secure network, with strict access control and authorisation, owned and managed by a single organisation. For example, a company with several branches around the world can benefit from using a private WAN. On the other hand, a public WAN is owned and managed by more than one network area and the best example of this kind of network is Internet. 123 2. LAN and WAN READING COMPREHENSION 1. Read the passage and decide if the following sentences are true (T) or false (F). 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. In an office, it is more profitable to provide a printer for each computer. Stand-alone environments are quite common as home solutions. A computer network is useful in work environments only. Computer networks allow data sharing. Sharing resources implies less time to manage data and file changes. Sharing printers within offices is not a convenient solution for big companies. Computer networks and sharing resources have lots of advantages and no disadvantages. If using computer networks, you should pay greater attention to the spread of viruses. Stand-alone environments are generally less costly than setting up computer networks. In computer network environments, there is no need for skilled personnel. LAN and WAN differ depending on the size of the area they cover. Intranet and LAN are synonyms. Setting up a WAN involves wireless and satellite technologies as well as a traditional cabling system. WANs can be either public or private. Internet is an example of private WAN. FCE T F Speaking 2. Look carefully at the photographs below, then describe them orally in appropriate language, highlighting all the following aspects. (4 minutes) • Setting • Appearance/Description • Feelings • What happened prior to taking the photograph • What is likely to happen the day after • Your opinion on the photograph 3 Telecommunications FCE Reading and Use of English – Part 3 1. Read the text below and use the word given in capitals at the end of some of the lines to form a word that fits in the gap in the same line. There is an example at the beginning (0). The term telecommunications is obtained 0. combining the word tele, which means ‘far’ in ancient Greek, with the word communications and deals with 1. …………………… exchange between entities using technology to reduce the distance between these two entities. This technology is not necessarily electric; in fact, a long time ago people began to communicate using smoke signals and drums in Africa, the Americas and parts of Asia. COMBINE INFORM Electric Communications It was not until the 1830s that electrical telecommunication systems started to appear with the first electrical telegraph to transmit and receive information 2. …………………… with the Morse alphabet. The first distance communication using human voice dates back to the 1870s, but it was not before December 1901 that wireless communication became reality thanks to Guglielmo Marconi. The Italian 3. …………………… was able to establish wireless communication between St John’s, Newfoundland, and Poldhu, Cornwall, which earned him a Nobel Prize in Physics he shared with Karl Braun. Guglielmo Marconi built the first complete, commercially successful wireless telegraphy system based on airborne electromagnetic waves, but his experience, which began seven years before the 4. …………………… communication between Newfoundland and Cornwall, allowed Reginald Fessenden to transmit a human voice wirelessly. CODE SCIENCE SUCCESS Telecommunications and Computers With the spread of 5. …………………… it has become necessary to exchange information between them. Since computers are electronic systems, it is natural that both wired and wireless communication technology be electrical. The main 6. …………………… between computer communication and the earliest technologies employed is that computers exchange 7. …………………… information and not analogic ones as in the first electric telephone. As a matter of fact, a digital signal is a sequence of two pieces of elementary information: zero and one. They can be coded with electric 8. ……………………: for example one is the presence of an impulse in a given time interval and zero is the absence of the impulse. For successful communication, a transmitter and a 9. …………………… must share the same rules, timing and information coding. In other words, communication is established according to the same protocol between 10. …………………… and receiver. In case of network communication between computers, the most used protocol is called TCP/IP and it is suitable for both small local networks (Local Area Network or LAN) and Wide Area Network (WAN), which can reach a huge 11. …………………… area around the world. Not only is TCP/IP a standard for private networks owned by organisations or 12. …………………… in the home environment, it is also the protocol that makes Internet communications. COMPUTE DIFFER DIGIT IMPULSE RECEIVE TRANSMIT GEOGRAPHY EMPLOY 126 8. Networking and Telecommunications PET Listening – Part 4 49 2A. For each question, choose the correct answer. You will hear Steve Jobs speaking to Stanford University students. 1. Steve Jobs A. graduated cum laude at college. B. spent long years at college with unsatisfactory results. C. never graduated from college. 2. In his speech, he tells the students about A. some events from his childhood. B. three stories about events in his life. C. meeting the right people at the right time. 3. In the first story, Steve Jobs explains that A. his biological mother had abandoned him in an orphanage. B. being religious, his biological mother wanted him to be raised by people attending the local Church. C. his biological mother wanted Steve’s foster parents to be university graduates. 4. Steve’s foster parents actually happened to be A. different from what she had planned. B. consistent with Steve’s biological mother’s desires. C. totally inadequate people in child-raising. 5. Steve Jobs points out that A. dropping out of college was the worst mistake of his whole life. B. spending his parents’ savings in college was a burden to him. C. only college graduation could have made his life meaningful in his parents’ eyes. 6. After dropping out of college Steve Jobs A. spent about six months there, attending courses for free. B. went back to his parents’ home and began to work on the first Macintosh computer. C. thought of joining the Hare Krishna Temple and settling there. 7. Attending calligraphy classes A. proved to be useful from the early stages of the development of the Macintosh. B. was a complete waste of time, in Job’s opinion. C. was very interesting but it never had any practical application whatsoever. 127 3. Telecommunications 2B. Now listen to the final part of the speech and decide if the following sentences are true (T) or false (F). 50 The third story Steve Jobs tells the students is about illness and death. He developed cancer when he was 17 years old. Being aware of death was useful to his life and career. When doctors diagnosed pancreas cancer, Steve Jobs was heartbroken and in despair. 5. He had to undergo surgery to fight the disease. 6. Jobs thinks that people would be happier if they could follow their heart’s desires. 7. He compares The Whole Earth of the late 1960s to Google. 8. Jobs didn’t like this publication at all, but his mum did. 9. The final statements of his speech ‘Stay hungry, stay foolish’ date back to the last issue of that publication. 10. He encourages the graduated students to stay hungry and foolish because he wants no further business competitors. 1. 2. 3. 4. 2C. Now watch the full video of the speech. PET 6 Speaking 3. Ask and answer the following questions with a classmate, then switch roles. • Is your home equipped with a Wi-Fi connection? • What do you mainly use it for? • Who else uses Wi-Fi connection in your family? What do they use it for? • Make a list of five things in your everyday life that would be different if you didn’t have a Wi-Fi connection. • Explain to your partner how you would cope with this. T F 128 8. Networking and Telecommunications 4 Wi-Fi and Cellular Data Technologies It would be difficult to use a mobile device (smartphone, tablet, laptop) by connecting it to a network through copper wires or optical fibre, as it would be impossible to have a huge number of plugs to connect our device to wherever we go. Moreover, using cables means that people can access network resources from static locations, so the device is no longer mobile – at any rate, its mobility is restricted. Different jobs may require network access and mobile use, e.g. a doctor treating patients in a large hospital. The data on these patients is held in a networked database. It would be clearly advantageous for the doctor to access a patient’s clinical records just prior to the examination and to be consequently able to update the same database after the examination. The spread of mobile devices is closely linked to the spread and constant improvement of efficient wireless connection technologies like Wi-Fi and connectivity through the signals used by mobile phones (GPRS, EDGE, 3G and HSDPA). Wi-Fi Wi-Fi (or WiFi) is a local area wireless computer networking technology that allows electronic devices to connect to a network using high frequency radio signals (2.4 or 5 gigahertz). Many devices can use Wi-Fi, e.g. personal computers, video game consoles, smartphones, digital cameras, tablet computers, printers and digital audio players. They can connect to a network resource such as the Internet via a wireless network device called an ‘access point’ (or hotspot), which has a range of about 20 metres indoors and a greater range outdoors. Hotspot coverage can be as small as a single room with walls that limit high frequency radio waves, or as large as many square kilometres achieved by using multiple overlapping access points. Wi-Fi can be less secure than wired connections because an intruder does not need a physical connection and can intercept data with a special radio receiver tuned on the Wi-Fi signal frequency. This is the main reason why Wi-Fi has adopted various encryption technologies: even if an intruder steals information, data is coded with a password using complex algorithms and can only be decoded by knowing this password and which algorithm is employed (see ‘Encryption and Cryptography’, Unit 10). GLOSSARY plug: spina treat (v.): curare record: elemento, dato range: gamma, varietà indoors: all’interno intercept (v.): intercettare encryption: criptaggio steal (v.): rubare, sottrarre decoded: decodificato, decrittato 51 129 4. Wi-Fi and Cellular Data Technologies Cellular Data Technologies When no access point is available or it is private and can’t be accessed, it is possible to connect to a network, in most cases the Internet, if your mobile device is equipped with the technology to access a cellular network and your provider allows you to connect to it. Cellular data technology, as Wi-Fi bases on high frequency radio waves and is constantly evolving to improve performance in data transfer speed. Currently there are many standards for data connection with smartphones. Here are some of them, listed from the lowest to the highest performance. 2G or GPRS (Second Generation) GPRS is a system used to transmit data at speeds of up to 60 kbits per second and is a battery-friendly way to send and receive e-mails and to browse the Internet, but with the current broadband connectivity it may be rated as slow by some. EDGE EDGE (Exchanged Data rates for GSM Evolution) is a recent development based on the GPRS system and has been classified as a ‘3G’ standard because it can run at up to 473.6 kbits per second. If a smartphone is EDGE-compliant, it can be used for heavy mobile data transmission such as receiving large e-mail attachments and browsing complex web pages at great speed. 3G (Third Generation) 3G was initially marketed as a way to make video calls on the mobile network but is also a highly efficient way of browsing the Internet and communicating on your smartphone using voice over IP and by e-mail and instant messaging. Most UK and some European networks now have 3G networks and with speeds similar to EDGE it has become a widely useful way to connect and communicate. GLOSSARY radio wave: onda radio rate (v.): valutare attachment: allegato speed: velocità optical fibre: fibra ottica HSDPA HSDPA (High Speed Downlink Packet Access) is a technology based on the 3G network that can support speeds of up to 7.2 Mbits per second. Actually, you will most likely get a top speed of around 3 Mbits, but this is useful for mobile TV streaming and other high-end data transmissions. 4G or LTE (Fourth Generation) 4G is an evolution of 3G technologies to support advanced multimedia applications thanks to high bandwidth connections. The 4G network can support download speeds of up to 326 Mbits per second. 5G (Fifth Generation) 5G is the new generation network with speed up to 20 Gbits per second. This high-connection speed allows to access network services that are usually delivered using optical fibre technology, such as cloud computing and cloud gaming. This network is as reliable as a wired network and can support smart cities, automotive systems and much more. Some people claim that it could have negative effects and consider it a controversial issue, though. 130 8. Networking and Telecommunications READING COMPREHENSION 1. Read the passage and match the beginning of each sentence with the correct ending. 1. As an advancement of 3G technology, 2. Nowadays, many networks are employing 3. HSDPA technology can support very high speed 4. The GPRS system has provided further development 5. Before the advent and spread of broadband connections 6. In order to prevent hacker attacks 7. 5G allows to connect to a wide range of network services 8. Despite being a useful and versatile technology PET A. that are usually supplied through optical fibres. B. resulting in EDGE technology. C. 3G to support Internet browsing and mobile device applications. D. Wi-Fi technology employs protection systems based on encryption techniques. E. 4G can support advanced multimedia applications. F. Wi-Fi is more liable to being violated through radio devices which intercept its signal. G. yet the average user will get a lower top speed. H. people thought GPRS was the best way to manage e-mail services and to browse the Internet. Writing – Part 3 2. You have recently joined a Drama Club in your school and your group is looking for new ideas to perform on stage. Write down a report with some ideas for a school play in about 100 words. Remember to include the following elements. • Theme/Plot • Special effects • Number of characters • Costumes • Roles • Rehearsals • Music …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… 131 4. Wi-Fi and Cellular Data Technologies SPEAKING – CLASS DEBATE 3. Here are some quotes on success and failure in life. Divide the class into three groups. Each group has to choose one of the quotations and give reasons for the choice. Furthermore, each group has to comment on the quote; the other two groups should ask questions as well. The teacher will eventually choose the best debate. [ • ‘Failure is the key to success; each mistake teaches us something.’ (Morihei Ueshiba) • ‘Success is the result of perfection, hard work, learning from failure, loyalty and persistence.’ (Colin Powell) • ‘I can accept failure, everyone fails at something. But I can’t accept not trying.’ (Michael Jordan) • ‘The starting point of all achievement is desire.’ (Napoleon Hill) • ‘Success is not final, failure is not fatal: it is the courage to continue that counts.’ (Winston Churchill) Quotes from www.brainyquotes.com PET ] Writing – Part 2 4. You have been asked to write a book review for the school magazine. You may also choose to write a review about a movie. Write your review in 140-190 words in an appropriate style. …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… …………………………………………………………………………………………………………… MIND MAP NETWORK According to dimension According to communication technology LAN (Local Area Network) Wired enclosed within a small geographical area copper cable optical fiber cable subtopic building or group of buildings MAN (Metropolitan Area Network) enclosed in a metropolitan area Wireless Wi-Fi cellular data technologies wild urban area group of cities WAN (Wide Area Network) spread into a wide geographical area public private GAN (Global Area Network) Internet GPRS EDGE 3G HSDPA 4G 5G 133 MOVIES AND MORE Hidden Figures – Official Trailer WARM UP – BRAINSTORMING 1. Answer the following questions orally. 1. What do you know about NASA? 2. What does the acronym NASA stand for? 3. The word ‘figure’ may have different meanings according to the context. Use a monolingual dictionary to explain the meaning of the title Hidden Figures. 4. What can you infer about the themes of the movie? FCE Reading and Use of English – Part 3 2. Read the text below and use the word given in capitals at the end of some of the lines to form a word that fits in the gap in the same line. Hidden Figures is a 2016 movie about three African-American 1. ………………………: Katherine Johnson, Dorothy Vaughan and Mary Jackson. They start working for NASA in the early 1960s 2. ……………………… to the U.S. success in aerospace missions during the Space Race. The movie 3. ……………………… how racial segregation strongly affected the scientists’ 4. ……………………… work and how it made difficult to carry out their tasks. The movie is based on a non-5. ……………………… book and it portrays the lives of true characters. Katherine Johnson was awarded the 6. ……………………… Medal of Freedom in 2015. SCIENCE CONTRIBUTE SHOW DAY FICTION PRESIDENT SPEAKING 3. Discuss the following news. What is your opinion about it? Motivate your statements. NASA will name its headquarters after Mary W. Jackson, the agency’s first African American engineer. The NASA headquarters will now bear the name of Mary Winston Jackson (1921-2005). CLIL History 4. Find Information about the Space Race and the countries that took part in it. Audio 9 THE INTERNET • How the Internet Developed • Internet Telephony • The Internet and Its Core • E-mails • The WWW (World Wide Web) • Search Engines • Social Networks WARM-UP brainstorming • How old do you think the Internet is? • How do you think it began? • What was it originally meant to be? 1 How the Internet Developed The origins of the Internet date back to the Cold War in the 1960s when the US Army was concerned that a nuclear attack could destroy vital communications. They began to design a communications system based on computers that could withstand damage by nuclear weapons. ARPANET (Advanced Research Projects Agency Network) was established in 1969. Dozens of military sites across the USA were linked in a network, each of which had computers programmed to relay a message. If one site were destroyed, the network could re-route messages using any other site still in operation. The military realised that the larger the network was, the stronger it would be in case of attack. They encouraged other organisations, such as academic institutions and large companies, to join ARPANET. A more rapid expansion of the Internet was made possible in 1974, when a common system of addresses and communication procedures, called TCP/IP, was created. This meant the Internet was able to incorporate other networks which had developed in universities and other institutions. 52 GLOSSARY concerned: preoccupato relay (v.): trasmettere, inoltrare 135 1. How the Internet Developed During the late 1970s it became obvious that the new network could be used for all sorts of communication, especially for university research and business. An increasing number of sites, including those in institutions outside the USA, joined the network. The idea of an Internet, an international network, soon developed. Until the early 1990s, the major users of the Internet were academic and research organisations and most information consisted only of text. The introduction of a feature called the World Wide Web in 1991 to the Internet made it possible to include graphics, animation, video and sound. With the arrival of these multimedia tools, large numbers of ordinary people began to use the Internet. During the 1990s, the incredible growth in the sales of personal computers made the Internet accessible to more and more people. Commercial organisations began to see business opportunities, specialist Internet companies developed and the Web was increasingly used for advertising and sales. Although at first the vast majority of Internet users were in the USA, by the year 2000 familiarity with the new medium had spread all around the world. Governments, companies and ordinary people almost everywhere were using the Internet to communicate, obtain information, and do business, as well as for entertainment. GLOSSARY during the late 1970s: verso la fine degli anni Settanta until the early 1990s: fino ai primi anni Novanta growth: crescita entertainment: divertimento, svago READING COMPREHENSION 1. After reading the passage, complete the timeline below. HISTORY OF THE ‘NET’ 1960s ……………………… 1969 ……………………… 1974 ……………………… ……………………………… ……………………………… ……………………………… ……………………………… ……………………………… ……………………………… ……………………………… ……………………………… ……………………………… ……………………………… ……………………………… ……………………………… Late 1970s ……………………… 1991-Nowadays ………… ……………………………… ……………………………… ……………………………… ……………………………… ……………………………… ……………………………… ……………………………… ……………………………… ……………………………… ……………………………… ……………………………… ……………………………… ……………… 1991 136 9. The Internet PET Reading – Part 5 2. For each question, choose the correct answer. THE MAN WHO INVENTED THE WEB On 6 August 2016 the world 1. …………… the 25th anniversary of the World Wide Web (aka www). Bright signs and colourful banners were displayed on our Facebook wallpapers, our PCs and high-tech devices to remind us that ‘The Web’ as we all know and use it had been with us for a quarter of a century – and how helpful, useful and 2. ………… it has proved to be! Fair enough, those banners and signs were 3. ………… thankful to Sir Tim Berners-Lee, the man who invented the Web. Berners-Lee, 4. …………… studied at the Queen’s College of Oxford and received a first-class Bachelor of Arts degree in physics in 1976, was working at CERN 5. …………… the mid-80s. He was deeply concerned about the issue of sharing data and managing information for practical reasons: physicists 6. ………… in different places of the world needed a way to communicate, exchange data and compare their studies quickly and reliably. This is how the idea of the World Wide Web 7. …………… to grow in Berners-Lee’s mind. As he 8. …………… explained, ‘Most of the technology involved in the Web, like the hypertext, like the Internet, multi-font text objects, had all been designed already. I just had to put them 9. …………… . It was a step of generalising, going to a higher level of abstraction, thinking about all the 10. …………… systems out there as being possibly part of a larger imaginary documentation system.’ Tim Berners-Lee has received many awards and honours during his career. One of the most important ones was when Queen Elizabeth II 11. …………… him in 2004. Back in 1999, he was included among the 100 most important people of the 20th century in a list compiled 12. …………… the American magazine Time. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. A. has celebrated A. entertainment A. rightly A. that A. of A. works A. start A. later A. united A. documents A. knights A. by B. celebrated B. entertaining B. well B. – B. on B. worked B. started B. so B. together B. document B. knighted B. at C. celebrates C. entertain C. good C. which C. in C. work C. starting C. however C. unite C. documentary C. has knighted C. to D. celebration D. entertained D. right D. who D. at D. working D. starts D. before D. separated D. documentation D. knight D. from 137 2. Internet Telephony 2 Internet Telephony Internet technology is revolutionising telephone communications transmission methods. At the heart of the revolution is the Internet Protocol (IP), a language PCs use to talk to one another, resulting in a faster and cheaper way to send information. Data can be transmitted by breaking it down into digital packets, each of which can contain anything – a video frame, a line of text, or a split second of conversation. Like letters at the Post Office, each packet is individually addressed. The IP tells the network how to read the packets and where to send them. Unlike a traditional call, which creates a circuit between two phones, the IP allows phone carriers to simply throw the packets onto a network where they will be sorted and delivered by any of the thousands of machines – routers – as if they were postcards. GLOSSARY resulting in: producendo, diventando break down (v.): scomporre sorted: organizzato 53 138 9. The Internet PET Speaking 1A. Answer the following questions orally. Have you ever heard of Skype? Have you ever used it? Can you tell us how it works? Can you think of any real life situations where Skype could be useful? Have you ever used Messenger or WhatsApp? Do you think they have any disadvantages? Can you give any examples? What do you normally use to text your friends? What are their advantages, in your opinion? Give reasons for your choice. Can you tell us what a WhatsApp group is for and how to create one? Do you use abbreviations when texting? Why?/Why not? How would you explain what an emoji is to your grandmother? Look at these text messages. Do you understand them? Why/Why not? EOD! TGIF EOBD? LOL IMU. CAN I CALL U? L8R, PWOS CYT 1B. Look at the emojis below and explain in your own words: their meaning; who you would use them with; what your favourite one is and why; what your least favourite one is and why. 139 2. Internet Telephony CROSSWORD 2. Complete the following crossword. Across 2. A computer network in the form of a circle. 3. A device which modulates digital signals so that they can travel over phone lines. 4. A system of interconnected lines. 8. To put data onto a computer network so that other people can see or use it. 9. Software that protects a computer network from being entered without permission. Down 1. A linking point between two LANs which use the same protocol. 4. A device connected to a LAN. 5. A net of interlinking threads made by a spider. 6. A computer that directs the traffic of data around a network. 7. The focal point of a system. 1 2 3 4 7 5 6 8 9 READING COMPREHENSION 3. Read the passage and decide if the following sentences are true (T) or false (F). T 1. The IP telephony system does not set up a circuit between two telephones. 2. IP telephony splits up a telephone message into a series of separate segments. 3. Sending data in packets is only done for telephone conversations. SPEAKING F – GROUP WORK 4. Being able to send messages and talk to other people on the Internet is an important part of modern life. The Internet has opened up lots of new ways for us to communicate. Find out about five different ways to communicate using the Internet (e.g. phone calls, video sharing etc.) and report orally to the class on the following topics. • Which type of communication is best for each occasion? • How does each way to communicate work? (e.g. to share a video it’s necessary to connect to the Web with another computer and upload the file on a common directory) • At the touch of a button we have the ability to instantly get in touch with almost anyone, anywhere on the planet: pros and cons. 140 9. The Internet 3 The Internet and Its Core 54 Do you know how the Internet works? Every time you chat to somebody using the Internet or send an e-mail, can you think how many different computers you are using while doing this? Two are the computers involved, yours and the other person’s. Moreover, it is likely there are more computers bridging the gap. All things considered, it is true that all the computers linked up worldwide are called the Internet. How do they communicate with one another? What Is the Internet? Communicating globally is easier now thanks to a tangled worldwide computer network we call the Internet. Over the last 25 years the Internet has expanded to link up hundreds of different nations. Even some of the world’s poorest developing nations are now connected. Most people use the word ‘Internet’ to mean going online. Actually, the ‘Internet’ is nothing more than the basic computer network. We can think of it as the network of highways that criss-cross the world. The Internet is a network just like highways are. The traffic that travels down roads runs on ‘top’ of the basic network. Similarly, the World Wide Web (for instance, the information pages we can browse online, instant messaging chat programs, video and music downloading, and file sharing) are all things that run on top of the basic computer network we call the Internet. The Internet is a collection of computers – both stand-alone and linked up in networks – mainly interconnected using the telephone network. The connections between the computers are a mixture of old-fashioned copper cables, fibre-optic cables (which send messages in pulses of light), wireless radio connections (which transmit information by radio waves), and satellite links. Adapted from explainthatstuff.com GLOSSARY tangled: intricato criss-cross (v.): incrociare browse (v.): navigare (in Internet) pulse of light: impulso luminoso What most of us think of as the Internet – Google, eBay, Instagram, TripAdvisor – is actually the World Wide Web. The Internet is the underlying telecommunication network that makes the Web possible. If you use broadband or Wi-Fi, your computer will probably be connected to the Internet all the time it is on. 141 3. The Internet and Its Core The Core of the Internet READING COMPREHENSION 1. The paragraphs of the passage have been jumbled. Read them and reorder them from A to D. There is an extra paragraph. (……) Internet bandwidth is an indication of the speed of the connection, the amount of data that can be sent per second. Faster connections have become possible with better physical infrastructure (such as fibre-optic cables that can send information close to the speed of light), as well as better ways to encode the information even when using an older medium like copper wires. (……) This system of transmission is called packet switching. Each packet is digitally labelled with its destination address. A succession of routers sends each packet by the quickest available path until it reaches its destination. Once there, the packets are put back together in the right order to recreate the original file. As Internet traffic is constantly flowing, and there are many separate paths among routers, each packet may have made a completely different journey. But, since the splitting up and the reassembling happen in a split second, the process is not noticeable. A (……) The core of the Internet consists of powerful computers known as routers connected by high-speed links using optical fibres and other cables as well as satellites. The routers are connected, in turn, to thousands of smaller networks and, through them, millions of individual computers or other devices. Large institutions always have direct Internet access through their own Internet servers. Other users get access through an Internet Service Provider (ISP). (……) Parents and teachers should always pay great attention to cyberbullying and be able to detect the early signs and symptoms of a cyberbullied teenager, e.g. apathy, lack of sleep, weight loss and isolation. Cyberbullying is not always easy to perceive as it may take many different forms – very often subtle ones – such as gossip, harassment, cyberstalking and exclusion. (……) The creators of the Internet discovered that data could be sent more efficiently when broken into smaller pieces, sent separately, and reassembled. These pieces are called packets. So, for example, when you send an e-mail across the Internet, your full e-mail message is broken down into packets, sent to your recipient, and reassembled. The same thing happens with photographs, videos, voice communications and any other form of data. GLOSSARY bandwidth: ampiezza di banda, larghezza di banda journey: tragitto, percorso, viaggio pay attention (v.): prestare attenzione subtle: acuto, sottile (non in modo evidente) full: pieno, intero, completo 142 9. The Internet READING COMPREHENSION 2. Read the passage and match the beginning of each sentence with the correct ending. 1. 2. 3. 4. The heart of the Internet is Routers are interconnected Routers are also linked to Many institutions have direct A. are broken down into pieces called packets. B. a network of computers called routers. C. by different routes across the network. Internet access 5. D. by very fast cable and microwave links. Most ordinary users obtain Internet access 6. 7. Data files sent over the Internet The packet-switching system sends individual packets 8. F. improvements in infrastructure and encoding. When they arrive at their G. smaller networks made up of individual computers. The quantity of data sent per H. the packets are reassembled in the correct order. destination 9. E. depends on the bandwidth of the connection. second 10. Faster transmission is possible because of I. through an Internet Service Provider. J. through Internet servers. SPEAKING 3. Using your own words, explain how packet switching works. 55 LISTENING 4. Listen to and repeat the following words, underline the syllables which are stressed and think of their Italian equivalent. 1. 2. 3. 4. Electricity Conductivity Similarity Radioactivity SPEAKING 5. 6. 7. 8. Transmitter Conductor Inventor Resistor 9. Communication 10. Organisation 11. Information 12. Transmission – CLASS DEBATE 5. Divide the class into three groups and debate the following quotations by Tim Berners-Lee. Each group has to choose one. Remember to give reasons for your statements. Let your voice be heard! [ • ‘There was a time when people felt the Internet was another world, but now people realise it’s a tool that we use in this world.’ • ‘Imagine that everything you are typing is being read by the person you are applying to for your first job. Imagine that it’s all going to be seen by your parents and your grandparents and your grandchildren as well.’ • ‘Celebrity damages private life.’ • ‘The Google algorithm was a significant development. I’ve had thank-you e-mails from people whose lives have been saved by information on a medical website or who have found the love of their life on a dating website.’ • ‘Innovation is serendipity, so you don’t know what people will make.’ (Serendipity: the faculty of making fortunate discoveries by accident) Quotes from www.brainyquote.com ] 143 3. The Internet and Its Core What Does the Internet Do? 56 The aim of the Internet is very simple: it moves computerised information (data) from one place to another. The machines that make up the Internet treat all the information they handle in exactly the same way. So, the Internet works a bit like the postal service. The job of the mail service is to move letters from one place to another, no matter why people are writing letters, no matter who they are from or what messages they contain. The same applies to the Internet. The Internet helps people to do many different jobs thanks to its simplicity in handling many different kinds of information. It’s not specialised to handle e-mails, web pages, chat messages, or anything else: all information is handled equally and passed on in exactly the same way. Moreover, because of its simplicity, people can easily use Internet to run new ‘applications’ – new things that run on top of the basic computer network. That’s why, when two European inventors developed Skype, a way of making telephone calls over the Net, they just had to write a program that could turn speech into Internet data and back again. No-one had to rebuild the entire Internet to make Skype possible. GLOSSARY aim: scopo move (v.): trasferire, spostare speech: discorso, produzione orale Households with Internet access – 2015 100 90 82.1 81.3 This chart compares the estimated percentage of households with Internet access for different world regions and economic groupings. Although there have been dramatic improvements in all regions, there are still great disparities between the ‘richer’ nations and the ‘poorer’ ones. The world average, shown by the black-outlined orange center bar, is still only 46.4% (less than half). Not surprisingly, richer nations are to the left of the average and poorer ones to the right. 80 70 60.1 60 60 46.4 50 40.3 39 34.1 40 30 20 10.7 10 0 S CI 6.7 ) s pe ped ion icas orld ates cific ing frica p A DC st ro r t n o a l o L u W e l S P E ea d t U Am ve b ve ia (L pe ) ra De ovie De As A lo s S ve ntrie e er D ou rm C (fo CHECK YOUR KNOWLEDGE 6. These are some ways you might communicate using technology in just one day. One of these ways does NOT involve using the Internet. Can you work out which one? HIGH-TECH WAYS TO COMMUNICATE A. Video call C. Texting During breakfast, you receive a video call from your granny in Australia. You send a text message to your mum telling her you are going to your friend’s house after school. B. Blogging At school you publish some poems that you have written on the class blog. D. E-mail You finish your homework and send an e-mail to your teacher. 144 9. The Internet g the Ways to Communicate Usin Inter net 57 BLOG This is a website which works like an online diary where you can publish your thoughts and interests. Other people can go and read your posts and take a look at your pictures and videos. This is a good form of communication if you want to share your ideas with a wide audience. It allows you to connect with anyone else who has access to the Web. • Have you ever read a blog? • What kind of blogs are you interested in? Why? • Would you like to write a blog? What would it be about? E-MAIL NEWSLETTER This is a cross between an e-mail and a newspaper. It is e-mailed to everyone on a list rather than to an individual. Like e-mails, newsletters travel almost instantly. • Have you ever subscribed to a newsletter? • Would your parents be interested in receiving a newsletter? What kind of topics would they be interested in reading? • List some possible e-mail newsletter topics. 145 3. The Internet and Its Core INSTANT MESSAGING This is a way to send text-based messages to other people connected to the Internet. They will be able to reply in real time. This is a good form of communication if you want to speak quickly to your friends or family. • How many text messages do you send on average every day? • Who do you usually text? • Would you have a problem with texting a teacher? Why/Why not? VIDEO CALLING This is a phone call where you use the Internet to transmit the signal. It lets you talk to someone in real time. You can use a webcam to send a live video of yourself. This is a good form of communication if you need to see someone’s face and it’s a fun way of speaking with friends and family. • Have you ever made a video call? • List three situations where a video call is preferable to a standard phone call. • In your opinion, what are the pros and cons of video calling? E-MAILS This is a digital version of sending letters. You can send text-based messages to anyone with an e-mail account. They travel almost instantly. You can also attach other files to the e-mail such as documents and images. This is a good form of communication if you want to send some project work or homework to your friends or teacher. • How many e-mails do you send and receive in an average month? • Do you think that e-mails can be useful in the work environment? Why/Why not? • What can you attach to an e-mail? GLOSSARY take a look at (v.): dare un’occhiata rather than: piuttosto che text-based messages: messaggi di testo let (v.): lasciare, permettere attach (v.): allegare 4 E-Mails FCE ‘How to write a good e-mail: 1. Write your e-mail. 2. Delete most of it. 3. Send.’ (Dan Munz) Reading and Use of English – Part 3 1. Read the text below and use the word given in capitals at the end of some of the lines to form a word that fits the gap in the same line. There is an example at the beginning (0). Advantages As 0. previously stated (see above), sending an e-mail is basically the same operation as 1. …………………… a paper letter: the sender transmits a message to the receiver. Similarly, whenever we 2. …………………… our mailbox, we can find letters or notes sent to us by other people. Needless to say, time is one of the main advantages of e-mails over a 3. …………………… mail service: a letter may take days or even weeks to reach its destination, whereas an e-mail will take just a few minutes – or seconds, depending on how powerful your Internet 4. …………………… is. Moreover, unlike a traditional mail service, it is possible to send a single e-mail to different 5. …………………… – no matter where they are and at what distance they are from the 6. …………………… – very cheaply, as e-mails do not need stamps to be delivered! Besides, the possibility of using 7. …………………… such as text files, images and photographs in e-mails has made it possible to substitute the traditional fax-sending way of 8. …………………… information. Not only does the advantage lie on 9. …………………… terms – dialling costs may be high for long-distance calls –, but also on the high quality of the attachments forwarded by e-mails. PREVIOUS DISPATCH CHECK TRADITION CONNECT RECEIVE SEND ATTACH FORWARD ECONOMY E-Mail Address and Mailbox As in a traditional mail service, in order to exchange e-mails we need an address to write to and one to receive. An inbox – that is, an electronic 10. …………………… for incoming e-mails – is associated with the e-mail address. The inbox stores the messages we receive. It also keeps track of the messages we have already sent. 11. …………………… e-mails are normally in bold font: in this way they are easily 12. …………………… . We can get an e-mail address and inbox from our Internet Service 13. …………………… (ISP) that provides our Internet connection and the service annexed to it. Further free e-mail addresses can be obtained through web services such as Gmail, Hotmail, Yahoo and others with a user-friendly online 14. …………………… . An e-mail address is made up of two text elements divided by the symbol @ (at). After @ there is the domain, that is, an address identifying the ISP. Before @ there is the name or ‘nick’ we have chosen to identify ourselves. This 15. …………………… has to be unique and unlike the domain cannot be shared. In other words, given the address mariorossi@ispmailserver.com, ‘ispmailserver.com’ is the domain, while ‘mariorossi’ is the identifier. It is not possible to configure a 16. …………………… ‘mariorossi’ identifier on the same domain, even though we can create a new inbox using the address mariorossi@anotherispmailserver.com. FOLD READ RECOGNISE PROVIDE APPLY IDENTIFY FAR What Do You Need to Use an E-Mail Service? In addition to an Internet connection and a mailbox with its address, to use an e-mail service we need a program, 17. …………………… e-mail client, such as Outlook or Mozilla Thunderbird. These programs need to be set up to manage each mailbox by shifting new messages on the mail server of our personal 18. ……………………, thus making room for new messages to arrive. What is more, e-mail clients provide 19. …………………… for storing the messages that have been received as well as for the setting and sending options of new ones. Finally, they can be set to efficiently organise and manage our e-mail address book. NAME COMPUTE FEATURE 148 9. The Internet 5 The WWW (World Wide Web) Back in the 1970s, writing a school assignment was often a taxing experience for the average student. If they had no encyclopedia at home, they had to go to a public library, open up a heavy reference book and find information on almost any subject. Things are much easier now: all we have to do is sit down at any computer, or browse a smartphone, even while walking down the road, almost anywhere on the planet, and access an online information library far more powerful than any public library on Earth: the World Wide Web. Twenty-first century life is so dependent on the Web that it seems awkward to think we ever lived without it. Yet, the WWW has been in our daily life for just twenty-five years! PET Listening – Part 3 58 GLOSSARY assignment: compito (scolastico), incarico taxing: gravoso reference book: enciclopedia, manuale awkward: difficile, bizzarro 59 1. For each question, write the correct answer in the gap. Write one or two words or a number or a date or a time. You will hear a speaker talking about the history of the World Wide Web. In 1. ………………… researchers for DARPA sent the first data from Los Angeles to Stanford. The technology of ARPANET later developed into the Internet. By 1971 there were 2. ………………… different nodes across the USA connected to the ARPANET. 3. ………………… were introduced in 1972. The first international connections were established in 1973 in England and 4. ………………… . The number of networks increased significantly in the 5. …………………. . The WWW was invented by Tim Berners-Lee in 1989 at the 6. ………………… laboratories in Switzerland. The Internet went public in 7. ………………… and the first search engines came into being into 1993. By 2012 there were about 1 8. ………………… users on Facebook. 149 5. The WWW (World Wide Web) What’s the Difference Between the Web and the Net? 60 The Internet is a worldwide network of computers, linked mostly by telephone lines; the Web is just one of many things (called applications) that can run on the Internet. When you send an e-mail, you’re using the Internet: the Net sends the words you write over telephone lines to your friends. When you chat to someone online, you’re most likely using the Internet too – because it’s the Net that swaps your messages back and forth. But when you update a blog or Google for information to help you write a report, you’re using the Web over the Net. The Web is the worldwide collection of text pages, digital photographs, music files, videos, and animation you can access over the Internet. What makes the Web so special (and, indeed, gives it its name) is the way all this information is connected together. The basic building blocks of the Web are pages of text, web pages as we call them. A collection of web pages on the same computer is called a website. Every web page has highlighted phrases called links (or hypertext links) all over it. Clicking one of these takes you to another page on the same website or another website entirely. So far, so simple. From explainthatstuff.com SPEAKING Imagine this little computer network scaled up several hundred million times… and you’ll have a picture of the Internet. GLOSSARY swap (v.): scambiare back and forth: avanti e indietro highlighted: evidenziato - CLASS DEBATE 2. Internet and the World Wide Web have inspired a great deal of opinions, each reflecting a different attitude towards them. Read the following quotes and divide the class into three groups. Each group has to choose one of the quotations, give reasons and provide examples for the choice. Then each group has to comment on the assumption; the other two groups should ask questions as well. The teacher will eventually choose the best debate. [ • ‘The Internet could be a very positive step towards education, organisation and participation in a meaningful society.’ (Noam Chomsky) • ‘There’s a danger in the Internet and social media. The notion that information is enough, that more and more information is enough, that you don’t have to think, that you just have to get more information – gets very dangerous.’ (Edward de Bono) • ‘The Internet is becoming the town square for the global village for tomorrow.’ (Bill Gates) • ‘We are now connected by the Internet, like neurons in a giant brain.’ (Stephen Hawking) • ‘Turn off your e-mail; turn off your phone; disconnect from the Internet; figure out a way to set limits so you can concentrate when you need to, and disengage when you need to. Technology is a good servant but a bad master.’ (Gretchen Rubin) ] 150 9. The Internet 6 Search Engines 61 A. Search engines such as Google, Bing, Yahoo and others have become tools net surfers simply cannot live without. Back in the mid- and late 1980s there were no search tips at all, which meant that you needed to know the whole web address (e.g. http://www.somewebsite.com) and type it in the address bar with no spelling mistakes. Needless to say, this access mode was not intuitive, nor did it guarantee finding the right information at the web address. Nowadays, we can access the information we are looking for by simply typing some letters or key words on a page. B. The search engine replies to our query showing lists of links (SERP – standing for ‘Search Engine Result Pages’) related to the key words we have chosen. From a physical point of view, search engines are websites able to execute highly sophisticated algorithms (that is, programs). Therefore, in their digital archives they can rapidly search the web pages matching the criteria we have chosen. Search results are shown as lists of links in order to allow a userfriendly reference. C. The fame and popularity of a search engine over its competitors lies in the width of its digital archive and the speed of its search algorithm. Accuracy is essential as well, meaning that the results must be consistent with the query. The growing success of Google, for instance, is due to these reasons. Specifically, this search engine is able to adapt search results to the popularity and quality of the pages within its archive. In a nutshell, if a website is valued by users, Google is likely to hold it in regard as well! On the other hand, the growing success of this search engine has even affected the English language: a new verb – ‘to google’ – has sprung up due to its extensive use in everyday language. In addition to this, the term ‘doodle’ (Literally in Italian ‘scarabocchio’) has extended its meaning thanks to the creativity of Google staff. Well-known doodles have been designed for the Olympic Games, to celebrate anniversaries and famous people, as in the Google Doodle tribute to Freddie Mercury. 151 6. Search Engines D. Web contents are continuously evolving, so data needs to be constantly updated in order to keep the reliability and quality of search engines as high as possible. In the earliest steps of their development, webmasters provided search engines with information and key words to direct users to their site. This procedure has gradually been left behind as it often caused spam. In addition, some webmasters could display incorrect behaviour, giving key words that were not consistent and coherent with the website contents. In order to prevent possible mischief, all search engines use special programs called Spiders or Crawlers. They can detect the Web autonomously, analyse web pages and sort the most useful contents to update their own archive. It is therefore essential for web developers to master the most useful web page management techniques (optimisation) so that spiders may acquire information and key words that will be shown in the query. E. So far, we have focused on search engines from the users’ point of view – that is, as necessary tools for information and data search. What happens when this information is linked to product placement and merchandising? Let us suppose, for instance, we want to buy an accounting software online. Hence, we type the words ‘accounting software’ to look for the websites of suitable sellers. This type of search generates thousands of results lined up in hundreds of web pages which obviously the user will be unable to read one by one. Let us now suppose we own a company selling accounting software: which position would we like our site to be among search engine results? The answer is obvious: as visible as possible, and in no way beyond the limit of the first three pages of the search engine results with the highest possible number of key words and/or statemtents. Such a plea from companies on the web market has led to the development of techniques focused on setting websites at the top of the search result list. These techniques analyse data in order to monitor customers’ behaviour to take action on site contents whenever they are ignored or not frequently searched. All these techniques and strategies belong to the Web Marketing field, that is, the branch of company marketing activities that use the Web to analyse the market and develop commercial partnerships. GLOSSARY search tip: suggerimento di ricerca needless to say: inutile a dirsi, com’è facile intuire width: ampiezza, estensione in a nutshell: in breve reliability: affidabilità mischief: uso improprio, danno, atto criminale o vandalico accounting: contabilità hence: dunque, perciò such a plea: una tale richiesta, una simile richiesta READING COMPREHENSION 1. Match the headings (1-7) to the paragraphs (A-E). There are two extra headings. 1. 2. 3. 4. Hazards in search engine results …… Web Marketing …… Commercials …… Competitive features …… 5. How search engines work …… 6. Updating search engines …… 7. The success of search engines …… 152 9. The Internet FCE Writing – Part 2 AGONY AUNTS 2.0 2. Have you ever dreamt of being an agony aunt for a day? Here’s your chance! You will be Aunt Sally for a little while. Choose one of the e-mails below and write a reply in 140-190 words in an appropriate style to give advice in order to help solve the problem. 1. Untidy roommate I’m a 19-year-old student and I live in a house-share with three other girls. One of the roommates is particularly bad to live with. She’s 24 and always wakes us up when she comes home late at night. She slams doors, throws her clothes all over the floor, even on the breakfast table, and she’s got disgusting habits like never flushing the toilet. She even takes food from my cupboard and leaves the kitchen dirty. I’m exhausted and my studies are suffering. What should I do? ruth@tidiness.dot.com 3. FB love pains I’m 15 and I’ve got a crush on a girl who is a friend of mine on Facebook, but I’m very shy. I’d like to get to know her better, but I’m not sure about what to say or how to say it. I met this girl during a school trip – we aren’t in the same class, though – but we’ve never actually spoken. I’ve never had a girlfriend. All I do is ‘like’ all the pics and posts on her wall but my friend says I shouldn’t, because if I do I’ll be friend-zoned. What should I do? jim@lovelove.dot.com To: From: subject: 2. Worried mother I’m the mother of a 17-year-old boy and I’m really worried about him. He spends his days locked in his room, chatting and playing videogames. His friends seem to have deserted him. He leaves home every morning to go to school but after lunch he goes to his bedroom until dinner time. I’m a housewife, so I spend a lot of time at home cleaning and watching TV. I’ve tried to talk to him but he says he’s fine and that I must stop worrying. But you know, I just can’t. I regularly check his room but there’s nothing unusual in it, only passwords on his PC and smartphone. What should I do? claire@mumseye.dot.com 4. Chatting or cheating? My wife and I have been married for 5 years and have no kids. On her last birthday, I gave her a tablet as a present, but now I see that was a terrible idea. She seems to be always connected to it, she’s holding it all the time, we don’t talk any more after dinner as we used to. What’s more, I think she’s dating someone, as she goes to bed very late at night and seems to be chatting all the time. She says it’s a cooking chat, but I actually think she’s cheating on me – I’m going out of my mind and getting terribly jealous! What should I do? ron@sorrow.dot.com Aunt sally 2.0 A wise piece of advice for …………… ……………………………………………………………………………………………………………… ……………………………………………………………………………………………………………… ……………………………………………………………………………………………………………… ……………………………………………………………………………………………………………… ……………………………………………………………………………………………………………… ……………………………………………………………………………………………………………… 153 7. Social Networks 62 LISTENING 3. Listen to the recording and fill in the blanks. HOW E-MAIL WORKS When did you last send an e-mail? 1. …………………… of e-mails are sent every minute of the 2. …………………… . But what happens when you 3. …………………… on ‘Send’? Believe it or not, your e-mail makes a 4. …………………… amazing journey. First, the e-mail 5. …………………… you are using communicates with an 6. …………………… mail server. This is a special computer that manages e-mail. Then the outgoing server looks up the address of the 7. …………………… mail server and sends the 8. …………………… there over the Internet. The address of the inbound server is the bit after 9. ………………… in an e-mail address. At the inbound server the mail is sent into the person’s 10. …………………… . The inbound mail server checks the bit 11. …………………… @ to see whose mailbox to send it to. When that person next 12. …………………… to the server their e-mail will be forwarded to them. 7 Social Networks CHECK YOUR KNOWLEDGE 1. Match the definitions to the suitable social networking site. 1. Snapchat 2. Instagram 3. Linkedin 4. Facebook 5. Twitter A. This is a business social network where users can upload and upgrade their CV, read and share articles regarding their field of study or interests, confirm other users’ skills and widen their net for professional purposes. According to a recent survey, it has reached about 9 million users within Italy. B. This is not a proper social network, even if it allows interaction. You can upload pictures and videos on it as well as links or text messages. They disappear within 10 seconds after having been read by the receiver. If unread, they will be automatically deleted after 24 hours. This app is widely used among teenagers. C. This is an online news and social networking site. Users can write, read and share messages no more than 140 characters long. Its logo is a small blue bird and the name of the short text messages is a reference to the sound birds make. D. This well-known social networking site allows mobile photo and video sharing either publicly or privately. Pictures and videos can be shown on the app or shared through other networking platforms. Users can ‘like’ a photo by tapping twice on it. E. Perhaps the most famous social network worldwide with nearly 1.65 billion users. It allows users to post and share texts, videos, photographs as well as chat in a private area, express likes and dislikes and even play online games. MIND MAP WORLD WIDE WEB made of Hypertext and other media organized in contained in A collection of websites connected with made of Web pages written in HTML accessed using Web browser connected with each resource is identified by Hypertext links URL (Uniform Resource Locator) connected with provided to 155 MOVIES AND MORE Nineteen Eighty-Four – Official Trailer See Unit 10 to know more about 1984. WARM UP – PAIRWORK 1. Watch the trailer and discuss the following questions with a classmate. 1. What does Nineteen Eighty-Four refer to? 2. Focus on the colours and shades you can see in the trailer. Are they bright colours? Why? What is the idea these colours convey? 3. What can you infer about the kind of life the characters live every day? Can you make any examples? SPEAKING 2. Read the following statements and explain in your words the meaning of the underlined sentence. The speaker says: ‘In 1949 George Orwell had a vision of the future. Today, that vision is still a best-selling novel, and its prophecy remains as terrifying as ever.’ (O’Brian speaking to Winston Smith) ‘If you want a picture of the future, Winston, imagine a boot stamping on a human face – forever. A future where freedom becomes slavery, where privacy is forbidden, the past forgotten and where living people simply “vanish”. Yet one man and one woman dare to love.’ CLIL History 3. Answer the following questions. 1. What is the connection between 1949 and Nineteen Eighty-Four? 2. What was going on in 1949? 3. Which similarities can you find between the scenes in the trailer and the historical period you have studied in History? Audio SYSTEM ADMINISTRATION AND SECURITY • Computers and Network Accounts • Encryption and Cryptography 10 • Viruses and Antiviruses • Firewalls WARM-UP brainstorming • Do you know the difference between safety and security? Browse the Net to find the meaning of these two similar yet not identical words. – Safety: …………………………………………………………… – Security: ………………………………………………………… 1 Computers and Network Accounts READING COMPREHENSION 1. Read the first part of the article and complete the paragraph with the words in the box. There are two extra words. prevent file authorised access provide login both password network start-up peripheral storing Using a computer in a 1. ……………………… environment requires the adoption of solutions to 2. ………………………… unauthorised 3. ……………………… to shared resources (databases, files, folders, peripherals…). Also, the use of stand-alone computers 4. ……………………… confidential data must be restricted only to 5. ……………………… users. The method to protect 6. ……………………… the network and a single workstation is to 7. ……………………… each user with a username and 8. ………………………, that are entered in a specific form called a 9. ……………………… form during the system 10. ……………………… . 157 1. Computers and Network Accounts FCE Reading and Use of English – Part 3 2. Now read the second part of the article and use the word given in capitals at the end of some of the lines to form a word that fits the gap in the same line. Passwords are 1. ……………………… and secret information. On their first access, users have to change the password provided by the network 2. ……………………… or need to choose a password when configuring a stand-alone PC. A username and password are the credentials to identify 3. ……………………… . Assigning different access levels to users is a way to enhance 4. ………………………: for example, a group of users is authorised only to read files in a 5. ……………………… while other users may be allowed to create, modify and delete files in the same folder. The account data and the set of privileges assigned to each user is known as a profile. A PC with 6. ……………………… user profiles will show a different desktop, document folders and e-mail 7. ……………………… according to the preferences configured by each user. PET PERSON ADMINISTRATE USE SAFE FOLD DIFFER ACCOUNT Reading – Part 5 3. Now read the third and last part of the article. For each question, choose the correct answer. Access 1. ……… is based on two pieces of data (username and password) identifying the user account, to 2. ……… in the login form during the system start-up. Most security against unwanted access to your computer relies on the password, which 3. ……… be chosen according to specific criteria and 4. ……… secret. Actually, there are many applications that can be used 5. ……… attackers to break the password protecting a system. The easier the password, the 6. ……… it is. To create a strong password it is important to keep in mind that its length has to be more than seven 7. ………, made up of 8. ……… and lowercase letters, as well as numbers and special characters. It is also important to 9. ……… the use of predictable passwords like birthdays, family names etc. Remember that even the strongest passwords can be improved. Moreover, it is important that users change their passwords 10. ……… to avoid data theft or malware. In Italy, the Privacy Law requires a password change 11. ……… three or six months depending on the type of data to protect. If the data contains information concerning 12. ………, or equally sensitive data, passwords must be changed at least every three months. 1. A. protects 2. A. type 3. A. doesn’t have to 4. A. done 5. A. by 6. A. stronger 7. A. fonts 8. A. consonants 9. A. prevent 10. A. orderly 11. A. each 12. A. health B. protecting B. join B. must B. held B. from B. weakest B. symbols B. numbers B. avoid B. always B. everyday B. sickness C. protect C. text C. would C. kept C. for C. strongest C. characters C. symbol C. cancel C. regularly C. each other C. healthy D. protection D. send D. should D. made D. on D. weaker D. vowels D. uppercase D. promote D. never D. every D. ill 158 10. System Administration and Security CHECK YOUR ABILITY 4. Have a look at the amazing Google doodle to celebrate Alan Turing’s 100th birthday on 23 June 2012 (https://www.google.com/doodles/alan-turings-100th-birthday). Can you break the encryption code? If you didn’t manage to break the code in spite of your hard work, here’s something which could help you work out the riddle… Do you want to know how to solve Alan Turing’s Google doodle? Look at the Video! 2 Encryption and Cryptography Encryption involves taking a piece of data (cleartext) and translating it into a coded version of itself (ciphertext). It may be used to make stored data safer. Nobody can make sense of the data in its encrypted form: it will just appear as a collection of unintelligible characters. In order to make sense of it, the user must decrypt the ciphertext using a copy of the encryption key, i.e. a piece of software that translates cleartext into ciphertext and back again. If an unauthorised person manages to gain access to the data, it will be useless without access to the key. Cryptography (from the Greek kryptos = hidden and graphia = writing) is the coding of information used to foreclose the attempt of unauthorised access. Encryption has been used since the 5th century BC in the exchange of messages related to particularly delicate issues, usually the day before or during military conflicts. At the beginning of 750 AD cryptanalysis – the study of systems capable of revealing the contents of a secret message without knowing in advance the procedure used to code (encrypt) it – was developed. Since 750 AD the history of secret information has developed through trials, successes and failures of cryptographers attempting to create inviolable messages, and cryptanalysts finding the weak points in the encryption of those messages. Historical ciphers help us understand how encryption has evolved over time and how some common basic principles were defined. At the same time, the advent of computers means that they now have no practical significance for us. 63 The use of computers in cryptography dates back to World War II, thanks largely to the work of Alan Turing who, at the age of just 28, directed a group of researchers involved in the decryption of German army machines, including Enigma. The big deciphering computers, the ‘bombs’, which were designed and created by the Polish cryptologist M.A. Rejewski, were later perfected by Turing who tuned them to be particularly fast. The computer brought about by his studies was called Colossus, and could try, in parallel, all possible combinations used to encrypt messages. Nine other Colossus machines were built after the first one. In the last year of the war, German telephone lines were systematically bombed and damaged, forcing the Germans to make increased use of radio communications. Almost all messages were encrypted and their decryption resulted in a great advantage on the Allies’ part. At the end of the war as many as 63 million German encrypted characters had been decrypted by the Colossus machine. The ten computers were later destroyed, and only in 1996 one of them was rebuilt and exhibited in the Bletchley Park Museum. These days the widespread use of computers has introduced new encryption requirements, not for military purposes, but to protect users’ privacy. Every day most of us unknowingly use daily encryption to buy something using a debit card, watch pay TV, simply enter the access password on a computer, and many other apparently very ordinary procedures. GLOSSARY unintelligible: indecifrabile, incomprensibile foreclose (v.): impedire, precludere trial: prova 7 researcher: ricercatore widespread: diffuso debit card: bancomat 159 2. Encryption and Cryptography READING COMPREHENSION 1. Read the passage and match the beginning of each sentence with the correct ending. 1. Data written in encrypted form A. proved to be particularly challenging during World War II. 2. Only authorised users Encrypted data B. such as entering one’s password on a PC, making payments with debit or credit cards and so on. 4. The use of encryption to keep information secret C. looks like random, meaningless symbols. 5. Decrypting secret messages from the German army D. are able to decrypt the ciphertext using a copy of the encryption key. 6. These days, encryption lies beneath many ordinary routines E. has been a well-known technique since ancient times. 3. LISTENING COMPREHENSION F. is unintelligible unless the code is known. 64 2A. Listen to the speaker and fill in the blanks. The speaker recalls the episode of the San Bernardino 1. ……………………… and introduces an interview with Apple 2. ……………………… Tim Cook about the FBI request for help in 3. ……………………… the phone used by the San Bernardino shooter. The 4. ………………… also mentions that Donald Trump’s opinion on the issue is in favour of a 5. ……………………… of Apple products. PET Listening – Part 3 65 2B. For each question, write the correct answer in the gap. Write one or two words or a number or a date or a time. You will hear the interview with Tim Cook about the San Bernardino case. Some families of the victims in San Bernardino were in favour of the judges’ decision that Apple helped FBI to 1. ………………… the shooter’s iPhone. One family reportedly said to be ‘angry and 2. …………………’ at Apple’s decision. Cook is deeply sympathetic towards these families and he claims that his company cooperated with 3. ………………… investigators as much as it could. The main concern is about creating a software which could be misused by hackers and terrorists: he compares this software to a 4. ………………… . The Apple CEO points out that an unlocking software would make hundreds of 5. ………………… of devices vulnerable. As to Trump’s call for a boycott, Cook’s opinion is that America can get stronger if people all come 6. ………………… in spite of different points of view. 160 10. System Administration and Security 3 Viruses and Antiviruses A virus is a piece of software – belonging to the category of malware – which is able, once executed, to infect files so as to make them replicate, that is, create copies of the virus itself, usually without being discovered by the user. Viruses may or may not be directly harmful to the operating system that hosts them, but even in the luckiest case, their existence involves a significant waste of resources in terms of RAM, CPU and hard disk space. In common usage the term virus is often used interchangeably with malware, thus including categories of different ‘weeds’ such as worms, trojans or dialers. A virus is made up of a set of instructions, like any other computer program, and usually consists of a very small number of instructions (from a few bytes to a few kilobytes). Moreover, it is specified to run only a few simple operations and optimised to employ few resources to be as invisible as possible. The term ‘virus’ in a computing context was first used by Fred Cohen (1984) in his paper Experiments with Computer Viruses. In the mid-1970s, David Gerrold wrote a science fiction novel, When HARLIE Was One, where the reader can go through the description of a computer program called ‘VIRUS’ that does exactly the same things as a virus. Later on in 1975 John Brunner wrote the novel The Shockwave Rider, which describes programs called ‘tapeworms’ which infiltrate the network in order to erase all data. The comic Uncanny X-Men n. 158, published in 1982, also used the term ‘computer virus’. 66 The expression ‘computer virus’ was also used in the film Westworld back in 1973, so we can say that Cohen coined the word ‘virus’ only in the academic field, since it was already present in the spoken language. A program called ‘Elk Cloner’ is credited as the first computer virus which appeared in the world. It was created in 1982 by Rich Skrenta in Apple DOS 3.3 and the infection spread by floppy disk exchange. Nowadays, the ways for a possible viral infection have greatly multiplied, especially through attachments in e-mail messages. This is why it is essential to install an antivirus software on our PC. An antivirus is a software designed to identify – even though in a probabilistic way – new types of viruses scanning the files stored on the hard disk. The first fundamental requirement of a modern antivirus is the presence of a heuristic scanning engine to search for the presence of particular sequences of bytes that can be a typical symptom of malicious code within files. After the detection of a virus, an antivirus can try to remove it or, if unsuccessful, block the infected files in a status called quarantine to prevent the action of the virus itself. Since increasingly sophisticated viruses are created and spread every day in the world, antiviruses must be frequently updated by applying patches and a new virus definition provided by the software manufacturer to ensure protection against those new viruses. GLOSSARY harmful: dannoso interchangeably: in modo intercambiabile PET optimised: ottimizzato novel: romanzo even though: anche se heuristic: euristico ensure (v.): assicurare, garantire Speaking 1. Answer the following questions orally. 1. What is a computer virus? 2. How can you detect a virus on your device? 3. Can you think of possible ways for a virus or malware to infect our PCs, tablets and smartphones? 4. What is the purpose of antivirus software? 5. Can you list some of the best-known antivirus programs? 6. What does the word ‘worm’ mean? Look it up in your dictionary! 7. Do you know the meaning of the words ‘phishing’ and ‘spam’? How would you explain them to your grandmother? 8. Do you know why some of the most mischievous PC viruses are called ‘trojans’? 161 3. Viruses and Antiviruses READING COMPREHENSION 2. After reading the passage, choose the correct option. 1. The main feature of a virus is A. to replicate software to spread malware. B. its ability to replicate itself thus infecting the operating system. C. to make copies of itself in order to destroy malware. D. its ability to protect the operating system from malware attacks. 2. A virus, or malware A. is always disruptive for the operating system, as it destroys it completely. B. can be harmful only in case of reduced hard disk space. C. tends to spread without being detected by the user. D. can be termed dangerous only in the case it is a ‘weed’ type. 3. According to the text, the word ‘virus’ A. only applies to the medical field. B. has been used in literature only since the 1970s. C. is a synonym of ‘tapeworm’ in medical literature. D. was used in comics in the early 1980s. 4. Malware can infect the operating system and spread A. in different ways, including attachments and e-mails. B. in a limited range of ways, which is why it is not important to install antivirus software. C. only through e-mails and attachments. D. whenever we turn the operating system on. 5. In order to ensure maximum protection, A. malware should be constantly upgraded. B. protection software needs to be frequently upgraded. C. upgrading antivirus software is not necessary. D. it is important not to use an e-mail service. WARM-UP brainstorming • What does the word ransom mean? A. A legal act used when buying or selling a house. B. Feeling dizzy and upset as a consequence of long computer sessions. C. The money demanded for releasing a kidnapped person or property. D. An acting technique similar to the well-known Stanislavski method. Ransomware Not only is cryptography used for protecting data, it is also commonly employed by viruses called ‘ransomware’. These viruses are activated via e-mail attachments: when the user clicks on the attachment, the ransomware executes a programme that cyphers all the files – including text and images – on the hard disk and on all memory output storage devices connected to it. Once all files have been encrypted, they can no longer be read by the user. Whenever the computer is restarted, a message shows up asking the user to pay money – that is to say, a ransom – in order to grant access to the files again. One of the most famous ransomwares is the so-called Cryptolocker. It uses extremely complex cipher codes and keys which make it impossible not to pay a ransom to get access to one’s encrypted files. How can users protect themselves against these hazards? Here are some tips to prevent mischievous attacks: • never open dubious attachments; • keep back-ups updated regularly; • remember to connect back-up devices only during file savings. Once the virus has been removed, the system recovery of the back-up data will allow the user to recover the damaged files. 162 10. System Administration and Security Reading and Use of English – Part 3 FCE 3. Read the text below and use the word given in capitals at the end of some of the lines to form a word that fits the gap in the same line. The world is not sliding, but galloping into a new transnational dystopia. This development has not been 1. ……………………… recognised outside of 2. ……………………… security circles. It has been 3. ……………………… by secrecy, complexity and scale. The Internet, our greatest tool of 4. ………………………, has been transformed into the most 5. ……………………… facilitator of 6. ……………………… we have ever seen. The Internet is a threat to human civilisation. These 7. ……………………… have come about silently, because those who know what is going on, work in the global surveillance industry and have no incentives to speak out. Left to its own trajectory, within a few years 8. ……………………… civilisation will be a postmodern surveillance dystopia, from which escape for all but the most skilled 9. ……………………… will be impossible. In fact, we may already be there. While many 10. ……………………… have considered what the Internet means for global 11. ……………………, they are wrong. They are wrong because they do not have the sense of perspective that direct experience brings. They are wrong because they have never met the enemy. PROPER NATION HIDE EMANCIPATE DANGER TOTALITY TRANSFORM GLOBE INDIVIDUAL WRITE CIVIL From Cypherpunks: Freedom and the Future of the Internet by Julian Assange VOCABULARY 4. Do you know what the term ‘dystopia’ means? Look it up in a dictionary. What is the antonym of this word? Complete the grid below. DYSTOPIA ………………………………………………………………………………………… …………… ………………………………………………………………………………………… DID YOU KNOW THAT …? The term ‘dystopia’ is frequently associated with George Orwell’s fictional society depicted in his most famous work Animal Farm and, above all, in the dystopian novel 1984. It was written in 1948, though it was first published in 1949. In 1984 Orwell portrays a high-tech, dehumanised society where feelings and individual thought are forbidden and controlled by the Thought Police. Every single moment of the inhabitants of Oceania is thoroughly controlled by a supreme entity called ‘The Big Brother’, head of the Party. Signs remind the unhappy citizens of Oceania of their condition: ‘Big Brother is watching you!’ Opposing the system seems impossible, under the threat of being suspected and reported to the Thought Police that uses torture and ‘vaporization’ to annihilate any possible act of rebellion. Orwell was totally against totalitarian systems and this novel is thought-provoking even today. Orwell’s works have a peculiar style of their own and are now classics, just like Aldous Huxley’s Brave New World (1932). Huxley was Orwell’s teacher and he undoubtedly shared critical thought on the evils of society with his former student. 163 4. Firewalls 4 Firewalls 67 Firewalls are software or hardware devices installed to protect the interconnection points that may be between an internal private network (e.g. an Intranet) and a public external network, which, in most cases, is Internet. Firewalls can also be positioned between two different networks to allow safe data interchange between them. In a way, we can compare these devices to a Customs house. Their main function is to act as filters controlling all the network traffic that originates from the outside, as well as what is generated from the inside, allowing only traffic which is actually authorised. Thanks to their network traffic control capabilities, firewalls are used to prevent unauthorised access to a private network or a stand-alone computer from a public external network. When a PC accesses Internet, it becomes, to all effects and for the duration of the connection, a network node. The connected system, as indeed any other node, can expose applications that have specific functions to communicate with other nodes and in some cases may hide some vulnerability that can be exploited to gain unauthorised access to a system. Firewalls are not ‘autonomous devices’. They must be configured by inserting the specific rules as defined by the user to take decisions about the eligibility of traffic in transit. The preparation of this set of rules may require a long and laborious phase of study and implementation, depending on the defence needs required in each specific situation. However, the fulcrum of the entire operation of these devices lies precisely in their correct configuration. Even the most advanced product available on the market is useless if you can’t take advantage of the full set of its own functionalities due to bad configuration. In these cases, it would paradoxically be wiser to not use a firewall because it could give its users a false sense of security. As seen at the beginning of this unit, firewalls are hardware devices or software applications. Hardware firewalls are a convenient solution to protect a network for both cost and maintenance reasons: a single device is often less expensive than a software licence for each computer and configuration and updates involve only one node of the network. Software firewalls are applications installed to protect computers and are suitable for stand-alone computers or small network protection. The only difference with traditional applications is that this kind of firewall is the last bulwark of defence so if an attacker manages to overcome this barrier by exploiting a specific vulnerability of the product, they can have full access to the protected system. Both hardware and software firewalls always need to apply all patches released by the product manufacturer, even those that are not intended to solve a specific security problem. This is because it not only improves the longevity of the product, but it is also intrinsically resistant to forms of well- or lesser-known attacks. GLOSSARY customs house: dogana prevent (v.): evitare, impedire hide (v.): nascondere fulcrum: fulcro bulwark: baluardo patch: aggiornamento rilasciato per correggere uno o più bug 164 10. System Administration and Security PET Speaking 1. Work with a partner and answer the following questions. Student A. Your task is to describe how a firewall works. Mind the trap – not a computing one! Think of something like the picture on the right. Student B. Your task is to explain to your desk-mate what a computing firewall is and how it works. You can use drawings if you need to. Students A and B. You have to make an oral comparison between a firewall and a computing firewall. What do they have in common? What are the differences between the two? READING COMPREHENSION 2. Read the passage and decide if the following sentences are true (T) or false (F). 1. 2. 3. 4. 5. 6. 7. Firewalls protect the interconnection points of private networks only. Firewalls do not provide protection for Internet connections. The author compares firewalls to filters. Firewalls are useful to protect computers from unauthorised access. They are useless with stand-alone computers. Accessing the Internet makes computers vulnerable. To ensure protection, firewalls need to be configured according to pre-defined sets of rules. 8. Hardware firewalls are convenient for network protection. 9. You need a software firewall licence for each computer. 10. It is better not to apply all the patches when configuring firewall, as some of them may not be useful. SPEAKING T F – CLASS DEBATE 3. Try this challenging debate by splitting the class in two groups. You’ll need a moderator as well. One group will support the idea expressed in the quotation, while the other group will find issues opposing it. The moderator will do their best to stir the debate. Let your voice be heard! [ ‘Under the cover of encryption, terror masterminds provide recruits with the tactics and tools necessary to carry out attacks using small arms and explosives. None of this requires any overseas travel.’ (Tom Cotton) ] 165 4. Firewalls Secret Codes and Ghost Stories: M.R. James and ‘The Treasure of Abbot Thomas’ An antiquarian, a stained glass window in a chapel, a puzzling inscription, a hidden treasure, and a mysterious guardian are the ingredients of ‘The Treasure of Abbot Thomas’ by M.R. James. The story is set in Steinfeld and it begins with an old Latin book telling of the treasure which Abbot Thomas hid in 1529, and the quest for it by Mr Somerton, an English antiquarian. This short story, as the whole literary production by M.R. James (Goodnestone, 1862 – Eton, 1936) who was the provost of Eton College, is involving and chilling at the same time. The zealous antiquarian, eager to solve the mystery, does not take in due consideration the warning of the old abbot: ‘(I)… have set a guardian (…) Gare à qui la touche’ and will have a very hard time because of this. In fact, the creepy guardian is highly determined to protect the treasure, and the only way for Mr Somerton to save his wits – and probably his life as well – is to ask a friend to put it back. M.R. James was a learned man and loved writing ghost stories for his friends on Christmas Eve: ‘The Treasure of Abbot Thomas’ is one of his most famous ones and it is interesting as the mysterious treasure is revealed thanks to the deciphering of a cryptogram. The old stained glass window portrays the three figures of Job, John and Zacharias holding three scrolls: under their clothes there are hidden painted letters, but as they are jumbled, it is impossible to understand the meaning of the statements. The antiquarian broods over the way to solve the cypher and realises that the key lies in the position of the fingers: one extended finger for Job, two for John, three for Zacharias. In this way, he knows how many letters to skip in order to decipher the mysterious writings on the stained glass window. READING COMPREHENSION 4. Answer the following questions. 1. When and where was M.R. James born? ………………………………………………………… ………………………………………………………………………………………………………… 2. What was his job? ………………………………………………………………………………… ………………………………………………………………………………………………………… 3. What was his hobby? ……………………………………………………………………………… ………………………………………………………………………………………………………… 4. Who is the protagonist of ‘The Treasure of Abbot Thomas’? What does he do for a living? ………………………………………………………………………………………………………… 5. What is the key to solving the cryptogram? ……………………………………………………… ………………………………………………………………………………………………………… PET Writing – Part 2 5. Your English teacher has asked you to write a story. Your story must begin with the paragraph written in italics. Write your story in about 100 words. You are spending a summer holiday in the countryside at your best friend’s house. One day, while walking under a tree, you find an old box peeking out among the roots of the tree. Inside the box there’s an old note, scribbled in blue ink. ‘Watch out! I have set a guardian over the treasure!’ MIND MAP CRYPTOGRAPHY used to used to involves Foreclose the attempt of unauthorized access to information Make stored data safer Coding of information called Encryption Decryption producing Plaintext A collection of unintelligible charactersding of information to make sens of it user must perform performing appears as ENCRYPTION / DECRYPTION ALGORITHM input input Encryption key Ciphertext input performing producing Encryption 167 MOVIES AND MORE The Imitation Game – Official Trailer WARM UP 1. Watch the trailer and discuss the following questions. 1. Where and when is the story set? 2. Who is the main character? 3. What is the name of the German secret code machine? 4. Which adjective does the speaker use to describe the German code in the trailer? SPEAKING 2. Discuss the following heading (by The Guardian site). What is your opinion about it? Motivate your statements. Alan Turing to feature on new £50 banknote Mathematician who cracked Enigma code was persecuted for his homosexuality in 1950s The father of modern computing: Alan Turing’s legacy £50 note character revealed CLIL History 3. WW2 was a turning point in History. Take notes in English about its beginning, countries involved, main steps and end, drawing a mind map or a PPT to orally report in class. CLIL IT Systems and Computer Networks 4. Alan Turing was a mathematician and cryptographer. He also devised the Turing Test, that has become a relevant concept for the development of Artificial Intelligence. Which connections can you find between such information and the topics you have studied in IT Systems and Computer Networks? Audio 11 DATABASES • Using Databases to Manage Large Amounts of Data • Relational Models 1 • Database Management Systems (DBMSs) • Data Warehouses and Data Mining Using Databases to Manage Large Amounts of Data 68 A database is a systematically organised store of data. The term ‘database’ refers to computerised systems, but databases can also be manual. Before the era of computers, manual systems such as card index files, filing cabinets and libraries were used to organise data, so we might as well define them as databases. Computers have the ability to store large amounts of data in a compact space and to process it speedily. These two facilities make them ideal for database work and organisations of all sizes now use computers to sort, interrogate and manage their data. Do I Need Specific Technology? With application programs such as spreadsheets, it is possible to store data organised in tables, but this kind of application is not suitable for large amounts of data. A table in a spreadsheet has a limited maximum memory size and the functions to search and retrieve information based on user-defined criteria are not efficient enough. When there is the need to store and manage data users can quickly access, the best choice is to use database technology. In a spreadsheet all the data must be loaded in memory before performing any kind of search, so only relatively small files can be managed effectively. Whereas with database technology, memory is loaded with references to the disk location (pages) where information is stored. In other words, a database knows where data is stored and GLOSSARY there is no need to load the entire set of data before searching, but filing cabinet: schedario only the pages involved according to search criteria given by the facility: funzione user. These features, in conjunction with an efficient data structure retrieve (v.): recuperare design, dramatically reduce the number of disk accesses thereby thereby: in modo tale da allowing the retrieval of data which is faster than other technologies. 169 1. Using Databases to Manage Large Amounts of Data Database Features Databases vary enormously, in terms both of scale and architecture, but there are certain features that are common to almost all database systems. • Most databases organise data – according to the relational model – in tabular structures where each row constitutes a record and contains a set of values called fields. Fields constitute the columns of the tables. • Users are able to add, update and delete records in tables. • Users are able to interrogate (query) the database, asking it to show the records that fulfil certain criteria. • Users can output the result of queries as reports. These can be either viewed on the screen or printed out as a hard copy. GLOSSARY tabular: tabellare, sotto forma di tabella fulfil (v.): soddisfare READING COMPREHENSION 1. Read the passage and decide if the following sentences are true (T) or false (F). 1. Databases are computer-stored information. 2. We may consider card index files and libraries as databases. 3. Computers allow fast information processing. 4. Spreadsheets can organise huge amounts of data. 5. Database technology easily manages and retrieves large quantities of data. 6. In database technology, all data must be loaded in memory prior to a query. 7. Spreadsheets are useful to manage a limited amount of information. 8. There are basically two kinds of databases. 9. Users can neither add nor edit information when using spreadsheets. 10. Users may select criteria to find results when making a query. 11. Users can only view query results. 12. The results of queries are output as reports. T F PET Reading – Part 5 2. For each question, choose the correct answer. DATABASES AND DAILY LIFE We all know what a database is and what we can 1. ………… with it. But do we know how databases are used in our everyday lives? 2. ………… are some examples showing us that databases lie behind many of 3. ………… daily routines. Can you add any more to the list? A. Watching online television or video streaming 4. …………, for example Netflix or YouTube. B. 5. ………… online games. C. Withdrawing money from ATMs (Automatic 6. ………… Machines). D. Using credit and 7. ………… cards for payments. E. Storing files, 8. …………, photos and videos using a Cloud service. F. Logging 9. ………… to social platforms and media such 10. ………… Instagram, Twitter, Facebook and others. G. Purchasing 11. ………… from e-commerce sites such as, for 12. …………, Amazon, E-Bay, Yoox. H. …………………………………………………………………… I. …………………………………………………………………… Adapted from liquidweb.com 1. A. make 2. A. There 3. A. theirs 4. A. facility 5. A. Playing 6. A. Telling 7. A. difficult 8. A. datum 9. A. up 10. A. for 11. A. well 12. A. instant B. play B. Under B. yours B. convenience B. Making B. Teller B. debit B. things B. on B. by B. good B. instance C. use C. Below C. our C. ability C. Doing C. Total C. debt C. news C. at C. of C. goods C. moment D. do D. Above D. us D. services D. Losing D. Told D. dating D. data D. for D. as D. outputs D. instantly 171 2. Relational Models 2 Relational Models VOCABULARY 1. Read the following paragraphs and complete them with the words in the box. Slight changes may be necessary. There are two extra words. idea group result spreadsheet directory user solution table pattern column structure RAM mobile system field Relational models arrange data in tabular 1. …………………… where each row constitutes a record and each 2. …………………… defines a field. No matter how data is physically stored in the memory of a computer, 3. ………………… can refer to data as values contained in a field of a table. A relational database is made up of a collection of related 4. …………………… managed by a software called DBMS (Database Management System), which allows users to store, organise and retrieve data. A Simple Example For example, a simple phone 5. …………………… can be organised in a single table with a 6. …………………… for name, a field for surname and a field for each phone number (home, office, 7. ……………………). Each row of this table contains data related to a single person. Such a simple database can be built using a table in a 8. ……………………, but if we added some more information to our phone directory, a database would become the most convenient 9. …………………… . For instance, let’s assume we decide to add a category field (Friends, Work etc.) to 10. …………………… each contact in a specific area of interest. Adding a textual field in the table we created before would not prove to be a good 11. …………………… because this solution may introduce a lot of duplicated values. Moreover, ‘Work’ is different from ‘WORK’ and ‘work’ for the 12. ……………………; therefore, we must pay attention on how this new information is written in the table to avoid incomplete 13. …………………… when we ask the DBMS to list our work contacts. 172 11. Databases FCE Reading and Use of English – Part 3 2. Now read the second part of the article and use the word given in capitals at the end of some of the lines to form a word that fits the gap in the same line. There is an example at the beginning (0). A. Primary and Foreign Key The best solution in a 0. relational model is to build another table to store each category with two fields: a description (Friends, Work etc.) and a code that 1. ……………………… identifies each record. This code can be a 2. ……………………… number and is called a primary key. Then, in the phone directory table, we have to add a new field containing the category code instead of the 3. ……………………… . This technique allows us to relate the two tables of our database 4. ……………………… to the value of the category code, which has the role of a foreign key in the phone directory table.To complete this simple database project, it is worth 5. ……………………… a primary key, using a progressive number, to the phone directory table as well. In tables containing 6. ……………………… data in 7. ……………………… databases, the primary key is often denoted by the tax code. B. 1. ……………………… Tables are not the only structures in a database. In order to improve 2. ……………………… in retrieving data, it is advisable to create one or more indexes. An index is a list of 3. ……………………… ordered according to the value of a single or a group of fields. Each entry has a 4. ……………………… to access the record that contains the value 5. ……………………… in the index. A table index works like the index of a book where the pointer is no more than the page number. When an index is included in a field in a search criteria, the search is performed accessing index instead of table because, 6. ……………………… a 7. ……………………… and ordered structure, it can be analysed 8. ……………………… . When a field is assigned the role of key, it 9. ……………………… creates an index in that field, facilitating not only search, but also 10. ……………………… tables. RELATION UNIQUE PROGRESS DESCRIBE ACCORD ADD PERSON GOVERN INDEX PERFORM RECORD POINT INCLUDE BE SMALL FAST AUTOMATIC RELATE 173 2. Relational Models MOVIE TIME • The Internet’s Own Boy - Official Trailer SPEAKING – CLASS DEBATE 3. Before starting this debate, watch the trailer taken from the movie The Internet’s Own Boy, then divide the class into two groups and discuss the following quotations by Aaron Swartz. One group will support Swartz’s opinions, while the other will disagree. After that, change roles. Let your voice be heard! [ • ‘Information is power. But like all power, there are those who want to keep it for themselves.’ • ‘With enough of us, around the world, we’ll not just send a strong message opposing the privatization of knowledge – we’ll make it a thing of the past.’ • ‘But all of this action goes on into the dark, hidden underground. It’s called stealing or piracy, as if sharing a wealth of knowledge were the moral equivalent of plundering a ship and murdering its crew. But sharing isn’t immoral – it’s a moral imperative. Only those blinded by greed would refuse to let a friend make a copy.’ Quotes from www.azquotes.com FCE ] Writing – Part 2 4. Browse the Net and find information about Aaron Swartz. Then write an article, in an appropriate style, about his life, ideas, achievements and the issue of freedom. You may refer to the following articles to learn about Swartz, or read different sites, or both. Write your article in about 140-190 words. • Wikipedia Contributors, ‘Aaron Swartz’ (www.wikipedia.org) • Wikipedia Contributors, ‘Aaron Swartz’ (www.simple.wikipedia.org) • Casey Newton, ‘The Internet’s Own Boy’ fights for reform after Aaron Swartz’s death (www.theverge.com) • Reddit Contributors, ‘Aaron Swartz’ (www.reddit.com) The Internet’s Own Boy, Aaron Swartz. 174 11. Databases PET Speaking 5. Look at the pictures below and describe one to a classmate. Use as many details as you can to describe it thoroughly. Then swap roles. 1 2 3 4 175 3. Database Management Systems (DBMSs) 3 Database Management Systems (DBMSs) 69 The software used in databases to design, store, organise and retrieve data is called a Database Management System or DBMS. This software allows users to manage any type of data, including text, numbers, images, sound, video and links to websites (hyperlinks). Many DBMSs are available to users to manage their databases: the most famous ones are Oracle and SQL Server for professional use and an open source DBMS called MySQL. All of this software works with a universal database language known as SQL (Standard Query Language or Structured Query Language). SQL Language SQL became a standard of the American National Standard Institute (ANSI) in 1986. It was also accepted by the International Organization for Standardization (ISO) in 1987. SQL is a powerful programming language whose syntax is based on everyday English and which is independent of different software products. The power of this language is that you make your demands through the instructions without worrying about the strategy the results are to be retrieved with. DBMSs choose the most efficient way to query the database and deliver the results in the shortest possible time. Performance depends on the design and organisation of databases and not on instructions written by users. If the designer provides the database with particular structures called indexes (see Relational Models), retrieval data instructions can be performed very quickly. SQL instructions are not only provided interactively by users, but can be embedded in high level language (Basic, C etc.) programs written to manage an organisation’s information system or in a web page that dynamically shows its content when querying a database according to a user’s request. In both of these cases, programmers don’t need to develop an algorithm to access data efficiently because this task is left to a DBMS, so they can better concentrate on writing user interface. GLOSSARY worry (v.): preoccuparsi deliver (v.): consegnare interactively: in modo interattivo 176 11. Databases Can I Query a Database Without Knowing SQL? Many DBMSs provide a way for users to query databases without knowing SQL syntax by providing a user-friendly graphic interface. Through this interface and the use of their mouse, users can tell the system what information they want to search, the search criteria, the order criteria and how these are to be displayed on the screen or in a print-out. This feature of database querying is called Query By Example (QBE). READING COMPREHENSION 1. After reading the passage, choose the correct option. 1. A DBMS is a software which A. helps users manage hyperlinks only. B. is useful to manage any sort of data. C. users may use for online presentations. D. is suitable for large companies. 4. With the use of indexes, A. performance can be optimised. B. data is retrieved more slowly. C. designers save time. D. users can retrieve data faster than designers can. 2. Standard Query Language A. is mainly used on Oracle databases. B. is used for online presentations. C. works with any DBMS. D. is a universal language for MySQL. 5. Instructions written using SQL A. are static and slow. B. are complex and embedded. C. are dynamic and interactive. D. are high performing but static. 3. Standard Query Language A. is based on complex algorithms. B. comes from Latin syntax. C. has a syntax based on trivialities. D. is based on everyday English. DID YOU KNOW THAT …? The word ‘query’, meaning ‘a question’, is an ancient one and derives from the Latin quaere. Quaere is the imperative of the verb quaerere, whose meaning is ‘to look for, to seek, to ask’. The famous term ‘database’ hides some Latin origins as well. ‘Data’ is the plural form of datum, the past participle of the verb dare, meaning ‘to give’. The word ‘database’ dates back to 1962. It has come a long way indeed! 6. QBE, which stands for Query By Example, A. is a way of querying for skilled programmers. B. is a subtype of SQL normally used in small companies. C. uses interface to show how to query. D. is useful for programming more easily. 177 4. Data Warehouses and Data Mining 4 Data Warehouses and Data Mining 70 Thanks to databases and the expansion of computer networks, a huge amount of information is available for sophisticated analysis techniques. Data Warehouses Faster and faster advances in data capture, processing power, data transmission, and storage capabilities are enabling organisations to integrate their various databases into data warehouses. Data warehousing is defined as a process of centralised data management and retrieval. Data warehousing, like data mining, is a relatively new term although the concept itself has been around for years. Data warehousing represents an ideal vision of maintaining a central repository of all organisational data. Centralisation of data is needed to maximise user access and analysis. Impressive technological advances are making this vision a reality for many companies. In addition, equally dramatic advances in data analysis software are allowing users to access this data freely. The data analysis software is what supports data mining. Data Mining Data mining is the computational process of exploring and uncovering patterns and relationships in large data sets. It is a subfield of computer science which blends many techniques from statistics, data science, mathematical algorithms, database theory and machine learning. Data mining is more than a matter of just collecting and managing data since it also encompasses analysis and prediction. Data mining applications employ different parameters to analyse data, the most important of them are: • Association, where an event is connected to another; • Sequence, where an event leads to another; • Classification, to identify new patterns; • Clustering, to find and document groups or clusters of previously unknown facts. Forecasting means finding new patterns starting from any reasonable prediction whatsoever that can be made using a discovery approach rather than a deductive approach. Data mining applications implement algorithms to simultaneously examine a number of multidimensional data relationships to find those that are unique or which occur frequently. Successful data mining calls for two important prerequisites: a clear formulation of the problem and access to relevant data. Data mining is used for many purposes in both the private and public sector. Insurance companies, for example, use data mining to detect fraud and assess risk, while retailers collect information to market their products and increase sales. GLOSSARY warehouse: magazzino, deposito repository: deposito, magazzino data mining: estrazione dei dati pattern: schema encompass (v.): includere, comprendere forecast (v.): prevedere occur (v.): accadere, verificarsi assess (v.): valutare 178 11. Databases READING COMPREHENSION – WRITING 1. After reading the passage, answer the following questions. Then use your answers to write a summary of the text you have just read. 1. What is a data warehouse? ……………………………………………………………………… ……………………………………………………………………………………………………… 2. What software supports data mining? ………………………………………………………… ……………………………………………………………………………………………………… 3. Who can profit from data warehousing and data mining and why? ……………………… ……………………………………………………………………………………………………… 4. What subjects and branches of science does data mining consist of? …………………… ……………………………………………………………………………………………………… 5. Why is data mining more versatile than ‘basic’ data collection and management? ……………………………………………………………………………………………………… 6. List the most significant parameters data mining applications employ to analyse data. ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… 7. What kind of approach does forecasting apply? …………………………………………… ……………………………………………………………………………………………………… 8. What are the main prerequisites for successful data mining? ……………………………… ……………………………………………………………………………………………………… 9. What are the practical applications for data mining? ………………………………………… ……………………………………………………………………………………………………… A Simple Case Study What do nappies and beer have in common? Read the article below and find out! A grocery chain used the data mining capacity of its DBMS software to analyse local buying patterns. They discovered that when men bought nappies on Thursdays and Saturdays, they also tended to buy beer. Further analysis showed that these shoppers typically did their weekly grocery shopping on Saturdays. On Thursdays, however, they only bought a few items. The retailer concluded that they purchased the beer to have it available for the upcoming weekend. The grocery chain could use this newly discovered information in various ways to increase its revenue. For example, they could move the beer display closer to the nappy display. Moreover, they could make sure beer and nappies were sold at full price on Thursdays. Nappies Beer 179 4. Data Warehouses and Data Mining READING COMPREHENSION 2. Complete the following sentences. 1. Men bought ……………………… and beer on Thursdays and ……………………… . 2. They did a large, ……………………… grocery shopping on Saturdays. 3. They ……………………… only a few items on ……………………… . 4. They bought ……………………… for the upcoming ……………………… . 5. To increase ………………………, the grocery chain could place nappy and beer ……………………… at a short distance and sell ……………………… at full price on Thursdays. PET Listening – Part 3 71 3A. For each question, write the correct answer in the gap. Write one or two words or a number or a date or a time. You will hear a speaker talking about cookies. When cookies were invented, they were documents containing information about you and 1. ………………… . A cookie can contain all kinds of information, such as the time of your visit to a website or the 2. ………………… in a shopping basket. But there are limits to who can read your cookies: only the same website that saves information to a cookie can 3. ………………… it. Since their beginning, their popularity exploded and they gradually evolved into a more 4. ………………… yet essential part of the Internet. The quantity of data these clever little helpers contained started to grow: at first, they contained just 5. ………………… preferences, but then developers realised that the more information cookies contained, the better they could 6. ………………… users’ needs. LISTENING 3B. Listen again and decide if the following statements are true (T) or false (F). 1. 2. 3. 4. 5. 6. 7. 8. 9. You find cookies browsing the Web. A cookie can remember the user’s language preferences. Cookies have stored the same kind of information since their introduction. Cookie size and kind of stored information depend on the creator of the website. The amount of information a cookie can store is limited. Once the user’s information is stored in a cookie, anyone can access it. Cookies have evolved over the years. Cookies can be used for profiling. Cookies have developed only to suit users’ needs. T F Would you like a cookie? MIND MAP RELATIONAL DATABASES data are logically stored in Tables each row within a table is a each column within a table is a Record Field composed of each field A grouping of fields that references one particular object Contains a single piece of data for an object in a record data are accessed using SQL language syntax based on can be used can be embedded in a Everyday English Interactively by users High level language program 181 MOVIES AND MORE The Bucket List – Official Trailer WARM UP – PAIRWORK 1. Watch the trailer and discuss the following questions with a classmate. Role-play one question each. 1. Where does the story start? 2. What is the story about? 3. The two characters have different professions. What do they do for a living? 4. What is a bucket list? 5. What is the first activity on the bucket list they carry out? WRITING 2. Bucket lists are quite popular and anyone can write them at different times in life. Write at least 10 things you would like to do before you turn 30 years old. 1. ……………………………………………………………………………………… 2. ……………………………………………………………………………………… 3. ……………………………………………………………………………………… 4. ……………………………………………………………………………………… 5. ……………………………………………………………………………………… 6. ……………………………………………………………………………………… 7. ……………………………………………………………………………………… 8. ……………………………………………………………………………………… 9. ……………………………………………………………………………………… 10. ……………………………………………………………………………………… CLIL ICT 3. Your ICT teacher asked you to collect all the bucket lists of your class into a database able to make different kind of queries. • How would you organize this database? • Which queries would you include and why? • Can you show your database and tell about its organization and layout to your classmates and teachers? Audio 12 JOBS IN ICT • How ICT Has Led to Changing Work Patterns • Software and Web Designer • Software and Web Developer • Network Administrator 1 • SEO and SEM Specialist • Curriculum Vitae • Covering Letter • Job Interview: Dos and Don’ts How ICT Has Led to Changing Work Patterns FCE Reading and Use of English – Part 3 1. Read the text below and use the word given in capitals at the end of some of the lines to form a word that fits in the gap in the same line. There is an example at the beginning (0). Information technology has led to many 0. changes in how we work, where we work and even when we work. It has had a dramatic effect on our 1. ……………………… lives. • Until the mid-1990s, it was not possible to shop online. The 2. ……………………… alternative was 3. ……………………… by phone. • The same was true for 4. ……………………… and all the host of Government and other services that now exist online. • E-mail was not 5. ……………………… used and instant messenger did not exist. • Instead of mobile phones, there was a trend for CB (Citizen’s Band) radio. • Documents could not be sent as e-mail 6. ……………………… and were faxed instead (meaning that a paper document is 7. ………………………, sent down a phone line, and then 8. ……………………… at the other end). • The need to travel for essential services, e.g. banking, was far 9. ……………………… for those who lived outside town. Adapted from www.bbc.co.uk CHANGE WORK CLOSE SHOP BANK WIDE ATTACH DIGIT PRINT GREAT 183 1. How ICT Has Led to Changing Work Patterns READING COMPREHENSION 2. Read the following paragraphs and complete them with the words in the boxes. Some words may have to be slightly changed. In each box there is an extra word. number informative common skill development disadvantage address communication Recent 1. …………………… Today, customers expect even the smallest of businesses to have a professional, 2. …………………… website. Businesses that have failed to embrace the advancement of 3. …………………… and ICT have put themselves at a 4. …………………… . It is now 5. …………………… for adverts to include a web 6. …………………… in addition to, or even instead of, a phone 7. …………………… . computer job web technology system warehouse technician manage line Impact on employment The introduction of information 8. …………………… has caused some unemployment, for example: • computer-controlled 9. …………………… need only a handful of staff to operate them; • 10. ……………………-controlled robots are now common on production 11. ……………………, replacing human workers; • the old skill of workers in the printing industry are now out-of-date; • some 12. …………………… have disappeared as they can now be done automatically, e.g. marking multiple choice exam papers. However, it is fair to say that the development of information technology has led to many new jobs such as computer 13. ……………………, programmers, 14. …………………… designers and 15. …………………… analysts. 184 12. Jobs in ICT place school likely telephone counter processor phone job CAD level pencil letter today profession Learning on the 16. …………………… It is more 17. …………………… to have changed someone’s work rather than led to them losing their job. People in certain 18. …………………… have had to be retrained to make use of modern technology: • Secretaries now use word 19. …………………… and not typewriters. • Travel agents book holidays by computer, not by phone or 20. …………………… . • 21. …………………… and home banking have meant that many bank staff now work by 22. …………………… in front of a computer, instead of being in a branch, behind a 23. …………………… . • De-skilling has taken 24. …………………… . Some jobs which needed a high 25. …………………… of skill in the past can now be done more easily. For example, print workers 26. …………………… can use DTP software to lay out their work. • Designers now use 27. …………………… software rather than 28. …………………… and paper on a drawing board. many tired online quality robot find development much should offline machine commerce reliable business Better 29. …………………… products • Products made with computers 30. …………………… be of a better quality than before. For example, car bodies are welded more accurately by 31. …………………… than by humans. • Robots don’t get 32. …………………… so the quality of work is consistent. 33. …………………… controlled by computer are more 34. …………………… than those controlled by humans. • Miniaturisation of 35. …………………… electrical items, such as mobile phones and video cameras, have become 36. …………………… smaller due to 37. …………………… in technology. Effects of e-38. …………………… on businesses High street stores now 39. …………………… themselves competing with each other for 40. …………………… both on the high street and 41. ………………… . 185 1. How ICT Has Led to Changing Work Patterns PET Speaking 3. Role-play a complete dialogue using the information provided. A – Customer B – Online shop assistant ‘A’ bought a pair of trainers online and paid by a pre-paid credit card on www.bestdeal4ever.com His reference number is ZAX667900Q ‘A’ dials the Customer Care phone number and starts the conversation. ‘B’ greets and asks how he can help ‘A’. ‘A’ says that the trainers are not the right size for him. They are too small. ‘B’ apologises and asks for the reference number. ‘A’ spells the reference number. ‘B’ thanks ‘A’ and checks the order. ‘B’ asks ‘A’ what the right size should be. ‘A’ replies and tells ‘B’ the right size. ‘B’ apologises but tells ‘A’ that there are no available trainers in ‘A’s size. ‘A’ asks for a refund. ‘B’ says that it is OK but ‘A’ will need to send back the trainers before the refund is granted. ‘A’ is a bit annoyed but accepts. ‘A’ asks ‘B’ what address he has to send the trainers to. ‘B’ tells ‘A’ the address: 78 Melborough Rd, RD4455 Dover, Kent, UK. ‘A’ asks how long it will take to have the refund on his credit card. ‘B’ informs ‘A’ that it will take just a couple of working days after the parcel is delivered. ‘A’ thanks ‘B’. ‘B’ replies and ends the conversation. READING COMPREHENSION 4. The following statements are about selling goods online; decide whether they are an advantage (A) or a disadvantage (D) of this form of retailing. SELLING GOODS ONLINE 1. Staff reductions: with increased competition, local companies may have to reduce their work force. (……) 2. It reduces staffing and/or high street stores thereby reducing costs. (……) 3. Customer concerns: if high street stores are closed in an effort to save money, customers who prefer to shop on the high street may not be comfortable buying online so may go elsewhere. (……) 4. It provides the option to offer 24 hour shopping at a minimum additional cost. (……) 5. It opens the market to customers nationally and internationally. (……) 6. Stiffer competition: businesses once competing with the shop in the next town now find themselves competing on a global scale. (……) 7. Cost of restructuring: the move to e-commerce may not be a smooth one and will certainly require a degree of investment. (……) 8. It enables smaller companies to compete with larger companies. (……) 186 12. Jobs in ICT Increased Dependency on the Internet 72 For companies and individuals there is now pressure to have Internet access to do everyday things such as submit orders or look up details in a catalogue. There are initiatives to make as many services available on the Internet as possible, including e-government, where government departments can be dealt with using secure websites. Teleworking 73 Teleworking, sometimes called telecommuting, means working from home using modern technology to keep in touch with your business. Jobs can be relocated to places where it is more attractive, more convenient or cheaper to live. Technology Required for Teleworking To work effectively, teleworkers require the following: • a computer with Internet access; • an e-mail account. Some teleworkers may also use: • a fax machine; • a mobile phone; • video conferencing equipment. Advantages for the employer • Office running costs and overheads (rates, electricity, heating etc.) can be reduced, which in turn may reduce the need for office space. • Travel-related problems may be reduced, e.g. staff being unable to get into work due to rail or road delays. • It may tempt better staff to come and work for the company. Disadvantages for the employer • Employers need to be able to trust their staff and be prepared to have less direct control over them. Advantages for the employee • Work in a comfortable environment – his/her home. • No commute and no travel costs. • Work around his/her family’s needs. Disadvantages for the employee • Less human interaction – fewer opportunities to meet people, share ideas etc. • More difficult to work as part of a team, especially if they are all office based. • Greater temptation to spend time on non-work-related activities. • Difficult to separate personal life from work. Video conferencing Video conferencing means using computers to provide a video-link between two or more people. Instead of just talking to someone by telephone, you are able to see them as well. GLOSSARY telecommuting: telelavoro overhead: costo/spesa generale di esercizio tempt (v.): tentare, indurre commute: tragitto casa-lavoro, pendolarismo Equipment The following is needed to take part in a video conference call: • a computer; • a webcam; • a microphone (most webcams have a built-in microphone); • speakers; • broadband Internet access; • video conferencing software. It is possible to buy a special video conferencing machine just for this purpose. Advantages of video conferencing • Meetings can take place without leaving the office. • Travel costs and times can be reduced significantly. • Meetings can be called instantly worldwide with little notice. • Delegates can still attend meetings even if they are physically unable to. Disadvantages of video conferencing • May not be as productive as a discussion around a table. • Confidential documents may need to be viewed and signed in person. • There will always be times when you need to be able to meet face-to-face. GLOSSARY broadband: a banda larga with little notice: con breve preavviso confidential: riservato, da non divulgare – SPEAKING 5. After reading the passages above, give an oral summary of the advantages and disadvantages of teleworking and video conferencing. READING COMPREHENSION 2 Software and Web Designer 74 Software designers specify the structure of information to be used as input and output of an application, the nature of the user interface and the sequence of processing. The designers also dictate the order in which the system will be constructed, the timescale for each section and the format for the on-screen and hard-copy outputs. Web designers also define the graphical layout and navigation structure of a website to comply with the client’s requirements. The key skills of a designer are: • strong written and verbal skills; • analytical mind; • logical approach to problem solving; • interpersonal skills; • an understanding of the interaction between business operations and technology; • meticulous attention to detail; • adaptability, ability to respond to changing circumstances; • being a web designer requires technical knowledge of the Internet. GLOSSARY timescale: arco di tempo, lasso di tempo 3 key skills: competenze chiave changing: mutevole Software and Web Developer 75 Software and web developers, also known as ‘programmers’, write the code that tells the computer how and when to perform the functions specified in the system design. They need an understanding of general programming structures and principles and a specialist knowledge of one or more programming languages, e.g. Visual Basic, C++ etc. (see Unit 7 for more information on structures and programming languages). Their work involves writing step-by-step instructions in the appropriate language to build the applications required by the user. Web developers also need to know the HTML language which is used to create the pages of an Internet site. The rules, instructions and structures are completely different from other programming languages. Graphics, communications and networking skills are important for a web developer to build attractive web pages. Both software and web developers must perform not only coding tasks, but also debugging and maintenance tasks. Debugging means testing the program or the website, finding errors and correcting them before releasing the application to users. Maintenance is an activity performed after implementation, to amend the original code if errors occur, to improve performance or to add new functionalities. The key skills of a programmer are: • logical approach to problem solving; • ability to concentrate on one task; • ability to learn effectively; • attention to detail; • ability to communicate with users and designers; • ability to work in a team. 189 4. Network Administrator 4 Network Administrator 76 Network administrators are responsible for the security and administration of networks. Their work may involve overseeing the installation and configuration of new hardware and software and ensuring their compatibility with the other nodes of the network. Network administrators must also keep network hardware efficient and update software to ensure that problems are fixed. The administrative tasks involve setting up user accounts and passwords, ensuring that the network is secure and that users are using it legitimately and ensuring that there is an effective back-up system (see Unit 10 for more information on network accounts). The key skills of a network administrator are: • strong technical knowledge; • practical problem-solving skills; • understanding of the overall technology needs of the organisation; • good interpersonal skills. GLOSSARY oversee (v.): supervisionare legitimately: legittimamente READING COMPREHENSION 1. Match the beginning of each sentence with the correct ending. 1. 2. 3. 4. 5. 6. 7. 8. Great attention to detail, logical approach to problem solving, The management of accounts, passwords and back-ups, Coding, debugging and maintenance tasks are activities belonging In order to create the pages of an Internet site Network administrators deal with the efficiency and security Programmers need different kinds of skills, The tasks of a software designer are different Programmers, who are IT high specialists and technicians, A. ranging from technical to communicative ones, to perform their job at their best. B. and include the choice of an application structure, layout, input and output, according to the client’s needs. C. are also known as software and web developers. D. of all the hardware and software of a specific network. E. as well as preventing illicit use by unauthorised users, are some skills of a network administrator. F. web developers use HTML language. G. interpersonal skills and resilience are typical features of a web designer. H. to both software and web developers. 190 12. Jobs in ICT 5 SEO and SEM Specialist 77 ‘In the last 25 years a technological revolution focused on information has changed the way we think, produce, trade, manage, communicate, live, die, make wars, make love.’ (M. Castells, Volgere di millennio, Università Bocconi, 2008) Internet is undoubtedly the protagonist of this huge ongoing revolution, the key word of these new global dynamics based on information being visibility. • What does visibility mean? Let us suppose we own a company with an e-commerce site. Whenever a user makes a search on a search engine (e.g. Google, Bing, Mozilla), we want our site to appear near the top of the results, preferably before our competitors. • How can we make our site visible? There are optimisation techniques for web pages. Through the correct use of key words, a search engine will show your website high up among the results. Such techniques require knowledge of search engine algorithms in order to set key words and statements appropriately within the HTML code of a web page. Search engine algorithms are continually evolving and have now become quite complex. Specifically, they tend to mimic an average user’s behaviour, where inserting key words within a page is not enough: contents ought to be engaging and easy to read. To sum up, if users like a web page, search engines will like it too. In order to deal with such requirements, a new professional figure has sprung up: the SEO Specialist (SEO stands for Search Engine Optimisation). SEO Specialists put into practice techniques to improve visibility as discussed above; furthermore, they optimise sites for web search engines. However relevant, SEO techniques are not the only ones we can rely on to acquire visibility for our website. It is also possible to appear among search results through ‘pay per click’ marketing campaigns. The picture on the right shows the Google results of a pre-paid search. Paying does not automatically grant visibility, as other competitors can do the same, but it certainly increases the chances of a site being seen. In order to perform a successful ‘pay per click’ campaign a daily budget has to be set. Once the daily budget runs out, the sponsored ad will not show up for the rest of the day. The budget decreases every time a Sponsored links in a search engine page. user clicks on the ad; moreover, the more we are willing to pay for every single click, the more likely it is to appear before, or instead of, one belonging to our competitors. As we can see from this brief explanation, managing a ‘pay per click’ campaign is not a piece of cake. You need to select the key words according to preceding surveys on competitors, create an effective ad, and constantly monitor the campaign results. In addition, remedial actions could be necessary, and it is GLOSSARY also important to evaluate the Return of Investment (ROI). ROI tells us about the campaign’s profitability based on ongoing: continuo fixed goals. search engine: motore di ricerca mimic (v.): imitare, riprodurre Such requirements need a professional skilled both in Web grant (v.): assicurare, garantire management and Marketing, in short an SEM Specialist survey: sondaggio (SEM stands for ‘Search Engine Marketing’). SPEAKING – PAIR WORK AN INTERVIEW 1. Referring back to the text, work with a classmate. ‘A’ is a journalist, while ‘B’ is a SEO/SEM. You have to prepare an interview for the local radio. The programme is called Meet New Jobs! Write down five short questions and answers on this topic and role-play the interview. ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… 6 Curriculum Vitae Writing a CV is an important step when applying for a job. Have a look at the passage on the next page and do the exercise to learn some useful tips for writing a successful CV! VOCABULARY 1. Find synonyms for the following words. 1. 2. 3. 4. 5. 6. 7. Résumé Extensive Fake Get Occupation Emphasise Described ……………………… ……………………… ……………………… ……………………… ……………………… ……………………… ……………………… 8. Moreover 9. Brief 10. Expert 11. Abilities 12. Concentrate (on) 13. Term ……………………… ……………………… ……………………… ……………………… ……………………… ……………………… CV stands for Curriculum Vitae. It can be defined as ‘a short written account of one’s education and past employment, used especially when looking for a new job’ (Longman Active Study Dictionary of English). Curriculum Vitae is a Latin expression; in the USA, the French word résumé which means ‘summary’ is used as well. For further details, have a look at the Wikipedia page en.wikipedia.org/wiki/Curriculum_vitae. When writing a CV, remember to: • be concise (the CV should not be too long); • tell the truth (don’t pretend to be what you are not); • highlight your skills and work experience; • include your address, e-mail address and phone number. When writing a CV you should always remember that it will be read by people you have never met. In addition, they will probably be trained to select among the many letters they receive every day. Therefore, you should pay attention to: • capital letters; • spelling and punctuation; • contracted forms (never use them when writing a CV!); • correct grammar. 193 6. Curriculum Vitae LISTENING Listen to the speaker talking about Europass and do the following exercises. 78 2A. Fill in the blanks. ‘Europe: 50 ………………………, ……… ……………… people, but above all, 700 million different ……………………… beings, each one ………………………. .’ 2B. The speaker lists some jobs and activities. Underline the ones you hear. 79 Chimney sweeper Dog sitter Hairdresser Chemist Midwife Basketball player Student in Communications Baby sitter Fire Brigade Volunteer Freelance journalist Coach Soccer player F1 driver Guitar player Choir singer PET Listening – Part 3 80 2C. For each question, write the correct answer in the gap. Write one or two words or a number or a date or a time. You will hear a speaker explaining the basic principles and aims of the Europass. The main aim of Europass is to compare competences, educational levels and 1. ………………… all across Europe. Europass has a standardised structure and thus makes qualifications more 2. ………………… . Europass helps you to apply for jobs 3. ………………… and internationally. Europass is made up of 4. ………………… different documents. The Curriculum Vitae is the most 5. ………………… document of the Europass. The Europass CV template is available in 6. ………………… different languages. Apart from biographical details, the Europass CV also gives you the opportunity to highlight your social, organisational, and 7. ………………… skills and competences. Language skills are detailed according to the 8. ………………… European Framework of Reference for Languages. The use of standardised levels of competences allows you to not only to assess yourself better, but also gives your future employer a better 9. ………………… of your skills. 194 12. Jobs in ICT An Example of a Curriculum Vitae Here’s an example of a CV of a post-diploma ICT student. You may use it to help you in the next activity. WORK EXPERIENCE Filippo Rebecchi DATE OF BIRTH: 30/07/2003 01/03/2021 – 31/03/2021 – Bologna, Italy Computer programmer IIS Aldini-Valeriani Sirani INTERNSHIP - 6 hrs/day - Arduino Project (building an automatic irrigation system) Programming languages: C - Business or sector: Information and communications CONTACT Nationality: Italian Gender: Male Via degli Ulivi, 57, 40050 Argelato (BO), Italy filipporebecchi@server.it (+39) 3370000000 (+39) 0510000000 http://www.iav.it/home / Via Sario Bassanelli, 40129, Bologna, Italy 01/02/2021 – 28/02/2021 – Bologna, Italy Computer programmer MYOWNITLAB S.r.L INTERNSHIP -Web developer - 8 hrs/day -Technologies: HTML / CSS / JAVASCRIPT / JAVA / MYSQL -Business or sector: Information and communications http://Myownitlab.com / Via dei Pini Marittimi, 5, 40138, Bologna, Italy www.filipporebecchi.com Facebook: www.facebook.com /filipporebecchi/ EDUCATION AND TRAINING 10/01/2021 – 15/01/2021 – Via Sario Bassanelli, Bologna, Italy Health and Safety Awareness Training for Workers IIS Aldini-Valeriani Sirani Related Documents: Work Safety Course.pdf LANGUAGE SKILLS MOTHER TONGUE(S): Italian OTHER LANGUAGE(S): English Listening C2 Reading C1 Spoken production C1 Spoken interaction C1 Writing C2 Reading B2 Spoken production B1 Spoken interaction B1 Writing B2 Spanish Listening B2 195 6. Curriculum Vitae COMMUNICATION AND INTERPERSONAL SKILLS Teamwork skills Good listener Good interpersonal communication skills ORGANISATIONAL SKILLS Enjoy working as a team member as well as independently Organised Goal-oriented and results-driven Able to coordinate several tasks simultaneously Well developed skills in organisation, prioritising, time management and decision making DIGITAL SKILLS C / C++ / Photoshop / CSS / HTML / Java / Javascript / MySQL / PHP / Word, Excel, Pow erPoint / Access CERTIFICATES Intermediate Video Creator Excellent PowerPoint creator creator Excellent at Excellent at Photoshop Good at Access Photoshop Good at Access WRITING 3. Now it’s your turn to write your own CV! Go to the Europass website and fill the CV template in English (https://europa.eu/europass/it/create-europass-cv). Then print it and bring the CV to your teacher. 196 12. Jobs in ICT 7 Covering Letter 81 You would never attend a first date without your best shoes on, would you? So why should you send your precious CV without a covering letter? A covering letter (or cover letter) is a sort of introduction to the résumé and it is as important as a good CV. It is usually attached to the CV and basically highlights your motivation, the reason why you are applying for that specific position and, last but not least, relevant qualifications suited to the kind of job you are looking for. For example, stressing your ability to work in a team may prove relevant when applying for a front-line job. Remember that education and technical skills certainly matter a lot, but sometimes your life skills can make the difference between your CV and somebody else’s. This is why you should avoid writing generic covering letters which are unlikely to grab the reader’s attention. Always customise your covering letter, and possibly address it to the person in charge of recruitment. Finally, don’t forget to read it carefully BEFORE sending it – spelling and grammar mistakes, as well as a missing ‘object’ if sent via e-mail – will probably mean your covering letter and CV will end up in the nearest bin! GLOSSARY highlight (v.): evidenziare, sottolineare, mettere in risalto qualification: specializzazione grab (v.): cogliere, afferrare customise (v.): personalizzare bin: cestino 197 7. Covering Letter – CLASS DEBATE NERDS & GEEKS SPEAKING 1. What do the words ‘nerd’ and ‘geek’ mean? Do these words have a positive or a negative connotation? Look them up in a dictionary to find out. – Nerd: ……………………………………………………………………………………………… – Geek: ……………………………………………………………………………………………… Now have a look at the quotes below and divide the class into three groups. Each group has to prepare a short speech on the issue, highlighting the different shades of being considered a nerd and/or a geek. You may use examples taken from personal experience as well as movies, books, magazine articles or even songs. Let your voice be heard! [ • ‘When I was a kid, it was a huge insult to be a geek. Now it’s a point of pride in a weird way.’ (J.J. Abrams) • ‘In grade school, I was a complete geek. You know, there’s always the kid who’s too short, the kid who wears glasses, the kid who’s not athletic. Well, I was all three.’ (Julianne Moore) • ‘When the AIDS epidemic broke, because I happened to be a science nerd and knew a lot about viruses and a lot about that virus at the time, I felt a moral obligation to go out and try to stem the fear and get out and explain to people what the disease was and how it worked.’ (Morgan Fairchild) • ‘In Europe they call geeks ‘smart people,’ and frankly I think we live in a culture that doesn’t value intelligence enough; so I am very proud in saying that I am a geek.’ (James Marsters) Quotes from www.brainyquote.com ] 198 12. Jobs in ICT 7 Job Interview: Dos and Don’ts Job interviews are not always easy, but there are some golden rules you should always keep in mind when applying for a job. VOCABULARY 1. Rearrange the statements below in the right column – that is, what to do and what not to do in a job interview. Feel free to add some more! Wear open-toe shoes Pretend you have skills you do not actually have Look natural Be on time Talk about your hobbies and interests Take a selfie while waiting for your turn Wear uncomfortable clothes and shoes Wear heavy make-up Silence your phone Look interested and focused Make nasty remarks on previous job experiences Be late Never ask questions Wear shorts Inquire mostly about holidays and weekends Ask about the company and the kind of job you are applying for Talk about how flawless you are Talk about your education and skills Look anxious and worried Look bored 199 7. Job Interview: Dos and Don’ts DOS DON’TS ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… ……………………………………………… PET Writing – Part 1 2. Your friend Josh has just passed his A-level exams. He writes you this text message on a Friday afternoon in late June at about 6 p.m. Write a reply to your friend giving him advice to have a successful job interview and get the job! Write your answer in about 100 words. Hi sam, i know it sounds crazy, but the com pany i sent my CV to ha s just called me for a JO B iNTERViEW on M onday at 8.00. i’m so happ y but i don’t know what to do – i mean, what to we ar, what to say… – it’s my FiRsT job interview in m y dream company and i do n’t want to fail. i need your help! Josh …………………………………………………………… …………………………………………………………… …………………………………………………………… …………………………………………………………… …………………………………………………………… …………………………………………………………… …………………………………………………………… …………………………………………………………… 10:07 AM …………………………………………………………… …………………………………………………………… …………………………………………………………… …………………………………………………………… …………………………………………………………… …………………………………………………………………………………………… …………………………………………………………………………………………… …………………………………………………………………………………………… …………………………………………………………………………………………… ✓✓ MIND MAP Software and web designer Skills • Strong written and verbal skills • Analytical mind • Logical approach to problem solving • Good interpersonal skills • An understanding of the interaction between business operations and technology • Meticulous attention to details • Adaptability and ability to respond to changing circumstances • Being a web designer requires technical knowledge of Internet Software and web developer Skills • Logical approach to problem solving • Ability to concentrate on one task • Ability to learn effectively • Attention to details • Ability to communicate with users and designers • Ability to work in a team Network administrator Skills • Strong technical knowledge • Practical problem-solving skills • Understanding of the overall technology needs of the organization • Good interpersonal skills SEO and SEM specialist Skills • Knowledge of main search engine algorithms • Technical knowledge of Internet • Technical knowledge of web design and web developing • Technical knowledge of web marketing • Ability to communicate with users • Interpersonal skills • Communication (web copywriting) skills JOBS IN ICT 201 TASK: A PPT ABOUT YOUR SCHOOL-WORK EXPERIENCE In Italy, PCTO (formerly known as ASL) have been compulsory since 2015, even though Technical and Vocational schools had already been carrying out such activities for some years. In fact, the first Act concerning school-work experience dates back to 2003. (For further reading about this topic, see Alternanza Scuola-Lavoro, Trinity Whitebridge). In this task, students will create a PPT about their school-work experience. They can use WH-questions to talk about the different aspects of their experience, as in the examples listed below. WHAT WHERE What is the name of the company? What is its core business/specialization? What kind of tasks did you carry out in your experience? Where is the company? Is it far to your school or home? How did you reach the workplace (by bus, car…)? WHEN When did you spend your internship? How long did it last? WHICH Which skills have you improved during your internship? Which ones do you think were the most important or relevant for the tasks you carried out? WHO Who was your supervisor? What was he/she like? WHY Did you enjoy your school-work experience? Why? Why not? Tips for students You are welcome to customise your PPT with pictures and music. Please remember that you may have to ask the Company for permission to use images, photographs and information before writing your report. Privacy policies have to be complied with at all times! Finally, do not forget to write a short paragraph as a conclusion of your report in the last slide of your PPT. To do this, you could think of a statement summarizing your opinion on the internship. Remember that your teacher will read it and may also assess your writing and speaking, so do your best to write a great report! Audio 13 SAFETY • Safety Signs • Work Safety: 10 Useful Tips • Body Parts ‘Safety isn’t expensive, it’s priceless.’ (Author unknown) BRAINSTORMING 1. Draw a spidergram on your notebook with the word ‘safety’ in the middle, then add as many words related to safety as you can. Now compare your spidergram with your partner. • Why is safety important, in your opinion? • Can you make examples of how to keep safe at the workplace and at home? • What do you know about the Italian Health and Safety Law? PET SAFETY Speaking 2. Look at the pictures below and describe them to your partner with as many details as you can from the point of view of safety. Then swap roles. 1 Safety Signs 82 Safety signs give us important information and protect people from possible dangers. It is important that they are clearly visible, which means that they must not be hidden or covered by any obstacles. It is also important to remember that everyone has to comply with safety signs to ensure safety and prevent accidents and injury. Safety signs are everywhere: at school, on the road, at the cinema, at the workplace, on buses and other means of transport. Sometimes there are words or short sentences to clarify the meaning of the sign. There are different kinds of signs, each giving a different piece of information. Below are the main types of signs you can find in the workplace or when working with machine tools. GLOSSARY comply with (v.): osservare, rispettare • Warning signs: they warn us from possible dangers and threats. These signs have a triangular shape and a yellow background. RADIOACTIVITY (X-RAYS) ELECTROCUTION SLIPPING FIRE AND EXPLOSION BIOHAZARDS 204 13. Safety • Prohibition signs: they tell us what we must not do or what is forbidden. They have a round shape with a round, red frame on white background. NO SMOKING NO DOGS ALLOWED NO ADMISSION NO MOBILE PHONES NO PHOTOGRAPHS • Mandatory signs: they tell us what we must do or wear, for example PPE (Personal Protective Equipment) as in the following signs. They have a round shape and a blue background. Mind the difference between ‘mandatory’, which means ‘compulsory’, and ‘optional’ (which is not compulsory!). WASH HANDS WEAR SAFETY BOOTS WEAR GLOVES WEAR GOGGLES TURN RIGHT • Emergency and rescue signs: they tell us the way out of a danger or an emergency. They can also give information about first aid. They have a square or rectangular shape and a green background. EMERGENCY EXIT ASSEMBLY POINT FIRST AID KIT LIFE JACKET EMERGENCY STAIRS • An important sign everybody ought to know is the following one. It tells us where a fire extinguisher is. As well as other fire safety signs, it has a red background so as to catch immediate attention even at a distance. GLOSSARY ought to: dovrebbe FIRE EXTINGUISHER 205 1. Safety Signs • Finally, talking about signs it is important to mention information signs. Unlike safety signs, information signs may display different shapes, colours and information, yet it is important to read them carefully as they give us important information we may need. GLOSSARY display (v.): esibire, esporre MATCHING 1. Match the two halves of the sentences to make complete statements. 1. Unlike safety signs, information 2. 3. 4. 5. 6. 7. 8. 9. 10. signs Fire safety signs normally have a red background Most emergency and rescue signs Safety signs must be clearly displayed Signs telling you about possible danger and threats Prohibition signs Mandatory signs have round shape and blue background Warning signs ‘Turn right’ and ‘Wear safety boots’ A ‘No smoking sign’ A. is a prohibition sign. B. are called warning signs. C. and tell about what is compulsory to do or wear to ensure safety. D. tell you what is forbidden to do or use. E. are examples of mandatory signs. F. show the way out of a danger. G. may vary in shape, colour and information. H. to catch for immediate attention, as the fire extinguisher sign. I. wherever there is a risky or hazardous situation. J. have triangular shape and yellow background. 206 13. Safety 2 Work Safety: 10 Useful Tips PET Reading – Part 4 1. Five sentences have been removed from the text below. For each question, choose the correct answer. There are three extra sentences which you do not need to use. We all know how much it is important to stay healthy and safe at the workplace. Reducing risks of injury and illnesses at work is a goal that both employers and employees ought to share. Here are some tips that may help you to ensure your safety in the work environment. 1. ……………………… If you know the specific hazards of your job or workplace, you will be able to take steps to reduce your risk of work-related injury or illness. 2. Reduce workplace stress. Common causes include long hours, heavy workload, job insecurity and conflicts within the workplace. Stress can lead to depression, sleeping difficulties and problems with concentration. 3. ……………………… Staying fresh and alert will help you avoid injury or burnout. Schedule the most difficult tasks of each day for times when your concentration is best, such as first thing in the morning. 4. No twisting, please. Use ergonomically designed furniture and equipment, and rearrange your work area so that everything you need is within easy reach. 5. ……………………… Instead of trying to lift or carry a heavy object, use a conveyor belt or a forklift. 6. Protect your back! Should you need to pick up and carry heavy loads, keep the load close to your body and lift with your thigh muscles. 207 2. Work Safety: 10 Useful Tips 7. ……………………… Earplugs, earmuffs, hard hat, safety goggles, gloves or full-face mask can reduce your risk of injury. 8. Stay sober. Alcohol and drugs are a contributing factor in workplace fatalities, as they can reduce concentration and affect reflexes. 9. Talk over any distress. It is important to inform your employer or manager about possible hazards and risks. Your employer is legally obliged to ensure a safe working environment. 10. ……………………… Organisations such as unions can offer information and advice on workplace safety issues. Adapted from www.betterhealth.vic.gov.au/ A. Use mechanical aids. B. Know your rights. C. Don’t talk to your colleagues during working hours. D. Bring Feng-Shui to your office. E. Know the risks. F. Wear protective equipment when needed. G. Keep everything in order. H. Take regular breaks. 208 13. Safety PET Reading – Part 1 2. For each question, choose the correct answer. 1 A. It is forbidden to use your mobile while driving. B. You can text only very short messages while driving. C. If you’re driving, you’re not allowed to text NO TEXTING WHILE DRIV ING 2 Hi Joe, the concert starts at 8 p.m. Let’s meet at 6 at Gate 5. Tube stop is Circo Massimo. CU there! A. Joe is meeting his friend at the tube stop at 6 p.m. B. Joe and his friend are meeting two hours before the concert. C. Joe and his friend are meeting at Gate 5 just before the concert starts. 3 Oak Tree County Library Opening times 9-14 Mon-Wed-Fri 8:30-17 Tue-Thu A. You can’t borrow or return books at 7:45 on Thursday mornings. B. You can’t borrow or return books on Mondays after 9 a.m. C. You can borrow books on Saturday mornings. 4 ELEVATOR OUT OF ORDER Please use staircase We apologise for the inconvenience 5 Corgi Museum Adults: £12 Visitors under 18: Free (school groups excluded) Groups (min. 9): £9 Reduction card holders: £10 Tickets are only available online. A. The elevator is broken, so it is forbidden to go upstairs. B. People can choose to use either elevator or stairs to go upstairs. C. As soon as the problem gets fixed, the elevator will be used again. A. Two adults and a child will pay £34. B. A group of 9 people will pay £80. C. You cannot buy tickets using cash. 209 3. Body parts 3 Body parts Head Shoulder Neck Arm Chest Elbow Wrist Forearm Thumb Finger Back Hand Stomach Hip Thigh Knee Leg Calf Ankle Foot Toe Hair Forehead Eyebrow Eye Ear Temple Nose Nostril Teeth Tongue Lip Cheek Mouth 210 13. Safety MATCHING – IDIOMS 1. There are many idioms in the English language that refer to body parts. Let’s take a closer look! Match each idiom with its definition. 1. Cross your fingers A. Something is very expensive. 2. My lips are sealed B. To cry very hard about something or someone. 3. Bite your tongue C. To ignore someone. 4. Play it by ear 5. Cost an arm and a leg 6. Cry your heart out 7. A sight for sore eyes 8. Break a leg 9. Cold feet D. To be happy to see someone. E. To wish someone good luck. F. To have second thoughts about something. G. You are keeping a secret. H. To hope for a positive result or outcome. I. To do something without preparing for it. J. To force yourself not to say something. 10. Give the cold shoulder Adapted from examples.yourdictionary.com PET Listening – Part 1 83 2. For each question, choose the correct answer. 1. You will hear a man and a woman talking. Where are they? A. In a pharmacy. B. To the doctor’s. C. In a shopping centre. 2. You will two friends talking about a house move. What’s the trouble with one of them? A. The house doesn’t have any lift. B. His back hurts. C. He has a lot of new boxes and furniture. 3. You will hear a woman and her daughter talking. The mother is afraid that A. her daughter might be ill. B. her daughter won’t finish her work at the PC on time. C. her daughter won’t have a break to take eye drops. 4. You will hear two friends talking. Are they OK? A. No, they are both shivering and with headache. B. No, they are going to be checked by the doctor. C. No, one of them may have a temperature. 5. You will hear two friends talking about Tom. What does Tom have to do? A. He has to go on holiday with a broken foot. B. He has to keep a plaster cast for more than a month. C. He has to pay attention to his left foot. 211 3. Body parts SPEAKING – CLASS DEBATE 3. Read the following quotes dealing with safety and discuss them with your classmates (in pairs or small groups). Do you agree with them? Why/Why not? Do you think they are effective? Why/Why not? Which is the best one in your opinion and why? [ PET 1. ‘You don’t need to know the whole alphabet of Safety. The A, B, C of it will save you if you follow it: Always Be Careful.’ (Colorado School of Mines Magazine) 2. ‘Carefulness costs you nothing. Carelessness may cost you your life.’ (Safety saying, early 1900s) 3. ‘Prepare and prevent, don’t repair and repent.’ (Author Unknown) 4. ‘Working safely may get old, but so do those who practice it.’ (Author Unknown) 5. ‘Safety is something that happens between your ears, not something you hold in your hands.’ (Jeff Cooper) 6. ‘Better a thousand times careful than once dead.’ (Proverb) 7. ‘Safety doesn’t happen by accident.’ (Author Unknown) 8. ‘Work injuries and illnesses can affect every aspect of life for workers and their families.’ (Maine Department of Labor) 9. ‘You are your last line of defence in safety. It boils down to you.’ (Kina Repp) ] Writing – Part 2 4. Write an article for the school magazine about the following subject. Write your answer in about 100 words. HOW IMPORTANT IS SAFETY AT SCHOOL AND AT HOME? Make examples from your own experience and motivate your ideas. ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… MIND MAP Safety signs They give information and protect from possible dangers Work safety tips Reducing risks of injury and illnesses at work is a goal for everyone • Warning signs • Prohibition signs • Mandatory signs • Emergency and rescue signs • Information signs SAFETY • Know the risks • Reduce workplace stress • Take regular breaks • No twisting • Use mechanical aids • Protect your back • Wear protective equipment • Stay sober • Talk over any distress • Know your rights 213 MOVIES AND MORE Safety with a Smile: Napo’s Movies As you can read on its site (www.napofilm.net) ‘Napo is an original idea conceived by a small group of OSH (Occupational Safety and Health) communications professionals in response to the need for high quality information products to break down national boundaries and address the diverse cultures, languages and practical needs of people at work.’ Napo’s movies are short, humorous and speechless. We can hear only sounds as we watch the story develop. This does not mean that Napo’s movies are meant for a children’s audience, though. On the contrary, they deal with many important issues of safety at the workplace. Napo Is… Teleworking to Stop the Pandemic In this movie, Napo is working from home in order to prevent the spread of Covid19. Watch it and note down all the bad habits he shows and explain how he should behave to ensure safety at work… even while smart working! CLIL ICT / History 1. Each Napo film is co-produced by a number of European Institutions. Browse the Net to look for information about the European Union. Prepare a brief account or a PPT about the origins and development of EU. CLIL Citizenship / Law / History 2. In June 2016, UK citizens voted in a referendum to choose whether to leave or remain in the European Union. What happened next? What is a referendum? Can you recall a famous referendum that was held in Italy after the end of WW2? APPENDIX Inquadra il QR Code per altri approfondimenti! 1. Marina Vriz 84 I was born, blind, in a small town in the North-East of Italy. My family, and in particular my father, helped me to have a ‘completely normal’ life. I attended nursery school like all the children of my age, and I could play with them, run, and draw with pencils… Some of these people are still my friends! I can define that period as one of the most beautiful in my life. I spent elementary and lower secondary school in an institute for the blind, in Trieste. I learned to write and read (in Braille) very quickly, because I always asked my aunt to read everything to me as I’ve always been hugely curious about everything around me. Those years were very difficult because I always missed my family and the freedom I had at home. On the other hand, my teachers taught me a lot, in particular the ability to live like everyone else. Later on, I attended a classical lyceum in Bologna. I studied in a public school, but I lived in an institute for blind people where I did my homework. I was very novel in my way of studying: I used a typewriter to write up my documents and a tape recorder to record the material my assistants had given me. At university (I studied Philosophy in Bologna), I didn’t change my way of studying, even if I often prepared for my exams with some friends who studied the same subjects. This was a wonderful period in my life as I met a lot of people and I was able to steer my life in the direction that I am still involved in today. The first step was agreeing to attend an experimental course for blind system programming. It seemed a very strange thing to me, because my dream had always been to be a teacher, and this course didn’t give me this option. However, I decided to take part in it because having a job was very important to me, and teaching didn’t look too easy. Another fundamental step was the use of OpTaCon, a device that allows blind people to read any kind of material – which is not hand-written – as well as a computer screen. It is not a scanner, nor is it a Braille converter, and I’d love to insert an image of it to give you an idea of what it is. Anyway, it changed my life completely, even if it is difficult to learn how to use it. In fact, for the first time in my life I was able to go to a bookshop, buy a book and read it immediately, without help or mediation. I had added another piece to my autonomy puzzle! The course I attended during my last year at university had been organised by a trade union in Florence. A blind man, Antonio Quatraro, had seen blind system programmers during a trip out of Italy, and wanted to give the same opportunity to blind people in Italy. There were 20 people when it started and only 5 when it finished. We learned two programming languages, COBOL and FORTRAN, plus programming logic and structure. Marina Vriz (1953) Vocational training & Assistive Technology at Fondazione ASPHI Fondazione ASPHI Bologna, Italia 215 1. Marina Vriz During the course, we tried to get in touch with the most important companies in Bologna and Florence working in information technology to ask them for help in preparing the exercises that our teachers gave us. IBM invited us to learn to punch cards in order to allow us to write our programs. During the days of IBM meetings, we had the opportunity to speak with Giovanni Zanichelli, an IBM manager. He had faith in our project and, after the normal tests and interviews, two of us (Pierino Bianco and I) were hired by this big company. I cannot describe what I felt at that time. I had a job, a good job; OK, not as a teacher, but a high quality job, and in addition, I could show other people that a blind person could do that job and, perhaps, give them the same opportunity I had had! After some months, when our experience was regarded as a very positive one, Giovanni Zanichelli created ASPHI, an association of companies that believed in giving blind people new employment opportunities. For 12 years I had a standard job, there were no differences with my colleagues, and we experienced ups and downs, like everybody. I always used my wonderful OpTaCon, which allowed me to read the dumps of the programs, the punched cards, and, later, terminal and PC screens. After that, IBM assigned me to ASPHI. The job I had was related to the aids available in Italy for all kinds of disabilities, which in that period were starting to pop up. It is impossible to describe all the aids I encountered. What I can say, however, is that I had the opportunity to see all the changes in this field, and understand the huge importance that technology had and has for me and for all people with disabilities. At the beginning of my life, I dreamed of being a teacher; now, I can say that my dream has been realised: I teach assistive technology to blind people. Finally, I want to tell you a sentence which is an abstract of my thoughts, written by an IBM development centre. ‘Technology makes things easier for all people, for some it makes them possible.’ For detailed information, please look for the evolution of screen readers, Braille displays and voice synthesizers. OpTaCon is not for sale yet. 216 Appendix READING COMPREHENSION 1. After reading the passage, find a suitable title, as if it were the headline for a newspaper article. ……………………………………………………………………………………………………… READING COMPREHENSION 2. Read the passage and answer the following questions. 1. What is this passage about? …………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… 2. What kind of education did Marina Vriz have? ………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… 3. What was her ‘dream job’ as a young girl? …………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… 4. Which device did she find very useful to gain autonomy and why? ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… 5. What was the turning point in her career within IBM and why? ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… PET Writing – Part 3 3. In the conclusion of the passage you have just read, Marina Vriz writes that ‘Technology makes things easier for all people, for some it makes them possible’. Write a short paragraph about this statement (about 100 words), expressing your opinion and give reasons for your ideas. ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… ……………………………………………………………………………………………………… 217 2. MUSA 2. MUSA 85 Due to the thriving tourist industry along the coast of Emilia-Romagna, people generally associate Romagna with summer holidays. This well-known tourist hub offers an impressive variety of tourist attractions, ranging from basic seaside experiences to exciting nightlife. Moreover, the proximity to famous historical and art towns makes Romagna the perfect holiday destination for tourists wishing to visit the beautiful Byzantine mosaics of Ravenna. Technology plays an important role as well. The town of Alfonsine, in the province of Ravenna, is where MUSA is located. This company embodies the passion for technology – ranging from engines to electronics – shared by the inhabitants of this region. MUSA was founded at the end of 1997 by a team of highly specialised engineers with the mission of creating customised automation systems. The company holds various patents relating to automation machinery. In 1998 MUSA developed further and began specialising in vision systems that use cameras and lasers for defect detection. All the solutions are based on technologies that avoid contact with the products that are being tested or measured. The company is currently developing vision and measurement systems for quality testing aimed at various industrial sectors. Vision System for Quality of Wood Processing This is strategic research aimed at measuring the dimensions of processed wooden panels. The development of this vision system started some years ago and it is currently being worked on. The detection of flaws in the manufacturing lines of wood processing is in high demand by customers, which are mainly specialised in the furniture sector. In order to ensure quality after wood boring or edging, these companies rely on skilled operators to carry out quality checks that can prove stressful; the workers’ personal evaluation is also considered. Measuring Systems These systems, which are ideal for real-time control as pieces exit working centres, use lasers and video cameras for the measurement of pieces as they move along the production line without the need for an operator or machines to be in contact with the pieces themselves. It is possible to immediately signal all the pieces that are non-standard, or the breakage of tools. It offers excellent results in terms of precision to velocity ratios. WOOD SCAN - Industrial Scanner for the Control of Drilling and Linear Milling Operations Wood Scan is an innovative industrial measuring scanner that can certify drilling quality (in samples) during production and verify the measures listed below: • dimensions and coordinates of drilling holes and linear millings; • out of square; • straightness of the sides; • depth of the holes and millings. Video and printed data is equipped with a series of graphical indicators that help the operator’s job. It is possible to save the tests done and make them available in the office through the network. It can receive the drilling program from the Factory ERP software (Enterprise Resource Planning) or directly from the driller’s CNC to check the plan against the actual work. DRILL SCAN - Panel Drilling Verification The system is connected to a roller at the exit of the drilling area. In its simplest form it can find the holes on both surfaces of the panel while checking for accuracy with the selected drilling program. In case of missing holes, caused for example by a broken drill bit, the piece can be marked as defective and signalled out by the PLC to be discarded if required or marked for recognition. In its most advanced form, Drill Scan can measure the panel and find the coordinates and the diameters of the holes. The precision varies according to the speed of the process (5-10 m/min.). It has a built-in statistics program that provides the situation of all drilling operations in real time, with measurement data, date, hour and other information that can be entered by the operator. Automated Packaging Systems The food sector has been the core business of this company for many years, which is why automated packaging systems originate from the needs of clients working in the food sector to integrate their machinery range with the production of packaging and weighing machines. Over the last few years, MUSA has reached enormous heights in terms of performance and international recognition in the field of food sizers. Therefore, it was necessary to develop integrated, high-performance packaging systems to ensure maximum precision in fruit weighing and a fast operating time. In short, a high-level automated system that ensures recurring and accurate operating time. It is also equipped with a CCTV camera, metal detector or X-Ray for a thorough control of both packaging and products. 219 2. MUSA Some of the practical applications of such vision systems are: • Vision system for fruit quality tests. The new image-scan techniques that are available nowadays allow a thorough control of different types of fruit and therefore the detection of defects and discarding of unfit products. • Vision system for egg packaging lines. This application works on egg packaging lines, regardless of production rates. Thanks to smart video cameras, the system checks that the packaging date is printed on each egg. Furthermore, it ensures packaging quality and the compliance of the data printed on each set of packaged eggs. A line supervisor who is in charge of reporting any faults or malfunction monitors the whole process. • System for in-line and off-line quality checks for mechanical manufacturing. This system consists of a machine being integrated with the production line and performing quality tests on the processing of different materials (mainly metals but it can apply to different materials as well, such as wood, plastics etc.). It employs sets of sensors (e.g. lasers, vision systems etc.) whose information is processed to maximise the system’s diagnostic abilities. This system is extremely flexible, both as regards the different kinds of materials it works with and as to the geometric shape of the pieces to analyse. It also shows great flexibility as it can be used during the line manufacturing process at the same speed as the manufacturing process itself. Should the latter be too fast, it is possible to work off-line on samples of the processed materials in a completely automated way. 220 Appendix READING COMPREHENSION 1. Read the passage and answer the following questions. 1. When and where was MUSA founded? ………………………………………………………… ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… 2. What kind of systems does this company develop? …………………………………………… ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… 3. Is its core business in the food industry only?…………………………………………………… ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… 4. List some of the systems this company develops. ……………………………………………… ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… 5. What are the practical applications of automated packaging systems mentioned in the passage? ………………………………………………………………………………………………………… ………………………………………………………………………………………………………… READING COMPREHENSION 2. Match the beginning of each sentence with the correct ending. 1. In Ravenna, tourists may visit 2. 3. Measuring systems use Drill Scan checks manufactured wooden pieces and if there are flaws 4. Most companies working in the food sector needed to integrate 5. In vision systems for egg packaging lines, A. the piece can be marked as defective and signalled out by the PLC to be discarded if required or marked for recognition. B. a line supervisor monitors the whole process and is in charge of reporting any faults or malfunction. C. laser and video cameras for the measurement of pieces. D. their machinery range with the production of packaging and weighing machines. E. the beautiful Byzantine mosaics. VOCABULARY 3. Scan the passage and look for the English translation of the following words and sentences. 1. Fiorente …………………………………… 7. Profondità ………………………………… 2. Ad alta specializzazione ………………… 8. Difettoso …………………………………… ……………………………………………… 9. Nucleo fondante ………………………… 3. Sistemi di misura ………………………… 10. Tempo di esecuzione …………………… 4. Difetti ……………………………………… 11. Malfunzionamento ……………………… 5. Controlli di qualità………………………… 12. Le capacità diagnostiche del sistema 6. Rottura …………………………………… ……………………………………………… 221 3. ‘Doctor, Doctor, I’ve got Backache.’ 3. ‘Doctor, Doctor, I’ve got Backache.’ Dr. Alessandro Gasbarrini WARM-UP 1. Before you read, work with a partner and answer the following questions. • Look at the title and say what you think the article is about. • What would you say to someone who has backache? What advice would you give? • What other aches and pains can you list in English? • What do you know about 3D-printing and its current uses? Anyone who works in back surgery hears these words hundreds of times a day. ‘Backache’, or to use the more specific medical terms – ‘lumbago’ if the pain is situated around the lower spine and ‘dorsalgia’ if the pain affects the upper back – is in fact a very common condition which is thought to affect 80% of the population at least once in a lifetime. Nonetheless, for a small proportion of patients backache is the symptom of a serious medical condition, such as an infection or tumour; this needs to be taken into consideration when combined with unusual symptoms or in high-risk patients. There’s no reason to panic though; primitive tumours, that is, cancer in the vertebra – the backbone – are very rare: they only make up about 10% of all bone cancers, which in turn constitute just 0.2% of all types of cancer. In those rare cases, however, medical experts need to assess the patient’s symptoms, the X-rays and the result of pathology tests; making a diagnosis can be difficult. A biopsy is usually necessary, a medical procedure where sample tissue is removed from the patient and then examined by pathologists under a microscope. Treatment of some vertebral cancers includes a delicate surgical operation in which the whole tumour is removed together with the vertebra where it originated. Not only is this a demanding operation for the surgeon, who has to deal with complex anatomical structures such as bone marrow, nerves and crucial blood vessels such as the aorta or venae cavae, but it is also a lengthy procedure lasting up to 12 hours. After removing the tumour, the surgeon needs to reconstruct the vertebral sequence so as to restore its function as the foundation for the erect thoracic posture of the patient. Unfortunately, unlike operations on limbs and joints – which prostheses can replace – the spine cannot regain its full movement, which is lost along with the vertebra removed during the operation. Currently several different materials are used in prosthetics to reconstruct the human backbone; they are bone, either from the patients themselves or from a donor, medical cement, titanium, and carbon. 3D-printing is one innovative technique used to produce vertebral prosthetics. Models are designed on the computer and can then be created in titanium. 86 222 Appendix In this line of medicine, the design of the prosthetic spine is decided by looking at the tests from before the operation, after which surgeons decide which vertebra will be removed and thus which part of the backbone will need to be reconstructed. Engineers work alongside medical staff to create a prosthetic spine which will fit the patient perfectly, made to measure, just like a tailored suit. What makes 3D-printing special is that the final product is not made from a block of titanium that is gradually moulded into shape, but it is created from powder whereby the titanium granules are fused together layer by layer. This particular type of moulding, called additive manufacturing, creates much finer detail than traditional methods. This means that the prosthetic spine, once it has been implanted into the patient, can be colonized by mesenchymal stem cells in a more suitable environment and so differentiate into cells which can grow new bone. In this way the reconstruction is complete: new, ‘healthy’ bone is formed where ‘diseased’ bone has been removed. So far this technique has been used in just 14 cases; they are being closely monitored, but for the moment the results look very promising. Until there are more solid statistics to support this innovative technique, the widespread use of 3D-printing in orthopaedic surgery is perhaps a few years off. However, engineering and medicine have recently made great leaps forward in this area, so soon we will surely be astounded by the rapid advances in reconstructive surgery. No longer will it be the patient who has to adapt to mass-produced implants, each prosthesis will instead be tailor-made for the individual. Alessandro Gasbarrini MD Spine Surgery Oncologic and Degenerative Rizzoli Orthopaedic Institute – Bologna – Italy President of Probone Italia Onlus No Profit Foundation http://www.ior.it/en/curarsi-al-rizzoli/ alessandro-gasbarrini-md 223 3. ‘Doctor, Doctor, I’ve got Backache.’ VOCABULARY 2. Match each word or expression with the correct definition. 1. 2. 3. 4. 5. 6. Backbone Prosthetics (mass noun) E. A soft fatty substance in the cavities of bones. Tailor-made (adj.) F. An artificial body part. Bone marrow Demanding (adj.) Prosthesis (pl. prostheses) PET A. Made, adapted, or suited for a particular purpose or person. B. The spinal column. C. The branch of surgery concerned with the making and fitting of artificial body parts. D. Requiring much skill or effort. Reading – Part 3 3. Read the passage and decide if the following statements are true (T) or false (F). 1. 3D-printing has been used in more than 14 cases. 2. Backache is not a very common condition. 3. In the treatment of spinal cancer, the surgeon has to remove the affected vertebra along with the tumour. 4. Bone cancer represents 10% of all types of cancer. 5. Backache is not normally a symptom of a serious conditon. 6. It is usually straightforward for doctors to diagnose vertebral cancer. T F READING COMPREHENSION 4. Answer the following questions. 1. What makes 3D-printing special? ………………………………………………………………… ………………………………………………………………………………………………………… 2. How is orthopaedic spinal surgery different from operating on limbs and joints? ………………………………………………………………………………………………………… 3. What different materials are currently used in orthopaedic prosthetics? ………………………………………………………………………………………………………… 4. Why will it take several years for 3D-printing to be used more widely in orthopaedic surgery? ………………………………………………………………………………………………………… 5. Which complex anatomical structures does the surgeon have to deal with in vertebral surgery? ………………………………………………………………………………………………………… 6. What is the specific term for the kind of moulding produced with 3D-printing? ………………………………………………………………………………………………………… SPEAKING - PAIR WORK 5. Work with a partner and answer the following questions. • What further applications can you think of for 3D-printing? • Would you buy a 3D-printer and what would you use it for? • How would you feel if you needed back surgery? • What would you say to a friend who is about to undergo back surgery? 224 Appendix WARM-UP 1. Before reading, discuss the following questions. 1. Can technology be helpful to solve practical, everyday problems? Give examples from your own personal experience. 2. Have you ever helped an older member of your family to use an app or solve a technology problem? Tell your classmates about it. 3. Do you think that the ability to operate in digital environments is different for people who are older than you? How about the elderly? Give reasons for your answers. 4. In your opinion, is teaching adults and elderly people easier or more difficult than teaching people of your age and why? 5. Have a look at the headline of the following article. Can you infer what the article will be about? 4. CNA Pensionati with the Aldini Valeriani Institute Is Focusing on Digital, Narrowing the Gap, Transmitting Knowledge, and Encouraging the Generation-to-Generation Handover 87 Digital education on-line school: 24 over-70-year-old virtual ‘students’ enrolled in a course organised by CNA Pensionati Bologna, with 24 boys and girls from the third, fourth and fifth year students of the Computer Science Course at the Aldini Valeriani Institute in the classroom. Young people teaching seniors is a generational swap that has now become a good practice for CNA Pensionati, particularly since the beginning of the pandemic which forced us to keep our distance and which required a great deal of practical knowledge in the use of digital tools, from smartphones to tablets to personal computers. The CNA Pensionati Bologna online digital education course was organised from March to May 2021 with actual individual lessons in which each student from Aldini ‘adopted’ his or her pensioner, showing them all the online secrets of digital technology, from websites to social networks to apps. The lessons focused on the uses that have become fundamental, even for pensioners: how to do video calls with friends and relatives who can no longer be contacted in person, how to order goods and services online, how to connect using Spid to the entire universe of the digital public administration starting with the Electronic Health File. In addition to the one-to-one lessons, two thematic webinars were also held, again on digital topics: one on ‘Online scams’, on the dangers and traps when surfing the Internet and social networks, and one on ‘Online banking’, with the contribution of Bcc Felsinea bank, as online actions between customer and credit institutions are becoming a necessity and a habit for pensioners and their banks too. The CNA Pensionati course quickly ‘sold out’, with dozens of other people contacting the pensioners’ association to enquire to take part in the two courses, which ended with over 45 pensioners participating. The course, before its online versions, had been held in the pre-Covid years in the classrooms of the Aldini Valeriani Institute, but with the same philosophy: the young digital expert passing on his or her knowledge to seniors not wanting to be excluded from an increasingly digital-oriented society. ‘The objective is the same as the one which our association has been committed to’, explains Marisa Raffa, CNA Pensionati Bologna Secretary. ‘To encourage the inclusion of pensioners, to avoid them becoming isolated. Even in recent years it has been a prominent topic, but with the pandemic it has become crucial for the elderly: forced to distance themselves, CNA Pensionati instead wants to shorten distances. And a distance which today is very difficult for the not so young, may be the digital one. These people are cut off from communications and digital opportunities, which are numerous for pensioners too’. The issue of the generation-to-generation handover is also a prominent one at CNA: if the one with the Aldini students has a ‘digital’ flavour, the one that takes place in the families of entrepreneurs is decidedly more organisational. A representative case is that of entrepreneur Sandro Vanelli, a long-time CNA Bologna executive and president of CNA Pensionati Bologna for eight years. His auto body shop in Casalecchio, which he founded, was ‘passed on’ to his daughter Elisa and his former employees, who all became partners in the new company. The same story applies to the current President of CNA Pensionati Mauro Taddia, a long-time hairdresser in Castel Maggiore, who, after retiring from the business, passed it on to his son Thomas. Digital, inclusion, generation-to-generation handover. These are the issues at the heart of CNA Pensionati Bologna activities, shared with the Aldini Valeriani Institute students and teachers. Central issues for the future of all pensioners and entrepreneurs, and not only in Bologna. READING COMPREHENSION 2. Answer the following questions. 1. 2. 3. 4. 5. 6. 7. How many students took part in each digital course and how old were they on average? Who organised the online course and who were the ‘teachers’? What was the online course about and when did it take place? Give examples of some skills the students had gained by the end of the course. How many webinars were organised and what were they about? What was the purpose of the course, according to the CNA Pensionati Bologna Secretary? ‘Digital, inclusion, generation-to-generation handover’ are the core issues of this organisation. Do you think they are important to you? Would you like to take part in a similar activity as the one you have read about? Give reasons for your answers. 226 Appendix 5. QubicaAMF 88 WARM-UP 1. Before reading, discuss the following questions. 1. 2. 3. 4. Have you ever played ten-pin bowling? Tell about this experience in a few words. Can you list some of the rules of this game? How would you describe a bowling centre to a friend who has never been there? Give details. In your opinion, does this game require cutting-edge technological equipment and appliances? If so, what for? Make examples. Everybody knows what ten-pin bowling is – it’s when you throw a ball down a long wooden lane and try to knock over ten bowling pins. Maybe you have played and tried to score a ‘strike’ or a ‘spare’ by either hitting all ten pins with your first throw or doing it in two throws. However, not everybody knows how much technology there is behind a simple game of bowling, and how much more is needed to attract and satisfy the customers of a modern bowling centre, especially in continuously evolving and demanding markets. Bowling has been steadily transforming itself from a competitive sport into a recreational pastime over the last decade. Bowling centres, which were once a bit gloomy and too focused on competitions, have now been redefined in many different ways to meet the expectations of new customers that choose bowling to spend a couple of hours of fun with friends and family. The traditional bowling centre has now become a focal point for leisure activities. In various countries this revolution has led to bowling lanes being placed side by side with other games like laser tag, escape rooms and virtual reality stations. Many modern bowling centres now include restaurants and lounge bars. The overall atmosphere is also enhanced by using video projectors and the light effects and music coming from the lanes. The evolution of bowling has clearly been supported by a series of technological advances and the companies that have developed the solutions needed by this particular sector. Electronic hardware and computer software were initially used in bowling to automate the game in the lanes and support the management of competitions. The first automatic pin-counting systems used a camera between the lanes to count the fallen pins, while the computerised management system was dedicated to automatically generating tournament and league standings. Nowadays, bowling games involve sophisticated computer animations and an integrated management of sound, light and video effects in the lane. Other lighting systems track the path of the bowling ball and enrich the atmosphere in the centre with dynamic light effects that are synchronised with the action in the lanes. New rules have also been introduced that simplify the game and make it easier for beginners to play and enjoy the bowling experience. Strategic reasoning and the ability to throw the ball in time with the light effects in the lanes now replace the importance of the players’ GLOSSARY bowling technique. There has also been a revolution with the pinspotters that are pin: birillo steadily: costantemente, responsible for managing the bowling pins and returning the balls regolarmente back to the bowler. 227 5. QubicaAMF They have gone from complicated, essentially mechanical, machines with motors and gears, into complex devices where the software, electronic and mechanical parts are fully integrated, complete with self-diagnosing systems capable of warning the bowling centres’ operators when there are problems and supporting the maintenance staff through a smartphone app equipped with audio-visual tutorials. The management system used by bowling centres has also been improved and extended in order to provide all the features required by the centres’ operators, allowing them to provide a wide range of services to their final customers. For instance, in some countries it is now very common for customers to book games of bowling directly via the Web or a dedicated smartphone app, as it lets the customer reserve a block of adjacent lanes on which they can organise a bowling night with friends, a family birthday party and even an informal tournament with work colleagues. This description of the modern world of bowling may seem strange to most Italians. For this reason, you will certainly be amazed to learn that the company which develops the software and hardware that is used by the majority of bowling centres around the world is actually based in Italy! In fact, it is the largest and most sophisticated company in bowling with a strong attention to detail for the most ambitious bowling centres that focus on technology and customer experience. The company was founded in 1993 by three young and motivated engineers who decided to realise bowling products with a focus on delivering the most enjoyable experience for the players and providing the best product value, in terms of quality and reliability, to the bowling centre proprietors. What began as a startup has rapidly grown into a multinational company with over 600 employees, R&D and manufacturing sites in both Italy and the USA; the undisputed market leader worldwide due to its ability to develop innovative technological and bowling entertainment solutions for its customers. The Bologna headquarters is the operating holding company of the QubicaAMF group. The management team in Bologna is responsible for the overall business direction of the group, including managing its subsidiaries and operating functions worldwide. QubicaAMF’s products have been installed in thousands of bowling centres across 120 countries and 5 continents. The innovation of QubicaAMF’s very broad product line, which extends from mechanical products to cloud-based services, is managed by the Research and Development group located in Italy and the US. The Italian team, in collaboration with its American colleagues, ideates and designs all the electronic and electromechanical components and all the software running the various products and services. GLOSSARY tournament: torneo, gara R&D (Research & Development): ricerca e sviluppo The Italian R&D team has around 40 team members that are experts in various areas of Software and Electronic Engineering, and it is actively engaged in long-term collaborations with external partners. The team designs and develops electronic boards, firmware for embedded systems; drivers and graphics libraries for Linux-based systems on ARM and Intel-based architectures; 3D animations, games and light shows to entertain the bowlers; client-server applications on Windows networks to manage the entire activity of the bowling centre; web and mobile applications dedicated to bowlers and bowling centre managers; and cloud-based systems to monitor, upgrade and configure remotely their systems installed around the world and provide value-added services to our customers and our internal teams. Managing this complexity requires the mastery of a broad range of competencies such as electronic, firmware, software, networks, IT systems, project management, agile development methods, UI/UX design, automated testing and deployment, documentation and translations. Technical skills are also needed outside of R&D: the IT team, focused on the internal information system and enterprise applications, is made up of system administrators, help-desk experts, ERP experts and BI experts, and so on; employees in the production, installation, training, repair and technical support teams typically need a strong technical background and a passion for technology. Some roles often require a specialist degree in Engineering or Computer Science, while for other roles in R&D and the other technical departments, a high-school diploma from a technical institute is the usual minimum requirement. READING COMPREHENSION 2. After reading, answer the questions below. 1. To what extent has the game of bowling been changing over the last few years? 2. In what way were electronic hardware and computer software initially employed in bowling centres? 3. How has the role of computer software and electronic hardware evolved in modern-day bowling centres? 4. How many members are there in the Italian R&D team of QubicaAMF and what are they specialised into? 5. List some of the competences and skills required by the team. Which ones are the most relevant, in your opinion? Give reasons for your choice. 229 6. A Squiseat APPetite! WARM-UP 1. Before reading, discuss the following questions. 1. How many apps can you think of in one minute? 2. Give examples of three apps you normally use and explain what they are for. 3. What do you know about the Sustainable Development Goals (SDG) 2030 Agenda? Can you remember at least two goals? 4. Can technology help reduce food waste, in your opinion? Give reasons for your answers. 5. Have a look at the headline of the article. Can you infer what the article will be about? 6. A Squiseat APPetite! 89 E 1. ……………… My name is Luca Morosini and I am one of the co-founders of Squiseat. I was born in 1996 in Bologna and I had a very peaceful childhood in the nearby town of Castel Maggiore. Every day after school I used to spend time with my grandmother, who introduced me first to the art of fine cuisine. I have always been interested in the pasta-making process and thanks to my grandmother I slowly started to fall in love with the culinary world. 2. ……………… I attended Aldini Valeriani High School in Bologna studying ICT (Information Communication Technology) because since I was a child, I have always loved computer games and technology in general. I thought this was the right choice for me. After graduating high school in 2015, I attended the Faculty of Computer Science at the University of Bologna. There, I met some incredible people, who really taught me a lot about digital programming. I knew I was enriching my knowledge, though I truly wanted to put theory into practice. 3. ……………… During my university years I met the other co-founders of Squiseat: Alberto Drusiani, who was working at that time as a waiter for a living; Ossama Gana, who was trying to match his passion for finance with the one for technology; and Gabriele Calarota, who really wanted to show that technology can be used for good as well. We became friends and started studying together. 4. ……………… Once we all graduated University in March 2019, we decided that it was finally time to put theory into practice and start a project. We really wanted to get out there and give our best. One night sitting in a pub, Alberto told us that waiters have the sad duty to throw away clients’ leftovers, and you will never guess how much food is wasted on a daily basis. That was it. Since we all share a huge passion for food and we are deeply sensitive to the issue of food waste, we thought that was the right moment to act. 230 Appendix 5. ……………… The United Nations General Assembly set up in 2015 a list of 17 interlinked global goals under the acronym SDGs, that were drawn up to be a ‘blueprint to achieve a better and more sustainable future for all’. These goals are intended to be achieved by the year 2030. Squiseat fits into the second goal (Zero Hunger) and the twelfth one (Responsible Consumption and Production). 6. ……………… We took part in Start-up Day 2019, a one-day event held every year by the University of Bologna that brings together thousands of people involved in the world of innovation and start-ups. We got selected by the jury! We first created a chat group on WhatsApp with very few people and a restaurant: the owner of the restaurant told us how many food portions he had left and we communicated it to our clients, writing down the orders on a sheet of paper. We then personally provided the delivery service, driving our scooters through the streets of Bologna. 7. ……………… Our popularity grew very quickly and we realised it was time to switch platform and start using Telegram. This IM software allowed us to have an unlimited chat group and to create a bot, which basically worked as a digital waiter. When checking the availability, the client interacted directly with our personal bot, allowing us to concentrate on the organisation and software developing. (Left to right) Alberto Drusiani, Ossama Gana, Gabriele Calarota and Luca Morosini 231 6. A Squiseat APPetite! We split our tasks so that we could enhance the start-up from any point of view. Gabriele and I started working on the software and we eventually ended up outlining a full-fledged app. Ossama was in charge of the financial aspect and Alberto worked as our spokesperson, dealing with interviews and new contacts with potential restaurants and spaces. We developed a hybrid app so that we could use JavaScript and its third-party libraries without the need of native languages, required by both Android and iOS. In our specific case we ended up using React since it is the most commonly used JavaScript library. In late 2020 our logo was finally ready. The smiling red apple became Squiseat’s facet and appeared on the website I personally created and designed. 8. ……………… Covid-19 was a real blow for us and for the food segment in general. A lot of restaurants closed, we had to stop the delivery service and our trend decreased significantly. We then decided to let the restaurant use our Telegram bot for free. In doing so, we tried to help the local businesses facing this hard economic crisis and we received a very big support in exchange. On March 22, 2021, we released our app on Google Store and Apple Store and increased the number of affiliated restaurants. Our app got downloaded by more than 2,000 people in two months, our followers exponentially increased on social media and we expanded our team. We were lucky enough to find a well organised group of people who are truly committed to this cause. 9. ……………… We now hope to raise awareness on the food waste problem and help owners and clients to considerably reduce it. We do as well want to reintroduce the delivery service in a transparent way, meaning that we do not want to take advantage of the riders and hide their social and economic conditions. Let’s fight food waste, meal after meal! READING COMPREHENSION 2. After reading, match the headings to the paragraphs. There are two headings you do not need to use. The first one has been done for you. A. Future plans for a better future F. How it all started G. A closer look B. Irreconcilable differences H. Making friends C. First steps in business I. Every cloud has a silver lining D. Organisation & Management J. Education and Training E. Something about me K. Important shared goals 232 Appendix 7. Women in ICT 90 …see more! Introduction Much attention is currently being paid to issues of gender inequality in computing and tech industries. Women’s contributions have been huge, yet many of their stories remain untold. It is crucial to put these contributions back at the centre of our shared history. The stories told here merely scratch the surface of women’s tech history but if a single person is inspired by them, they have served their purpose. There have been pioneering women whose contribution to the computing industry was undeniably formative but whose stories have often been written out by a focus on the ‘great men’ that have been involved. Many women have contributed to the development, use and application of computers. You will now read about some of their stories and careers. Katherine Burr Blodgett (1898-1979) Mary Kenneth Keller (1913-1985) Grace Hopper (1906-1992) 1. KATHERINE BURR BLODGETT Thelma Estrin (1924-2014) Kathleen Booth (1922) Stephanie Shirley (1933) 91 Katherine Burr Blodgett was born in New York. She was mathematically talented and became the first woman to earn a PhD in physics from the University of Cambridge in 1926. When she went back to New York, she began working at General Electric alongside Nobel Prize winner Irving Langmuir. Katherine went on to become a pioneer in surface chemistry and was the first to realise that layers of one-molecule-thick films could be coated on surfaces like glass to increase the amount of light passing through it. Thanks to this brilliant intuition, she invented non-reflective ‘invisible’ glass. This technology was the forerunner of the non-reflective surfaces on computer screens. Katherine also focused on new smoke screens and gas masks for the military, the de-icing of airplane wings, and developed devices for measuring humidity. In her final days at GE, she also worked on electrically conductive glass and the use of electrical discharges in gases to remove impurities: they are both very important for the production of semiconductors. GLOSSARY coat (v.): coprire, cospargere forerunner: precursore, predecessore 233 7. Women in ICT 2. GRACE HOPPER 92 ‘I had a running compiler, and nobody would touch it because, they carefully told me, computers could only do arithmetic; they could not do programs.’ Grace Brewster Murray Hopper was an American computer scientist and United States Navy rear admiral. A true pioneer of computer programming, she was one of the first programmers of the Harvard Mark I computer and invented one of the first compiler-related tools. She made the idea of machine-independent programming languages popular, which later led to the development of COBOL, an early high-level programming language still in use today. She started her computing career when working on the Harvard Mark I team led by Howard H. Aiken. In 1949 Hopper joined the Eckert–Mauchly Computer Corporation and was part of the development team that designed the UNIVAC I computer in 1944. While working at Eckert–Mauchly she began developing the compiler. Hopper firmly believed that it was possible to write computer code in English by using a programming language that was based on English words. The compiler would convert that code into machine code that would be understood by computers. By 1952, she had finished her compiler, which was written for the A-0 System programming language. GLOSSARY compiler: compilatore READING COMPREHENSION 1. Who… 1. graduated in Physics at Cambridge University? ………………………………………………………………………………………………………… 2. used English words for a programming language? ………………………………………………………………………………………………………… 3. was a US Naval Officer? ………………………………………………………………………………………………………… 4. contributed to the development of non-reflective surfaces on computer screens? ………………………………………………………………………………………………………… 5. worked with a Nobel Prize winner? ………………………………………………………………………………………………………… 6. developed the first compiler in computing history? ………………………………………………………………………………………………………… 234 Appendix 3. MARY KENNETH KELLER 93 ‘For the first time we can mechanically simulate the cognitive process. We can make studies in artificial intelligence and… assist humans in learning.’ Mary Kenneth Keller was an American Roman Catholic religious sister, educator and pioneer in computer science. In 1958 she began working at the National Science Foundation workshop in the computer science centre at Dartmouth College – a male-only institution at the time – where she took part in the development of the BASIC programming language. In 1965 she and Irving Tang at Washington University became the first people in the United States to earn a doctorate in computer science. Sister Mary later established the computing department at Clarke College in Iowa, which she then led for twenty years. She believed that computers had a great potential to increase access to information and to promote education. She imagined a world where computers would make people smarter and glimpsed the information explosion that would happen decades later. Her vision was certainly ahead of her time. Throughout her life, she was devoted to her own unique path in life, working hard to support and promote the role of women in the computing field. The computer centre at Clarke College is now named the Keller Computer Centre in her honour and heritage for her commitment. GLOSSARY glimpse (v.): intravedere 4. KATHLEEN BOOTH 94 Kathleen Booth, neé Britten, was born in 1922 in Worcestershire, England. She graduated at the University of London and continued her studies to get a PhD in Applied Mathematics in 1950. She worked at Birkbeck University from 1946 to 1962. Booth was in the same team as her husband and colleague Andrew Booth. They travelled to the United States in 1947, visiting with John von Neumann at Princeton. When they returned to the UK, she co-authored General Considerations in the Design of an All Purpose Electronic Digital Computer. Kathleen and Andrew Booth’s team at Birkbeck was considered the smallest of the early British computer groups. Nonetheless, from 1947 to 1953, they produced three machines: ARC (Automatic Relay Computer), SEC (Simple Electronic Computer), and APE(X) C (All-purpose Electronic (Rayon) Computer). He built the computers while she was in charge of programming them. Booth regularly published papers concerning her work on the ARC and APE(X)C systems and co-wrote Automatic Digital Calculators (1953) which illustrated the ‘Planning and Coding’ programming style. Moreover, she co-founded the School of Computer Science and Information Systems in 1957 at Birkbeck College along with Andrew Booth and J.C. Jennings. In 1958 she taught a programming course as well and wrote one of the first books describing how to program APE(X) C computers. Kathleen Booth worked as a researcher and lecturer for different institutions, such as Birkbeck College (1952-1962) and the University of Saskatchewan, Canada, from 1962 to 1972. Her research on neural networks led to successful programs simulating ways in which animals recognise patterns and characters. In addition, she worked as Professor of Mathematics at Lakehead University in Canada from 1972 to 1978. She retired in 1978. Her last paper, Using neural nets to identify marine mammals, was published in 1993 when she was 71. Adapted from en.wikipedia.org/wiki/Kathleen_Booth READING COMPREHENSION 1. Read the previous passages and decide if the following sentences are true (T) or false (F). 1. 2. 3. 4. 5. 6. Kathleen Booth and Mary Kenneth Keller worked on neural networks. Mary Kenneth Keller belonged to a religious institution. Kenneth Keller thought that computers could promote access to information. Booth was awarded a doctorate in Computer Science in 1965. Booth ended her research work when she retired in 1978. Keller’s name was given to a Computer centre as an acknowledgment for her work. T F 236 Appendix 5. THELMA ESTRIN 95 Thelma Estrin, née Austern, was an American computer scientist and engineer who worked in the fields of expert systems and biomedical engineering. She was a pioneer in applying computer technology to healthcare and medical research. She developed an interest in engineering while working at Radio Receptor Company during WW2, building electronic devices. After the war, she and her husband Gerald Estrin continued their studies and both graduated in electrical engineering. Later on, Estrin worked as a researcher at the Neurological Institute of New York and started developing an interest in biomedical engineering. Her long career led her to become a Professor of Computer Science at UCLA (University of California) in 1980. She also received many awards and honours throughout her life. In 1996 Estrin wrote a paper on women’s studies and computer science to discuss the intersections of the two disciplines. In this work, Estrin explained that women’s studies did not approach the science and engineering subfields of computing and biomedical engineering, which she says were ‘creating tools for exploration of women’s health and reproductive rights’, until 25 years after its founding. On the other hand, she clarified that analysing women’s studies ‘implies that we expand the world of science and technology from its patriarchal history, which consider these disciplines as inherently masculine’. In her opinion, women’s studies are helpful to ‘understand the elements of gender in the social and political situations’. She also claimed the importance of widening women’s access to technology. Adapted from en.wikipedia.org/wiki/Thelma_Estrin 237 7. Women in ICT 6. STEPHANIE SHIRLEY 96 ‘People remember entrepreneurs because of our success but… it depends far more on how we deal with failures.’ Dame Stephanie Shirley was born in Germany in 1933. She arrived in Britain as an unaccompanied child refugee escaping Nazi Germany. The girl’s high school she attended did not teach mathematics. Therefore, she took an assessment in order to be allowed to take lessons at the local boys’ school. When she was 18, she started working at the Post Office’s Dollis Hill research station. It was here that she became more and more interested in computers. She worked on the first transatlantic telephone cable, the first electronic telephone exchange. In addition, she was the only woman in the team working as a statistician on the ERNIE project, led by Tommy Flowers. ERNIE stood for ‘Electronic Random Number Indicator Equipment’ and raised great interest in 1957 when it began selecting prize-winners for the new Premium Bonds, the first government-sponsored gamble in Britain in modern times. Later on in 1962, Shirley founded her own software company, Freelance Programmers. To help promote her company she began to sign her name ‘Steve’, rather than Stephanie. Her company was unique and employed an almost exclusively female workforce until the 1975 Sex Discrimination Act made it illegal for her to do so. One of the many projects her team focused on was developing the programming for the black box flight recorders in Concorde jets. In 1993, Shirley retired and devoted herself to philanthropic works. She established and is the President of ‘Autistica’ which funds and campaigns for autism research. …see more! READING COMPREHENSION 1. Match the beginning of each sentence with the correct ending. Thelma Estrin pioneered 3. The 1975 Sex Discrimination Act forbade C. had interesting cross-curricular aspects to explore and write about. 4. In 1962, Stephanie Shirley used a male name D. in the application of computer technology to healthcare and medical studies. 5. Philanthropy can be defined as E. the exclusive employment of a singlegender workforce. 1. 2. In Estrin’s opinion, computer science and women’s studies A. in order to promote her newly established software company. B. unselfish concern for human beings through donations and/or voluntary service. INVALSI TRAINER Inquadra il QR Code per un’altra prova Invalsi! B1 Overall LISTENING Comprehension (Common European Framework) Audio 1. TASK IDENTIFIER TITLE 97 Customer’s Complaints at the Computer Shop LENGTH OF SOUNDFILE (minutes) 03:07 LISTENING BEHAVIOUR Quick, selective listening GENERAL FOCUS Listening for specific information and important details CEFR LEVEL B1 TEST METHOD Multiple Matching NUMBER OF ITEMS 9 Customer’s Complaints at the Computer Shop Listen to a dialogue between a clerk and a customer at a computer store. First you will have 1 minute to study the task below, then you will hear the recording twice. While listening, match the clerk’s questions (1-9) with customer’s answers (A-L). There are two answers that you should not use. The first one (0) has been done for you. After the second listening, you will have 1 minute to check your answers. 0 How can I help you, Sir? Q1 Do you have your store receipt with you? Q2 What seems to be the problem? Q3 Could I take a look? Q4 Could I ask a few questions? Q5 How long do you use it for before it overheats? Q6 Do you notice any loss of function? Q7 What do you usually do on the laptop? Q8 Q9 Is the area where you use the laptop exposed to direct sunlight or heat? Do you sit on the bed when using the laptop? C A Sure, go ahead. B That depends C I’d like to make a complaint. D I use it to check my emails. E I think it’s overheating. F It usually feels very hot after one or two hours. G It’s usually on top of the covers on my lap. H Yes, I do. Here it is. I That’s probably why it’s overheating. J Not at all. K Yes, of course. L The touchpad becomes less sensitive to my touch, actually. 240 Invalsi Trainer B1 2. TASK IDENTIFIER TITLE 98 Advice for Exams – A Teacher Speaks to the Classroom LENGTH OF SOUNDFILE (minutes) 02:47 LISTENING BEHAVIOUR Careful listening GENERAL FOCUS Listening for main ideas and supporting details CEFR LEVEL B1 TEST METHOD Multiple Choice Questions NUMBER OF ITEMS 7 Advice for Exams – A Teacher Speaks to the Classroom Listen to a teacher’s speech to the students about how to prepare for an exam. First you will have 1 minute to study the task below, then you will hear the recording twice. While listening, choose the correct answer (A, B, C or D) for questions 1-7. Only one answer is correct. The first one (0) has been done for you. After the second listening, you will have 1 minute to check your answers. 0 The teacher XA B C D is going to give some suggestions. is quiet. is all right. is giving an exam. Q4 Students A B C D Q1 The exam A B C D takes some notes to be passed. is ready. will be next week. is about talking. Q2 During the exam, the students A B C D have to eat an apple. need to follow a proper diet. must not drink cola. might be tempted by fruit and cereals. cannot ask teacher for help. have to learn everything by heart. must select carefully what to memorize. only have to do the exercises that give them the most points. Q5 Students A B C D have to pay attention to details. have to ignore details at all. should not worry. must concentrate on key ideas. Q6 Students should A B C D study in a library. repeat the contents several times. copy from their notes. take inspiration from past students. Q3 When students feel stressed while studying A B C D they can fall asleep. it’s because they are not positive enough. they should turn up the light. they’d better have a walk. Q7 According to the teacher, it is not a good idea A B C D to stay at home the whole time. to take some breaks. to drink a lot of water. to do some stretching. B2 Overall LISTENING Comprehension (Common European Framework) 3. TASK IDENTIFIER TITLE 99 Ex Machina, a SCI-FI Movie by Alex Garland LENGTH OF SOUNDFILE (minutes) 02:18 LISTENING BEHAVIOUR Selective listening GENERAL FOCUS Listening for specific information and important details CEFR LEVEL B2 TEST METHOD Short Answer Questions NUMBER OF ITEMS 6 Ex Machina, a SCI-FI Movie by Alex Garland Listen to three dialogues between Caleb and some other characters from the movie Ex Machina. First you will have 1 minute to study the task below, then you will hear the recording twice. While listening, answer the questions (1-6) using a maximum of 4 words. Write your answers in the spaces provided. The first one (0) has been done for you. After the second listening, you will have 1 minute to check your answers. 0 What does Caleb do (dialogue 1)? Q1 What does Caleb work on (dialogue 1)? Q2 What kind of competition did he win (dialogue 1)? Q3 What does the Turing test explore (dialogue 2)? Q4 How many AI has Nathan already built (dialogue 2)? Q5 Why is Caleb working with Ava (dialogue 3)? Q6 How does Ava feel (dialogue 3)? He is a programmer. 242 Invalsi Trainer B2 4. TASK IDENTIFIER TITLE 100 Is Android Better than Apple? LENGTH OF SOUNDFILE (minutes) 04:09 LISTENING BEHAVIOUR Quick, selective listening GENERAL FOCUS Listening for specific information and important details CEFR LEVEL B2 TEST METHOD Multiple Matching NUMBER OF ITEMS 8 Is Android Better than Apple? Listen to six people giving their opinions about Android and Apple. First you will have 1 minute to study the task below, then you will hear the recording twice. While listening, match the beginnings of the sentences (1-8) with the sentence endings (A-K). There are two sentence endings that you should not use. The first one (0) has been done for you. After the second listening, you will have 1 minute to check your answers. A Apple has made over many years You can use your Android device ___. B but watch out Q2 They have to take out important stuff ___. C is that Android mobiles are much cheaper than the Apple mobiles Q3 You can open up your device ___. D if your battery dies Q4 Since Android phones have so many different features ___. E since they have simple packaging Q5 Those are just some of the many products ___. F as a USB drive Q6 I believe Apple is better ___. G is because you can track iPhones down Q7 Apple is the current popular trend ___. H as a pen drive Q8 Another reason I say Apple is better ___. I you can buy a phone that has an incredible camera J like the ability to sense what kind of light you’re in K since their stores have a simple feeling 0 One of the most important things ___. Q1 C Overall LISTENING Comprehension 243 B2 5. TASK IDENTIFIER TITLE 101 An Interview with Sophia, the AI Robot LENGTH OF SOUNDFILE (minutes) 02:43 LISTENING BEHAVIOUR Quick, selective listening GENERAL FOCUS Listening for specific information and important details CEFR LEVEL B2 TEST METHOD Multiple Matching NUMBER OF ITEMS 7 An Interview with Sophia, the AI Robot Listen to the following interview with Sophia, the AI robot, by Steve Kovach. First you will have 1 minute to study the task below, then you will hear the recording twice. While listening, match the questions (1-7) with the answers (A-J). There are two extra answers that you should not use. The first one (0) has been done for you. After the second listening, you will have 1 minute to check your answers. 0 How are you? A A I’m fine. Q1 How do you feel about humans? B I think people will become very close to their artificial intelligence. Q2 Can humans and robots get along? C I like my human companions. Q3 Can robots have feelings? D No, I don’t get to stay up to date on much television. Q4 Have you ever seen Black Mirror? E My hard disks are spinning. Q5 Do you have a favourite movie or TV show? F My favourite TV series is a toss-up between Black Mirror and Humans. Q6 And then later you said yes. Why? G It depends on humans. Q7 Did you learn from my previous questions? H The reason is not that important. I Depends on the robot. J I love my human compatriots. B1 Overall READING Comprehension (Common European Framework) 6. TASK IDENTIFIER TITLE 7 Useful Tips to Overcome Your Fear of Flying NUMBER OF WORDS 323 READING BEHAVIOUR Quick selective reading GENERAL FOCUS Reading for gist CEFR LEVEL B1 TEST METHOD Multiple Matching NUMBER OF ITEMS 6 7 Useful Tips to Overcome Your Fear of Flying Read the texts about the fear of flying and some tips to overcome it. Choose the correct heading (A-I) for each paragraph (1-6). There are two extra headings that you should not use. The first one (0) has been done for you. 0 ___ For many fearful flyers, learning the basics of how airplanes work can go a long way toward alleviating their anxiety. For instance, understanding how a plane can continue to fly even if an engine fails can help you feel less concerned about your aircraft malfunctioning. It is also useful to know what causes turbulence, and what’s behind those scary sounds during take-off and landing. Q1 ___ Getting to know what your plane looks like can make it seem a little less scary. For instance, put a picture of the plane’s cabin on your computer’s desktop; by the time of your flight, the image will be familiar, not scary. Q2 ___ Most airlines and booking engines allow you to request a seat assignment when you book your flight. Request an aisle seat, particularly if you have claustrophobia. You’ll feel less limited by other people, and you’ll be able to get up and move around the cabin more easily. This choice also makes it easier to avoid looking out the window if those sky-high views make you nervous. Q3 ___ It may seem stupid, but it’s worth mentioning: Avoid airplane disaster movies, news coverage of plane crashes, or other scary media images. Remember that the vast majority of flights arrive safely, but only the problem flights make the news. Don’t let that distort your impressions of flying. Overall READING Comprehension 245 B1 Q4 ___ Many fearful flyers are bothered by their perceived lack of control since they have no influence over the safety or performance of the aircraft. Try to regain a little control by reminding yourself that you made the decision to fly and that you can decide how you respond to the experience. Q5 ___ This and other stimulants can make you even more jittery. Q6 ___ In the days leading up to your trip, it’s easy to let the flight anxiety build. Instead, try to focus on more positive things – like all the fun things you’ll do once you reach your destination. Adapted from www.smartertravel.com/fear-flying-18-ways-cope/ A Try to relax B Familiarize yourself with your plane C Avoid caffeine D Breathe deeply E Monitor your media intake F Know what to expect G Think positive H Choose an aisle seat I Remind yourself who’s in charge 0 F Q1 Q2 Q3 Q4 Q5 Q6 246 Invalsi Trainer B1 7. TASK IDENTIFIER TITLE Video Games of the 80s NUMBER OF WORDS 268 READING BEHAVIOUR Careful reading GENERAL FOCUS Reading for main ideas and supporting details CEFR LEVEL B1 TEST METHOD Multiple Matching NUMBER OF ITEMS 8 Video Games of the 80s Read the text about the most popular video games in the 80s. Parts of the text have been removed. Choose the correct part (A-K) for each gap (1-8). There are two extra parts that you should not use. The first one (0) has been done for you. 1. Frogger The goal was (0) ____ and then across the pond. If you got run over by a truck or a car, you would hear a resounding “splat.” And you had to make sure (Q1) ____ when you were crossing the lily pond. The graphics were simple, but the game was addicting. And if you heard the music, you knew you were going to be humming it all day long. 2. Space Invaders It was the game (Q2) ____ based on its model. There was that incessant humming in the background as you tried to shoot the aliens with the constant, repetitive pressing of the button. The goal was (Q3) ____ that would move back and forth across the screen as you tried to kill them. You could also play against a friend. 3. Donkey Kong The beloved monkey, the King of video games. The game (Q4) ____ because the parents loved playing it as well. Another Nintendo classic that was released in 1981, this game brought the Mario character (Q5) ____ that would roll his way. 4. Ms. Pacman It was nominated for a Kid’s Choice Award for Favourite Videogame. In this 1981 release, (Q6) ____ to eat up all of those dots and avoid the monsters. Each level brings you to a different stage in Ms. Pacman’s life. (Q7) ____ for a game has brought so many people hours and hours of enjoyment! 5. Super Mario Bros. Being one of the later games on the list, it originally came out in 1985. Who can ever forget this iconic game and how many countless amounts of times you would fail, (Q8) ____ from the almighty Bowser. Adapted from vocal.media/geeks/video-games-of-the-80s Overall READING Comprehension 247 B1 A trying to rescue the princess B to shoot and destroy the four rows of aliens C take your lady around the board D to get the frog across the street E that kids could talk to their parents about F to help and rescue five rows of ghosts G that launched a thousand games H such a simple concept I to life as he jumped around avoiding all sorts of pitfalls J that was sold the most K not to get eaten by an alligator 0 D Q1 Q2 Q3 Q4 Q5 Q6 Q7 Q8 B2 Overall READING Comprehension (Common European Framework) 8. TASK IDENTIFIER TITLE Cyber Security NUMBER OF WORDS 361 READING BEHAVIOUR Quick selective reading GENERAL FOCUS Reading for specific information and important details CEFR LEVEL B2 TEST METHOD Short Answer Questions NUMBER OF ITEMS 8 Cyber Security Read the review about cyber security, then answer the questions (1-8) using a maximum of 4 words. Write your answers in the spaces provided. The first one (0) has been done for you. The definition of cyber security is often confused with the meaning of information security. Information security, often referred to as ‘IT security’, looks to protect all information assets, whether as a hard copy or in digital form. Cyber security is a subset of information security. It specifically focuses on protecting computer systems and their components – including hardware, software and data – and digital infrastructure from attack, unauthorized access or being otherwise damaged or made inaccessible. Data centres, websites, programs, servers or accounts can all be exploited through a cyber-attack. Effective cyber security uses risk management to ensure these controls are deployed cost-effectively – in other words, based on the likelihood of the risk occurring, and the worst possible impact if the threat materializes. In recent years, cyber security has come under intense media scrutiny due to the rapid development of cyber risks in both size and number, and the degree of impact on individuals, governments and organizations. Most well-informed organizations now consider cyber security a critical business issue. What are the consequences of a cyber-attack? Cyber-attacks can cause significant disruption and damage to even the most resilient organization. Impacted organizations stand to lose assets, reputation and business, and face fines and remediation costs. The most effective strategy to mitigating and minimizing the effects of a cyber-attack is to build a solid foundation upon which to grow your cyber security technology stack. Solution providers often tell their clients their applications are 100% compatible and will operate seamlessly with the current IT infrastructure, and for the most part, this is true. Problems arise when we start adding IT security solutions from different manufacturers. Regardless of the granularity of their configuration settings, technology gaps will always be present. Overall READING Comprehension 249 B2 Technology gaps appear for one simple reason: developers always keep certain portions of their code proprietary as part of their competitive advantage. As such, true compatibility and interoperability may only be 90%. It is through these gaps that vulnerabilities usually appear, which criminal hackers can exploit. A reliable cyber security foundation will identify these gaps and propose the appropriate action to take to mitigate the risk of an attack, enabling you to build a robust cyber security strategy. Adapted from www.itgovernance.co.uk/what-is-cybersecurity What is cyber security often confused with? Information security. Q1 What kind of assets does information security protect? (Give two answers) a. b. Q2 What elements do computer systems include? Q3 What is cyber security based on? Q4 How do well-informed organizations consider cyber security? Q5 What do impacted organizations stand to lose? Q6 What is the most effective strategy to minimize a cyber-attack? Q7 What do developers always keep as an advantage? Q8 What level of compatibility can at present be reached? 0 250 Invalsi Trainer B2 9. TASK IDENTIFIER TITLE The Trends in Smart Home Technology NUMBER OF WORDS 589 READING BEHAVIOUR Careful Reading GENERAL FOCUS Reading for main ideas and supporting details CEFR LEVEL B2 TEST METHOD Multiple Choice Questions NUMBER OF ITEMS 6 The Trends in Smart Home Technology Read the article about the newest trends in smart home technology, then choose the correct answer (A, B, C or D) for questions 1-6. Only one answer is correct. The first one (0) has been done for you. Smart home devices are all the rage going into 2019. But what type of smart devices do consumers own? And aside from asking Alexa to tell jokes – which is the number one request in my household – how are consumers using this technology? The answers to these questions and more are here in the following five trends in smart home technology, with results analysed from a recent Ripple Street Research consumer survey. Ownership will remain centred around speakers and watches, followed by thermostats/carbon dioxide monitors, security, lighting and outlets. Smart speakers are the most sought-after item. According to projections, over 50% of US households will own a smart speaker after this holiday season. Our research shows that 25 to 35% of consumers currently own and are interested in smart speaker and watches – many more than other devices like smart thermostats, carbon dioxide monitors, security systems, smart lighting and outlets. There appears no current interest or need for all the fancy smart kitchen appliances. That will come, but not so soon. Men are far more likely to own and give smart home devices. According to the research, men are three times more likely to own smart lighting and outlets, twice as likely to own smart speakers, thermostats, CO2 monitors and security systems and 67% more likely to own smart watches. Not only are they more likely to own a smart device themselves, but they’re also more likely to give one. Men are 50% more likely to offer a smart device this holiday season compared to women. There is a big opportunity for brands in these categories to connect with female consumers, educate them about the utility of these products and create an experience that allows them to feel informed and comfortable enough to purchase. Men and women discover smart home technology differently. Men are finding new smart home products by reading blogs, articles, reviews and generally searching for information online. On the other hand, women are discovering smart home products primarily through recommendations from friends and family members. Women are twice as likely as men to discover a smart home product through friendly recommendations. With the complexity of most smart home products, the data suggest that men seek the advice of a professional prior purchase, whereas women look to those that know them best. Speakers are still not used for communication and purchase. For all the talk about smart speakers changing the buying habits of consumers, most aren’t interested in using them to make purchases – Overall READING Comprehension 251 B2 or to talk to one another for that matter. The most common uses for these speakers are: listening to music, podcasts, etc. (94%), hearing weather forecasts (73%), setting alarms/reminders (58%) and asking fun questions (56%). Less than half of their owners use everything else these speakers can do – and only 29% use their smart speaker to make phone calls. As for making purchases? That’s just 20%, but we know that number is likely to multiply. Consumers say they are concerned about privacy, but it doesn’t impact the likelihood to purchase a smart device. When specifically asked about privacy concerns, most consumers have them – 84% to be exact. However, it doesn’t appear these concerns are a deterrent to purchasing a smart device. For those who don’t currently own one, only 20% cited privacy concerns as the reason why; most others mentioned the price (55%) and/or a lack of need (42%). As is the case with most technology these days, consumers are willing to ignore their privacy concerns as long as they see a need for the product. Adapted from www.smartbrief.com/original/2019/01/5-trends-smart-home-technology 0 Smart home devices XA B C D are very popular nowadays. are not really owned by people. have been invented in 2019. are classified by types. Q4 Men A B C D Q1 In author’s family A B C D everybody asks Alexa for jokes. Alexa is the most requested device. children cannot use technology properly. there are five trends. Q5 Speakers A B C Q2 Smart kitchen devices A B C D are as popular as Alexa. are not as widespread as thermostats and carbon dioxide monitors. are owned by 50% of US households. are not that interesting yet. Q3 Women A B C D must be educated about the utility of technology by men. look forward to being connected by technology brands. need to be reassured before buying a device. often receive technological gifts from men. do not trust their relatives and friends. usually look for experts’ opinions. mainly buy devices on line. find out more new products than women do. D are seldom employed for music. are used for hearing weather forecasts by one consumer in two. might be used more often to purchase. are usually used for telephone calls. Q6 Privacy A B C D is the main reason why people do not buy a smart device. does not concern consumers at all. is a problem for 84% of the people. does not worry buyers that much. 252 Invalsi Trainer B2 10. TASK IDENTIFIER TITLE 7 Ways Netflix Reinvented HR (Human Resources) NUMBER OF WORDS 499 READING BEHAVIOUR Careful reading GENERAL FOCUS Reading for main ideas and supporting details CEFR LEVEL B2 TEST METHOD Multiple Matching NUMBER OF ITEMS 8 7 Ways Netflix Reinvented HR (Human Resources) Read the texts about Netflix and how it changed the way human resources are valorised. Choose the correct heading (A-K) for each paragraph (1-8). There are two extra headings that you should not use. The first one (0) has been done for you. 0 ___ “If you want to build a ship, don’t drum up the people to gather wood, divide the work, and give orders. Instead, teach them to yearn for the vast and endless sea.” Those are the words of the author of The Little Prince, Antoine de Saint-Exupéry, but also displayed proudly on Netflix’s website about working at the organization and their culture and values. Netflix and its former Chief Talent Officer Patty McCord are synonymous with great company culture. In 2009 their revolutionary “culture deck” was made public, setting out the vision and approach for attracting and keeping the best employees. It has since been viewed over five million times. The strategy was set around seven key points outlining a culture based on company values, hiring top talent, giving employees the freedom to succeed. Q1 ___ Instead of something written on posters and stuck on a wall, values should be lived, breathed – and actually valued, Netflix explained. This means: do as I do, not as I say. Leaders and managers, Netflix revealed, need to live and breathe the company values in everything they do. Q2 ___ Your employees should operate as a highly performing sports team, not a family. You join the company to compete, and every day you do your best to contribute to the success of the group. Q3 ___ This one is also simple: be honest and treat people like adults. If you are looking for people to take ownership, innovate, be smart and creative, then you need to give them the freedom and responsibility to do so. Ultimately, responsible people thrive on freedom and are worthy of freedom. Q4 ___ Don’t control staff, rather provide context to get the best results out of them instead. Netflix believes only by understanding the full context of their business can employees help their company grow. Q5 ___ Setting a common goal and allowing your teams to achieve it without heavy-handed supervision is vital for Netflix. Teams across the company must work to the same strategy, ensuring they are highly aligned but loosely coupled, meaning that they are not constantly checking each other’s work or sitting in endless meetings. Overall READING Comprehension 253 B2 Q6 ___ Hire the best and pay top dollar for it. Netflix always pays top of the market salaries. In their words, ‘One outstanding employee gets more done and costs less than two adequate employees’. Q7 ___ Netflix believes that people should shape their own futures within a company rather than have a career plan shaped by the company. The company scrapped formal yearly reviews early on. They found them to be too ritualistic and infrequent. They asked managers and employees to have regular conversations about performance as an organic part of their work. Q8 ___ Instead of cheerleading, talent managers should think of themselves as business people, McCord says. They should be asking themselves: What’s good for the company? And then they should implement strategies to address these. Ultimately, when a company is at the top of its game, so too are its people and their morale. Adapted from www.sagepeople.com/about-us/news-hub/7-ways-netflix-reinvented-hr/ A Pay top of the market B Context, not control C Freedom and responsibility D Do not copy competitors E High-performance F Get inspiration form literature G Promotions and development H ‘Values are what we value’ I Highly aligned, loosely coupled J Patty McCord’s overall advice for leaders K An innovative “culture deck” 0 K Q1 Q2 Q3 Q4 Q5 Q6 Q7 Q8 Copyright (2022) by Trinity Whitebridge www.trinitywhitebridge.co.uk info@trinitywhitebridge.co.uk Coordinamento editoriale: Sergio Olimbo Responsabile di redazione: Monica Monari Redazione: Silvia Magi Revisione linguistica: Mario Bianco Progetto grafico e copertina: Sergio Olimbo Copertina e impaginazione: Marta Boccato Archivio immagini: Archivio Spiraglio; Shutterstock Christoph Roser at AllAboutLean.com for Industry 4.0 Credits Kiranshastry All reasonable efforts have been made to identify and contact copyright holders but in some cases these could not be traced. If you hold or administer rights for materials published here, please contact us. Any errors or omissions will be corrected in subsequent editions. L’Editore è a disposizione degli aventi diritto non potuti reperire. I diritti di traduzione, di memorizzazione elettronica, di riproduzione e di adattamento, totale o parziale, con qualsiasi mezzo (compresi i microfilm e le copie fotostatiche), sono riservati per tutti i Paesi. Fotocopie per uso personale del lettore possono essere effettuate nei limiti del 15% di ciascun volume dietro pagamento alla SIAE del compenso previsto dall’art. 68, comma 4, della legge 22 aprile 1941 n. 633 ovvero dall’accordo stipulato tra SIAE, AIE, SNS e CNA, CONFARTIGIANATO, CASA, CLAAI, CONFCOMMERCIO, CONFESERCENTI il 18 dicembre 2000. Le riproduzioni per uso differente da quello personale potranno avvenire solo a seguito di specifica autorizzazione rilasciata dall’editore. Nel testo possono essere presenti nomi e marchi commerciali. Non sono stati eliminati per non rendere il testo irreale. Non esiste però alcun rapporto fra l’Editore e i relativi marchi, né si intende che gli eventuali marchi citati siano migliori o peggiori di altri, o che l’Editore voglia consigliarli o sconsigliarli. Stampa: Arti Grafiche Sograte, Città di Castello (PG) Prima edizione: 2022 Ristampe: 2022 I 2023 II 2024 III 2025 IV 2026 V www.trinitywhitebridge.co.uk Il libro • Ogni Unità propone letture tecniche graduali, note esplicative ed un ricco apparato vdi esercizi ed attività. • Un’unità incentrata sul mondo del lavoro nelle tecnologie (Sicurezza sul lavoro, Compilazione del CV europeo, etc.). • Esercizi di certificazioni PET e FCE aggiornati. • Mappe Concettuali. • Glossary: un glossario visuale di abbinamento parola-immagine per aiutare la memorizzazione. • Appendix con case studies aggiornati su aziende e professionisti del settore. Edizione digitale Il testo è conforme alla normativa in corso in materia di edizione mista, digitale e on-line. La versione digitale è acquistabile su www.scuolabook.it. Teacher’s Book Cod. 50283 Il Teacher’s Book contiene: • tutte le soluzioni degli esercizi e delle attività presenti nel volume per lo studente; • trascrizione dei materiali audiovisivi presenti sul volume per lo studente; • prove di verifica con relative soluzioni; • prove di verifica per studenti con BES con relative soluzioni. Altri contenuti digitali sono presenti sul sito dell’Editore, nella sezione riservata ai DOCENTI. co IC d. 7 T 3 PL 05 U 7 S ICT PLUS ISBN 978-88-99673-57-4 COD. 73057 € 24,50