Uploaded by kinhoon app

Rebecchi A. ICT Plus. Information Communication Technology 2022

advertisement
ALESSANDRA REBECCHI - ELISA CAVALLI - ROBERTO CABRAS
ICT
Information
Communication
Technology
S
U
L
P
Agenda 2030
COD. 73057
24,50
Trinity Whitebridge
co
IC d. 7
T
3
PL 05
U 7
S
ICT PLUS
ISBN 978-88-99673-57-4
ALESSANDRA REBECCHI - ELISA CAVALLI - ROBERTO CABRAS
ICT
Information
Communication
Technology
PLUS
Per scaricare la copia
digitale interattiva,
vai sul sito Scuolabook.it
e digita il codice che trovi
in questa pagina
TESTI
Un’ampia varietà di testi, calibrati sulle
esigenze dello studente, tratta gli argomenti
fondamentali per lo studio delle Tecnologie
dell’Informazione e della Comunicazione.
Particolare attenzione è data all’acquisizione
del vocabolario specifico.
Audio
5
OPERATING
SYSTEMS AND
SOFTWARE
• What Is an Operating System?
• A Bit of History
• Operating Systems for Personal Computers
• Mobile Operating Systems
1
Main Components and Multitasking
What Is an Operating System?
control over all of the computer hardware
devices. The kernel manages memory access
for programs in the RAM and determines
which programs gain access to hardware
resources etc.
A specific memory managing technique that can
provide a modern operating system with an
important feature is called multitasking,
which permits the running of multiple
independent programs on the same computer,
thus giving the impression that it is performing
the tasks at the same time. Since most
computers can do at most one or two things at
a time, this is generally done via time-sharing,
which means that each program uses a share of
the computer time to execute.
The user interface is the component of an
operating system between the user and the rest
of the system. With this component it is
possible to access the other parts of an
OS designed to perform a specific function.
For example, the file system is the
component of an OS which is specifically
developed to manage the files stored in every
mass storage device of a computer. By means
of this component, users can issue commands
and, depending on the (available) interface,
copy, move, rename or delete files or folders
in a disk.
Other components manage the peripherals and
the memory, and each of these is controlled by
the kernel that provides the most basic level of
32
After covering the hardware features of a computer, in this unit we are
going to focus on the basic software generally supplied by the
manufacturer: the operating system.
An operating system (OS) is a program that permits the user to control
the basic functions of a computer, thus allowing the user to communicate
with the hardware using input/output peripherals, as well as managing files
and data by specific application programs.
User Interface
MATERIALE DIGITALE
In ogni capitolo, tracce audio,
video e approfondimenti
accessibili tramite il QR code.
86
BIOS
The operating system allows the user to ‘speak’
with the hardware and one of its most important
features is that it must be easy to use. In other
words, it has to be ‘user-friendly’.
The first operating systems like MS-DOS were
text-based and the user communicated with the
hardware by typing commands into the keyboard.
This way of communication is very difficult,
especially for a non-skilled user, due to the
number of commands and syntax to remember.
Thanks to Steve Jobs, modern operating systems
now provide users with a more intuitive Graphic
User Interface (GUI).
Through a GUI, the user can give the system a
command by pointing a mouse to an object
displayed on the screen such as an icon, a
window, a button or text.
GLOSSARY
supplied: fornito
syntax: sintassi
The operating system of a personal computer is
stored on the main hard disk. This memory
support allows users to choose which operating
system to install (Windows, Linux…) and an
easier way to update it, by simply uploading
installation files from the producer’s website.
The operating system is loaded on the memory
at the power on of the computer, but this
means that another program is needed to tell
the hard disk to start and load the OS.
This program is called BIOS, which stands for
Basic Input Output System, and is
embedded on a memory chip of the computer.
At the power on the hardware is designed to
read the memory chip containing the BIOS first
and perform the program stored in it.
This initial operation is called ‘bootstrap’ and
the term derives from the Anglo-Saxon idiom
‘To pull oneself up by one’s bootstraps’, that
is, put on your boots and stand up alone
without any help. The expression was later
introduced into computer language to describe
the initialising process of a PC thanks to
BIOS, so operating systems could ‘stand up
by themselves’.
GLOSSARY
update (v.): aggiornare
bootstrap: tirante
initialising:
inizializzazione
by means of: tramite,
mediante, attraverso
folder: cartella
running: esecuzione,
attività
5. Operating Systems and Software
READING COMPREHENSION
1. Summarise the main events listed in the passage in chronological order by completing
the grid.
When?
Company/OS
Features
FCE
ESERCIZI
Writing – Part 2
6. You recently attended a course on Computer-Aided Design at school.
The course lasted four weeks; lessons were twice a week from 2 p.m.
to 4 p.m. After the final test, you received the following e-mail.
READING COMPREHENSION
2. Read the passage again and decide if the following sentences are true (T) or false (F).
T
F
1. The first operating systems date back to the 1950s.
2. First-generation computer machines had no proper OS.
3. Punched cards were a significant improvement in the late 1960s.
4. Prior to multiprogramming, memory partition was a failure.
5. Multiprogramming means that the processor can run several jobs at the same time.
6. The OS eventually became part of computers due to LSI circuits.
7. MS-DOS and PC-DOS are completely different operating systems.
8. BIOS is a boot program that loads the OS automatically.
9. The GUI was first developed by Apple Inc.
10. Since the 1990s only two main OSs have been used in computers.
11. Linux is an open source OS.
PET
Ricco apparato di esercizi per lo
sviluppo delle quattro abilità (reading,
listening, speaking, writing) e per la
preparazione alle certificazioni europee
PET (format aggiornato al 2020) e FCE.
We hope you enjoyed the course and would be
grateful if you could provide us
with feedback. We would appreciate receiving a
report on the course you have just
attended expressing your point of view on the following
points:
• Organisation
• Length
• Contents
• Suggestions
Thank you in advance,
James H. Denver
Easy CAD Team
Speaking
3. Ask and answer the following questions with a classmate, then switch roles.
• What kind of operating system is your mobile/smartphone provided with?
• Do you own any other devices that have a different operating system? Which OS?
• In your experience, what are the differences and similarities between different operating systems?
• Can you give any practical examples?
• Have you ever used an open source operating system?
• Can you explain in your own words the main differences between open source operating
systems and operating systems like Android or iOS?
• Look at the picture below. Do you agree or disagree with its meaning? Who could make such a
statement? Give reasons.
Write your report on the course in 140-190 words in an appropriate style.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
If your child can use
a smartphone,
they can easily operate
any of the above!
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
INDUSTRY 4.0
Alla fine di ogni Unit:
MIND MAP
Colossus
MIND MAPS
Mainframes
Mappe concettuali
sui punti chiave
della Unit.
Glossario visuale di
termini specifici
incontrati nel testo.
Hewlett
Packard
Pagine di approfondimento
di temi connessi al capitolo.
AUGMENT ED
REALITY
CLOUD
COMPUTIN G
Programmed using BASIC
language and equipped
with small display, keyboard
BIG DATA
and printer
Personal
computers
IBM 5150 (1981)
IBM PC, IBM
Compatible
and Apple
MacIntosh
It was still very expensive
and had low power
at
Increasingly powerful
ly
lower costs and user-friend
interface
47
GLOSSARY
COMPUTERS
Screen
Notebook
Portable
computers
Netbook
PDA (Personal
Digital Assistant)
Hand-held
computers
INDUSTRY
95
CYBERSE CURITY
INTERNET
OF THINGS
Smartphone
Tablet
Progress in the electronic
n
fields led the productio
of smaller and lighter
computers with powerful
batteries and low energy
consumption
Small-sized and power
reduced notebook suitable
for web browsing, e-mailing
and word processing
of
Used to manage lists
contacts and a calendar
of commitments
of
The parallel evolution
led
PDA and mobile phones
one
to the production of
device including the
functions of both devices
y
Tactile display technolog
made devices more
Using
compact and lighter.
of
touch screen instead
in
keyboard and progress
the
led
fields
the electronic
production of thin hand
rs.
held portable compute
SYSTEM
INTEGRAT ION
3D-printer
Desktop
Personal
Computer
CLIL
External Hard
Drive
Printer
Scanner
Joystick
Mainframe
computer
Sensor
Speaker
Microphone
Touchpad
Modem
Touchscreen
Monitor
Mouse
USB Key/
Memory stick
INDUSTRY
ary
glossary• gloss
ary• glossary•
glossary• gloss
ary• glossary•
glossary • gloss
GLOSSARY
its
A key contribution to
Alan
creation was given by
Turing
One of the original
von
programmers was John
of
Neumann, the creator
the architecture of modern
computers
Eniac
(PART 2)
We are currently experienc
ing the fourth step of technolog
evolution which is character
ical
ised by a series of standards
known as Industry 4.0.
(paradigms)
Such paradigms are a
multifactorial complex
of applications allowing
process optimisation due
to their interconnection
with manufacturing
and marketing processes
.
The core of Industry 4.0
is digital technology. In
order to comply
with this industrial system,
plants ought to satisfy
as many paradigms
as possible (see picture
below).
4.0
AUTONOM OUS
ROBOTS
SIMULATIO N
IT Systems and Networks
ADDITIVE
MANUFACTUR ING
1. Look at the image
above. Using a bilingual
or a monolingual dictionar
define in your own words
y, try to
the different features
of Industry 4.0. You can
examples from the topics
also make
you have studied in
IT Systems and Network
your school-work experien
s or during
ce.
• Autonomous robots
• Internet of Things
• Simulation
• Additive Manufacturing
• Cybersecurity
• System integration
•
Augment
ed
Reality
• Cloud Computing
• Big Data
189
4. Network Administrator
2
Software and Web Designer
4
74
Software designers specify the structure of information to be used as input
and output of an application, the nature of the user interface and the sequence
of processing. The designers also dictate the order in which the system will be
constructed, the timescale for each section and the format for the on-screen
and hard-copy outputs. Web designers also define the graphical layout and
navigation structure of a website to comply with the client’s requirements.
The key skills of a designer are:
• strong written and verbal skills;
• analytical mind;
• logical approach to problem solving;
• interpersonal skills;
• an understanding of the interaction between business operations and
technology;
• meticulous attention to detail;
• adaptability, ability to respond to changing circumstances;
• being a web designer requires technical knowledge of the Internet.
JOBS IN ICT
La unit Jobs in ICT fornisce consigli utili
e propone attività pratiche per
facilitare l’inserimento degli studenti
nel mondo del lavoro.
3
key skills: competenze chiave
changing: mutevole
Software and Web Developer
76
Network administrators are responsible
for the security and administration of
networks. Their work may involve
overseeing the installation and
configuration of new hardware and software
and ensuring their compatibility with the
other nodes of the network.
Network administrators must also keep
network hardware efficient and update
software to ensure that problems are fixed.
The administrative tasks involve setting up
user accounts and passwords, ensuring that
the network is secure and that users are using
it legitimately and ensuring that there is an
effective back-up system (see Unit 10 for
more information on network accounts).
The key skills of a network administrator are:
• strong technical knowledge;
• practical problem-solving skills;
• understanding of the overall technology
needs of the organisation;
• good interpersonal skills.
GLOSSARY
timescale: arco di tempo, lasso
di tempo
Network
Administrator
75
GLOSSARY
Software and web developers, also known as ‘programmers’, write the
code that tells the computer how and when to perform the functions specified
in the system design. They need an understanding of general programming
structures and principles and a specialist knowledge of one or more
programming languages, e.g. Visual Basic, C++ etc. (see Unit 7 for more
information on structures and programming languages). Their work involves
writing step-by-step instructions in the appropriate language to build the
applications required by the user. Web developers also need to know the HTML
language which is used to create the pages of an Internet site. The rules,
instructions and structures are completely different from other programming
languages. Graphics, communications and networking skills are important for
a web developer to build attractive web pages.
Both software and web developers must perform not only coding tasks, but also
debugging and maintenance tasks. Debugging means testing the program or
the website, finding errors and correcting them before
releasing the application to users. Maintenance is an
activity performed after implementation, to amend the
original code if errors occur, to improve performance or
to add new functionalities.
The key skills of a programmer are:
• logical approach to problem solving;
• ability to concentrate on one task;
• ability to learn effectively;
• attention to detail;
• ability to communicate with users and designers;
• ability to work in a team.
oversee (v.): supervisionare
legitimately: legittimamente
READING COMPREHENSION
1. Match the beginning of each sentence with the correct ending.
1.
2.
3.
4.
5.
6.
7.
8.
A. ranging from technical to
communicative ones, to perform their
job at their best.
B. and include the choice of an
application structure, layout, input
and output, according to the client’s
needs.
C. are also known as software and web
developers.
D. of all the hardware and software of a
specific network.
E. as well as preventing illicit use by
unauthorised users, are some skills
of a network administrator.
F. web developers use HTML language.
G. interpersonal skills and resilience are
typical features of a web designer.
H. to both software and web developers.
Great attention to detail,
logical approach to problem
solving,
The management of accounts,
passwords and back-ups,
Coding, debugging and
maintenance tasks are
activities belonging
In order to create the pages
of an Internet site
Network administrators
deal with the efficiency
and security
Programmers need different
kinds of skills,
The tasks of a software
designer are different
Programmers, who are IT high
specialists and technicians,
233
230 Appendix
2. GRACE HOPPER
5. ………………
Assembly set
The United Nations General
interlinked global
up in 2015 a list of 17
SDGs, that
goals under the acronym
‘blueprint to
a
be
to
up
drawn
were
sustainable
achieve a better and more
are intended to
future for all’. These goals
2030. Squiseat
be achieved by the year
(Zero Hunger)
fits into the second goal
Production).
ible Consumption and
(Respons
one
and the twelfth
……
6. …………
held every year by the
Day 2019, a one-day event
the
We took part in Start-up
s of people involved in
that brings together thousand
University of Bologna
the jury!
by
selected
start-ups. We got
world of innovation and
very few people and a
with
p
WhatsAp
on
group
portions he had
We first created a chat
t told us how many food
restauran
the
of
restaurant: the owner
down the orders on a sheet
it to our clients, writing
left and we communicated
service, driving our scooters
y provided the delivery
of paper. We then personall
through the streets of Bologna.
7. ………………
it was time to switch platform
quickly and we realised
Our popularity grew very
us to have an unlimited
. This IM software allowed
and start using Telegram
as a digital waiter.
a bot, which basically worked
chat group and to create
directly with our personal
y, the client interacted
g.
When checking the availabilit
and software developin
te on the organisation
bot, allowing us to concentra
7. Women in ICT
92
‘I had a running compiler
, and nobody would
touch it because, they
carefully told me,
computers could only
do arithmetic; they
could not do programs
.’
Grace Brewster Murray
Hopper was an
American computer scientist
and United States
Navy rear admiral.
A true pioneer of computer
programming, she
was one of the first programm
ers of the
Harvard Mark I computer
and invented one of
the first compiler-related
tools. She made the
idea of machine-independ
ent programming
languages popular, which
later led to the
development of COBOL,
an early high-level
programming language
still in use today.
She started her computin
g career when
working on the Harvard
Mark I team led by
Howard H. Aiken. In 1949
Hopper joined the
Eckert–Mauchly Compute
r Corporation and
was part of the developm
ent team that
designed the UNIVAC
I computer in 1944.
While working at Eckert–M
auchly she began
developing the compiler.
Hopper firmly
believed that it was possible
to write computer
code in English by using
a programming
language that was based
on English words. The
compiler would convert
that code into machine
code that would be understoo
d by computers.
By 1952, she had finished
her compiler, which
was written for the A-0
System programming
language.
APPENDIX
Una rubrica finale di
approfondimento su case studies
e personaggi di spicco nell’ICT.
GLOSSARY
compiler: compilatore
READING COMPREHE
NSION
1. Who…
(Left to right) Alberto Drusiani,
Ossama Gana, Gabriele
Calarota and Luca Morosini
1. graduated in Physics
at Cambridge Universit
y?
………………………………
………………………………
………………………………
2. used English words
for a programming language
…………
?
………………………………
………………………………
………………………………
3. was a US Naval Officer?
…………
………………………………
………………………………
………………………………
4. contributed to the
development of non-refle
…………
ctive surfaces on compute
………………………………
r screens?
………………………………
………………………………
5. worked with a Nobel
Prize winner?
…………
………………………………
………………………………
………………………………
6. developed the first
compiler in computing
…………
history?
………………………………
………………………………
………………………………
…………
B1
B2
Overall
LISTENING
Comprehension
Overall
READING
Comprehension
(Common European Framework)
INVALSI
A fine volume, una simulazione
completa della Prova Nazionale Invalsi.
Un’altra prova è presenti sul sito
dell’Editore (trinitywhitebridge.co.uk).
Inquadra il QR Code
per accedere alle
tracce audio e ai
materiali digitali!
(Common European Framework)
Audio
1. TASK IDENTIFIER
TITLE
8. TASK IDENTIFIER
TITLE
97
Customer’s Complaints at the Computer Shop
NUMBER OF WORDS
LENGTH OF SOUNDFILE (minutes)
03:07
READING BEHAVIOUR
LISTENING BEHAVIOUR
Quick, selective listening
Cyber Security
361
Quick selective reading
GENERAL FOCUS
Reading for specific information and important details
GENERAL FOCUS
Listening for specific information and important details
CEFR LEVEL
B2
CEFR LEVEL
B1
TEST METHOD
Short Answer Questions
NUMBER OF ITEMS
8
TEST METHOD
Multiple Matching
NUMBER OF ITEMS
9
Cyber Security
Customer’s Complaints at the Computer Shop
Listen to a dialogue between a clerk and a customer at a computer store.
First you will have 1 minute to study the task below, then you will hear the recording twice.
While listening, match the clerk’s questions (1-9) with customer’s answers (A-L).
There are two answers that you should not use.
The first one (0) has been done for you.
After the second listening, you will have 1 minute to check your answers.
0
How can I help you, Sir?
Q1
Do you have your store receipt
with you?
Q2
What seems to be the problem?
Q3
Could I take a look?
Q4
Could I ask a few questions?
Q5
How long do you use it for before
it overheats?
Q6
Do you notice any loss of function?
Q7
What do you usually do on the laptop?
Q8
Is the area where you use the laptop
exposed to direct sunlight or heat?
Q9
Do you sit on the bed when using the
laptop?
C
A
Sure, go ahead.
B
That depends
C
I’d like to make a complaint.
D
I use it to check my emails.
E
I think it’s overheating.
F
It usually feels very hot after one
or two hours.
G
It’s usually on top of the covers on
my lap.
H
Yes, I do. Here it is.
I
That’s probably why it’s
overheating.
J
Not at all.
K
Yes, of course.
L
The touchpad becomes less
sensitive to my touch, actually.
Read the review about cyber security, then answer the questions (1-8) using a maximum of 4 words.
Write your answers in the spaces provided.
The first one (0) has been done for you.
The definition of cyber security is often confused with the meaning of information security.
Information security, often referred to as ‘IT security’, looks to protect all information assets,
whether as a hard copy or in digital form. Cyber security is a subset of information security. It
specifically focuses on protecting computer systems and their components – including hardware,
software and data – and digital infrastructure from attack, unauthorized access or being otherwise
damaged or made inaccessible.
Data centres, websites, programs, servers or accounts can all be exploited through a cyber-attack.
Effective cyber security uses risk management to ensure these controls are deployed cost-effectively
– in other words, based on the likelihood of the risk occurring, and the worst possible impact if the
threat materializes.
In recent years, cyber security has come under intense media scrutiny due to the rapid development
of cyber risks in both size and number, and the degree of impact on individuals, governments and
organizations. Most well-informed organizations now consider cyber security a critical business
issue.
What are the consequences of a cyber-attack? Cyber-attacks can cause significant disruption
and damage to even the most resilient organization. Impacted organizations stand to lose assets,
reputation and business, and face fines and remediation costs.
The most effective strategy to mitigating and minimizing the effects of a cyber-attack is to build a
solid foundation upon which to grow your cyber security technology stack. Solution providers often
tell their clients their applications are 100% compatible and will operate seamlessly with the current
IT infrastructure, and for the most part, this is true.
Problems arise when we start adding IT security solutions from different manufacturers. Regardless
of the granularity of their configuration settings, technology gaps will always be present.
Contents
1. HARDWARE, BITS
AND CODES
1. Computer Architecture …………………… 8
2. History of Computers ……………………… 12
3. The CPU
……………………………………… 20
4. The Motherboard …………………………… 22
5. Memory
……………………………………… 25
6. Bits and Codes ……………………………… 26
7. Binary Codes and ASCII Code …………… 28
MIND MAP
………………………………… 30
GLOSSARY
………………………………… 31
2. INPUT, OUTPUT AND
STORAGE DEVICES
1. Types of Computers
……………………… 32
2. The Computer System …………………… 35
3. Computer Storage ………………………… 40
4. Bits and Codes Part 2: How Big Is a Bit?
From Valves to Transistors
and Integrated Circuits …………………… 44
MIND MAP
………………………………… 46
GLOSSARY
………………………………… 47
3. FROM MAINFRAMES
TO SMARTPHONES
1. Mainframes, the First Electronic
Computers …………………………………… 48
2. Personal Computers ……………………… 50
3. Portable Computers, Notebooks
and Netbooks ……………………………… 52
4. PDAs, Tablets and Smartphones ………… 54
MIND MAP
………………………………… 58
GLOSSARY
………………………………… 59
4. AUTOMATION
AND ROBOTICS
1. Introduction to Automation
…………… 60
2. Using PCs in Automation
– Microcontrollers ………………………… 66
3. Open Source Computer Boards ………… 70
4. Domotic Applications ……………………… 72
5. Industrial Applications …………………… 74
MIND MAP
………………………………… 78
INDUSTRY 4.0 …………………………… 79
5. OPERATING SYSTEMS
AND SOFTWARE
1. What Is an Operating System? …………… 80
2. A Bit of History ……………………………… 84
3. Operating Systems for Personal
Computers …………………………………… 88
4. Mobile Operating Systems
MIND MAP
……………… 92
………………………………… 94
INDUSTRY 4.0 …………………………… 95
6. APPLICATION
SOFTWARE
1. Word Processors and Spreadsheets …… 96
2. Presentation Software …………………… 100
3. Graphics Software ………………………… 102
4. Development Tools ……………………… 104
MIND MAP ………………………………… 108
INDUSTRY 4.0
………………………… 109
7. ALGORITHMS
AND PROGRAMMING
LANGUAGES
1. Algorithms …………………………………… 110
2. Writing Algorithms Using
a Flow Chart ………………………………… 113
3. Programming Languages
……………… 116
MIND MAP ………………………………… 118
MOVIES AND MORE ………………………… 119
8. NETWORKING AND
TELECOMMUNICATIONS
1. Sharing Resources ………………………… 120
2. LAN and WAN ……………………………… 122
3. Telecommunications ……………………… 124
4. Wi-Fi and Cellular Data Technologies … 128
MIND MAP ………………………………… 132
MOVIES AND MORE ………………………… 133
9. THE INTERNET
1. How the Internet Developed …………… 134
2. Internet Telephony ……………………… 137
3. The Internet and Its Core
4. E-Mails
……………… 140
……………………………………… 146
5. The WWW (World Wide Web) …………… 148
6. Search Engines …………………………… 150
7. Social Networks …………………………… 153
MIND MAP ………………………………… 154
MOVIES AND MORE ………………………… 155
10.SYSTEM
ADMINISTRATION
AND SECURITY
1. Computers and Network Accounts …… 156
2. Encryption and Cryptography ………… 158
3. Viruses and Antiviruses ………………… 160
4. Firewalls ……………………………………… 163
MIND MAP ………………………………… 166
MOVIES AND MORE ………………………… 167
11. DATABASES
1. Using Databases to Manage Large
Amounts of Data ………………………… 168
2. Relational Models ………………………… 171
3. Database Management Systems
(DBMSs) ……………………………………… 175
4. Data Warehouses and Data Mining …… 177
MIND MAP ………………………………… 180
MOVIES AND MORE ………………………… 181
12. JOBS IN ICT
1. How ICT Has Led to Changing
Work Patterns ……………………………… 182
2. Software and Web Designer …………… 188
3. Software and Web Developer
………… 188
4. Network Administrator ………………… 189
5. SEO and SEM Specialist
6. Curriculum Vitae
………………… 190
………………………… 192
7. Covering Letter …………………………… 196
8. Job Interview: Dos and Don’ts ………… 198
MIND MAP ………………………………… 200
TASK: A PPT ABOUT
YOUR SCHOOL-WORK
EXPERIENCE …………………………… 201
13. SAFETY
1. Safety Signs ………………………………… 203
2. Work Safety: 10 Useful Tips ……………… 206
3. Body Parts
………………………………… 209
MIND MAP ………………………………… 212
MOVIES AND MORE ………………………… 213
APPENDIX
1. Marina Vriz
………………………………… 214
2. MUSA ………………………………………… 217
3. ‘Doctor, Doctor, I’ve got Backache.’ …… 221
4. CNA Pensionati with the Aldini Valeriani
Institute Is Focusing on Digital,
Narrowing the Gap, Transmitting
Knowledge, and Encouraging the
Generation-to-Generation Handover … 224
5. QubicaAMF
………………………………… 226
6. A Squiseat APPetite! ……………………… 229
7. Women in ICT ……………………………… 232
INVALSI TRAINER
…… 238
Audio
1
HARDWARE,
BITS AND CODES
• Computer Architecture
• History of Computers
• The CPU
• The Motherboard
1
• Memory
• Bits and Codes
• Binary Codes and ASCII Code
Computer Architecture
Introduction
SPEAKING
– GROUP WORK
1. These ten communication inventions changed the world forever. What do you know
about each of them? These dates may be useful for your research: 3500 BC, 100 BC,
1453, 1837, 1896, 1926, 1943, 1973, 1983, 1996.
• Wi-Fi Technology
• Writing
• Mobile phone
• The computer
• The Internet
• The telegraph
• Paper
• The printing press
• The radio
• The television
CHECK YOUR KNOWLEDGE
2. Complete the following sentences with the words in the box.
television  cell  American  Chinese  Egyptians  printing press  computer
1.
2.
3.
4.
5.
6.
7.
The ………………… told stories with pictographs.
The ………………… invented paper 1,000 years before it arrived in Europe.
Before the invention of the …………………, scribes had to write out books by hand.
The inventor of Morse Code was ………………… .
There is more than one inventor of the ………………… .
Konrad Zuse invented the ………………… .
The phones you carry with you are mobile or ………………… phones.
SPEAKING
– PAIR WORK
3. Complete the following sentences with the words in the box.
• How do you think the inventions in the above exercise helped the spread of English?
• How can you use these inventions to learn English?
9
1. Computer Architecture
Alan Turing and ‘Intelligent Machines’
The pioneering mathematician Alan Turing is often
considered the father of modern computer
science. His idea of creating a machine to turn
thought processes into numbers was a turning
point in the history of computers.
Turing, born in London in 1912, was fascinated by
science throughout his childhood. While studying
Maths at Cambridge in the 1930s, he developed
some of his most significant mathematical theories.
Despite his brilliance, he suffered from a feeling of
isolation, and found it difficult to make friends.
After graduating, Turing went to Princeton in the US,
where he began work on what was later to become
the first digital computer program – the Turing
Machine. His revolutionary idea was for a machine
that would read a series of ls and 0s from a tape.
These described the steps needed to solve a
problem or task. But it was only years later that
technology had advanced sufficiently to transfer these
ideas into real machines.
Turing’s experiments helped the Allies win World
War II by decoding encrypted German
communications. The wartime German computer
Enigma generated a constantly changing code which
was impossible for people to decipher. But Turing’s
creation of Colossus – the first fully electronic
digital computer – managed to crack Enigma’s codes.
After the war Turing continued research into digital
computers including developing the Automatic
Computing Engine, a large electronic digital
computer. He wrote an article called ‘Intelligent
Machinery’, which was one of the first to deal with
the concept of artificial intelligence. He believed an
intelligent machine could be created by following the
model of the human brain. He compared devices
such as cameras and microphones to parts of the
human body and his views often put him in conflict
with other scientists.
In 1950 he devised the Turing Test, which has now
become a standard measure of artificial intelligence.
The test consisted of an interrogator in a separate
room asking questions via keyboard to both a person
and an intelligent machine. If, after a reasonable
amount of time, the computer answers cannot be
distinguished from those of the person, then the
machine can be described as ‘thinking’.
Turing always refused to conform to accepted ideas.
At school he simply ignored subjects that did not
interest him. He was an atheist and also felt
marginalised because of his homosexuality. His life
ended sadly when he committed suicide in June 1954
but he left the world a permanent legacy.
1
GLOSSARY
thought process: processo
mentale
step: passo, fase
the Allies: gli Alleati (durante
la Seconda guerra mondiale)
human brain: cervello umano
thinking: pensante
legacy: eredità
10
1. Hardware, Bits and Codes
VOCABULARY
4A. Use a monolingual dictionary and orally explain the following words taken from the
passage above. Can you understand them all?
• Computer science
• Turning point
• Encrypted
• Code
• To crack
• Marginalised
4B. Now try to write down your own definition of an ‘intelligent machine’. You can use
either the words from your list or synonyms.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
READING COMPREHENSION
5. Read the short biography of Alan Turing and make notes about major events in his life.
Birth
…………………………………………………………………………………………
Education
…………………………………………………………………………………………
Career
Death
Before WW2:
………………………………………………………………………
During WW2:
………………………………………………………………………
After WW2:
………………………………………………………………………
…………………………………………………………………………………………
READING COMPREHENSION
6. Read the passage again and decide if the following statements are true (T) or false (F).
1.
2.
3.
4.
5.
6.
Turing had the idea of using binary numbers to program computers.
His ideas on programming were immediately applied to the computers of the time.
Colossus created secret messages that Enigma could not decipher.
Turing believed that the computers of his time were identical to the human brain.
The ‘Turing Test’ is to find out if computers are more intelligent than human beings.
At first, many of Turing’s ideas were not accepted by other scientists.
T






WRITING
7. Using your own words, summarise Turing’s important contributions to…
1. computer programming;
2. the development of the computer;
3. the study of artificial intelligence.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
F






11
1. Computer Architecture
MOVIE TIME
• Pirates of Silicon Valley – Official Trailer
8. Watch the trailer for Pirates of Silicon Valley. The trailer starts with the speaker
saying: ‘They were two twenty-year-old kids who took on the world… and took on
each other…’
1. Look for the phrasal verb ‘take on’ in a
monolingual dictionary and find a suitable
synonym.
………………………………………………………
………………………………………………………
………………………………………………………
2. Who are the two main characters of the story?
Have you ever heard their names? What are
they famous for?
………………………………………………………
………………………………………………………
………………………………………………………
3. What can you infer about their relationship from
the trailer?
………………………………………………………
………………………………………………………
………………………………………………………
VIDEO
1-2
9. Watch the videos on Von Neumann
computer architecture and make a
list of the important features to
remember and which you will
discuss, together with these
questions, with your classmates.
12
1. Hardware, Bits and Codes
2
History of Computers
To instruct an electronic device (computer) to perform a task of yours,
you need to have some understanding of these two things:
– the history;
– the components and how they coordinate with each other.
Many discoveries and inventions have directly and indirectly contributed
to the development of the personal computer (PC).
The first computers of any kind were simple calculators. Even these
evolved from mechanical devices to electronic digital devices.
Here is a timeline of some significant events in computer history.
1617: John Napier Creates ‘Napier’s Bones’ Wooden
or Ivory Rods Used for Calculating
John Napier was a very famous mathematician of his time. He was born
in 1550 in Edinburgh, Scotland. He introduced logarithms and the
modern notation of decimals. Admitted to the University of St Andrews
when he was only thirteen years old, Napier came back to his homeland
by 1571 and married Elizabeth Stirling the year after. At the castle of
Gartness, Napier explored his interests in the field of Religious Politics,
Agriculture and Mathematics. For more than twenty years, Napier worked
on a very complex idea that held great value for Physical Science.
A device called Napier’s rods or bones shows his creativeness in the
field of mathematics: multiplication,
division and many other mathematical
GLOSSARY
functions could be done mechanically.
wooden: di materiale ligneo
This device helped in analogue
rod: bastoncino
computers and slide rules. Although he
homeland: terra natale
device: dispositivo
never invented the natural logarithm
logarithm function: funzione
function, it is sometimes known as
logaritmica
the ‘Napierian Logarithm’.
2
13
2. History of Computers
1642: Blaise Pascal Introduces the Pascaline
Digital Adding Machine
3
Blaise Pascal was a French mathematician,
physicist and religious philosopher, born on
19 June 1623, in Clermont-Ferrand,
France. Pascal laid the foundation of
probability theory and further validated
Evangelista Torricelli’s theory concerning
the cause of barometrical variations and,
during the 20th century, the Pascal (Pa)
unit was named after the thinker in honour
of his contributions to the understanding of
atmospheric pressure and how it could be
estimated in terms of weight.
Pascal’s inventions and discoveries were
instrumental in developments in the fields of
Geometry, Physics and computer science,
influencing 17th-century visionaries like
Gottfried Wilhelm Leibniz and Isaac Newton. He is also widely known for
his body of notes posthumously released as the Pensées.
In 1642 Blaise Pascal started work on a calculator dubbed the Pascaline,
inspired by the idea of making his father’s job of calculating taxes easier.
The Pascaline was a numerical wheel calculator with movable dials, each
representing a numerical digit. The invention, however, was not without its
glitches: there was a discrepancy between the calculator design and the
structure of French currency at the time. Pascal continued to work on
improving the device, but the Pascaline was never a big seller. In the late
1960s, Swiss computer scientist Niklaus Wirth invented a computer
language and insisted on naming it after Pascal. This was Wirth’s way of
memorialising Pascal’s invention of the Pascaline, one of the earliest forms
of the modern computer.
Pascal died in Paris on 19 August 1662.
GLOSSARY
lay (v.): porre
foundation: basi, fondamenta
concerning: che riguardano
weight: peso
posthumously: postumo
glitch: inconveniente tecnico
currency: valuta
14
1. Hardware, Bits and Codes
1822: Charles Babbage, the Father of Computing
4
Charles Babbage was
known for his
contributions to the first
mechanical computers,
which laid the
groundwork for more
complex future designs.
Babbage was born in
London in 1791 and
very early on
developed a love of
Mathematics. At
Cambridge he received
an honorary degree in
Mathematics, but he was
disappointed by the
quality of the Maths
teaching and joined the
Analytical Society – a group of like-minded students interested in exploring
Maths issues. It was as a student that he conceived of an idea to try and do
calculations with a machine. It was after looking at a table for logarithms
(many of which were wrong), that he thought it would be better to try and
work them out systematically.
Babbage achieved notable results in Cryptography, though this was still not
known a century after his death.
As early as 1845 Babbage had solved a cipher that had been posed as a
challenge by his nephew Henry Hollier, and in the process he made a
discovery about ciphers that were based on Vigenère tables. He realised
that enciphering plain text with a keyword rendered the cipher text subject to
modular Arithmetic. During the Crimean War of the 1850s, Babbage broke
Vigenère’s autokey cipher as well as the much weaker cipher that today is
called Vigenère cipher. His discovery was kept a military secret and was
not published. Credit for the result was instead given to Friedrich Kasiski, a
Prussian infantry officer, who made the same discovery some years later.
However, in 1854, Babbage published the solution of a Vigenère cipher,
which had been previously published in the Journal of the Society of Arts.
In 1855 Babbage also published a short letter, ‘Cypher Writing’, in the same
journal. Nevertheless, his priority wasn’t established until 1985.
Babbage’s machines were among the first mechanical computers.
He directed the building of some steam-powered machines that achieved
modest success, suggesting that calculations could be mechanised.
While Babbage’s machines were mechanical and unwieldy, their basic
architecture was similar to a modern computer. The data and program
memory were separated, operation was instruction-based, the control unit
could make conditional jumps, and the machine had a separate I/O unit.
GLOSSARY
groundwork: lavoro preparatorio
develop (v.): sviluppare
conceive (v.): ideare, elaborare
challenge: sfida
as well as: così come, al pari di
previously: precedentemente, in precedenza
15
2. History of Computers
1860: Herman Hollerith – IBM 1924
5
In the 1880s the American inventor Herman Hollerith
devised a system of encoding data on cards by means of
punched holes. He combined this with a new method
of automatically reading the data using metal pins which
could pass through the holes and set up electrical
circuits. Hollerith’s machine was used for calculating
statistics and sorting information. The Tabulating
Machine Company which he set up in 1896 eventually
became International Business Machines
Corporation – IBM – in 1924, a pioneer in the
production of computers.
GLOSSARY
punched: perforato
pin: puntina metallica, spillo
sort (v.): organizzare
pioneer: pioniere, precursore
John Presper Eckert and John Mauchly
GLOSSARY
come into being (v.): avere origine
absolutely: assolutamente
vacuum tube: valvola termoionica
miniaturisation: miniaturizzazione
tiny: minuscolo
6
In 1946 these two American engineers
designed ENIAC (Electronic
Numerical Integrator and
Calculator), the first general-purpose
electronic computer. It came into
being after the work of several other
inventors who had experimented the use
of Electronics to process data and here it
is absolutely worth mentioning again
the British mathematician Alan Turing.
ENIAC was a large, stand-alone machine
operated with punched-card programs. It
was 24 metres long, weighed 30 tons,
and contained 17,000 vacuum tubes
linked by 800 kilometres of wiring. It
was considered immensely useful at the
time, especially when compared to handoperated calculators. Over the following
25 years computer development was
characterised by increasing
miniaturisation. Following the
invention of the transistor in 1947 and
the integrated circuit (which you will
study in the following unit) in 1958,
American engineer Marcian Hoff built
the first microprocessor in 1971,
combining all the basic elements of a
computer on one tiny silicon chip.
16
1. Hardware, Bits and Codes
Steve Jobs
7
The entrepreneur and inventor Steve Jobs (San Francisco 1955 – Palo
Alto 2011) was one of the most influential developers of the modern
computer. It was in 1975 that, working in his family’s garage with his friend
Stephen Wozniak, he designed and built the Apple I, one of the very first
personal computers. Jobs and Wozniak founded what is considered the
world’s biggest start-up, the Apple Computer Company, in 1976.
Immediately after that, the Apple II personal computer was produced and
greatly appreciated. In 1984 Apple introduced the Macintosh, the first
commercial PC with a Graphical User Interface (GUI). The user was presented
with a list of choices (menu) with pictures (icons) arranged into boxes
(windows) representing applications and programs. It was with the help of
a mouse that the user could select an icon and run a program. It was the first
time that anyone could use a computer with no special training.
Over the years, Apple has developed well-designed innovative products which
have continuously advanced personal computers: from the lightweight
portable laptop (the PowerBook in the early 1990s) to the most popular
tablet, the iPad, in 2010. It came naturally for the company to expand into
the field of mobile phones and Internet services with the iPhone and iTunes.
GLOSSARY
entrepreneur:
imprenditore
design (v.):
progettare,
pianificare
greatly: largamente,
molto
representing: che
rappresenta,
raffigurante
anyone: chiunque
lightweight: leggero
field: campo, ambito
17
2. History of Computers
Bill Gates
The American computer scientist and
businessman Bill Gates has built his
reputation primarily in the field of software.
With his company, Microsoft, founded
with partner Paul Allen in 1975, he created
a range of standardised easy-to-use
programs which enabled ordinary people to
put their PCs to practical use. When
Microsoft began, computers were
considered as just complex tools for
technicians but Gates had a vision of
‘a computer on every desk and in every
home’. In 1981 Microsoft released the
DOS (Disk Operating System) for the first
IBM PCs, followed in 1985 by Windows,
which borrowed ideas from Apple’s GUI
system and rapidly became the leading
operating system worldwide. As computer
hardware developed, with growing
multimedia and Internet capabilities,
Microsoft created the software to enable it to
work through, for example, programs for
word processing, spreadsheets, graphics
and web browsing.
8
GLOSSARY
businessman: uomo d’affari,
imprenditore
easy-to-use: di facile utilizzo,
semplice da usare
tool: strumento, attrezzo
borrow (v.): mutuare, prendere
in prestito
spreadsheet: foglio di calcolo
18
1. Hardware, Bits and Codes
READING COMPREHENSION
1. Read the computer history timeline and find out when the following first appeared.
1.
2.
3.
4.
5.
6.
7.
8.
The Windows Operating System ………………………………………………………………
The Microsoft Company …………………………………………………………………………
A commercial computer inclusive of mouse, windows and icons …………………………
Personal computers ……………………………………………………………………………
An electronic computer that could be used for different tasks ……………………………
Mechanical calculators …………………………………………………………………………
Laptop computers ………………………………………………………………………………
An automatic calculating machine ……………………………………………………………
READING COMPREHENSION
2. Who…
1. devised a system of encoding data on cards by means of punched holes? ……………
………………………………………………………………………………………………………
2. created the first ‘computer on a chip’? …………………………………………………………
3. founded Microsoft with Bill Gates? ……………………………………………………………
4. founded Apple with Steve Jobs? ………………………………………………………………
5. built the first automatic calculator? ……………………………………………………………
6. devised a machine with all the basic elements of a modern computer? …………………
………………………………………………………………………………………………………
7. created the first calculating machine run by electricity? ……………………………………
………………………………………………………………………………………………………
8. produced an Operating System for the first IBM PCs? ………………………………………
READING COMPREHENSION
3. What information can you infer from the short paragraphs about other important
people who contributed to the creation of the computer?
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
READING COMPREHENSION
4. Read the computer history timeline and decide if the following sentences are true (T)
or false (F).
T
F
1. Babbage’s analytical engine worked with electricity.


2. Pascal’s calculator was based on the decimal numbering system.


3. The DOS Operating System was built around the use of a mouse.


4. Bill Gates created new types of computers.


5. Steve Jobs helped to make computers more user-friendly.


6. ENIAC was the first electronic computer to use transistors.


7. Babbage and Hollerith devised the same system for programming calculators.


8. The analytical engine was built in 1833.


19
2. History of Computers
Where Are Computers Used?
Computers have an enormous range of
applications in many different fields.
A. Computers have opened a new era in
manufacturing and consumer-product
development. In design offices, special programs
enable engineers and architects to create
3D-models on a computer screen. In factories
other applications help managers to plan
production and control automated machinery.
B. Researchers use computers to collect, store,
manipulate and analyse data. Running
simulations is an important application: data
representing a real-life system is entered into the
computer, and the data is manipulated to study
how the system behaves in different
conditions. Chemists, for example, use computer
simulations to design and test models of new
drugs. Meteorologists base their predictions on
simulated models of weather conditions.
C. Computers play a vital role in national and
local administration. They are essential, for
example, in compiling population data and
other statistics, paying social security benefits,
handling tax records, maintaining criminal records
and innumerable other administrative tasks.
D. All modern systems are dependent on
computers. They operate telephone switching
systems, coordinate satellite operations and
control the equipment for television and radio
broadcasting. Local area networks connect the
computers in separate departments of
businesses and other institutions while the
Internet links computers all over the world.
E. Computers are increasingly being used
for teaching in schools and universities.
Computerised lessons range from simple
repetitive exercises to complex interactive
simulations. Certain programs have become
essential teaching tools in medical schools and
many other training centres, including flight
simulators to train pilots. Many reference works
are available either on CD/DVD or through the
Internet, and traditional textbooks are being
replaced by e-books read on computers.
F. Video games are one of the most popular PC
applications. The constantly improving graphics
and sound capabilities of PCs have made them
popular tools for artists and musicians. Painting
and drawing programs enable artists to create
realistic images and animated displays.
Musicians can use computers
to create multiple-voice
compositions and to play
back music with complex
variations. The film
industry is a major user
of computer technology
to create special effects and
computer-generated images.
GLOSSARY
range: gamma, varietà
enable (v.): rendere in grado di,
consentire
machinery: macchinari industriali
behave (v.): comportarsi
drug: farmaco
compile (v.): compilare
task: compito, attività
equipment: attrezzatura
all over the world: in tutto il mondo
increasingly: sempre più
training centre: centro di
formazione
painting: relativo alla pittura
musician: musicista
READING COMPREHENSION
5. Choose the correct heading for each paragraph (A-F).
1. Education
2. Government
……
……
3. Entertainment
4. Industry
……
……
5. Science
……
6. Telecommunications ……
READING COMPREHENSION
6. Match each word or phrase (1-6) to its correct sentence ending (A-F).
1.
2.
3.
4.
5.
6.






Architects
Film directors
Government agencies
Scientists
Telecoms engineers
Training Institutions
use computers to…
A. collect and organise bureaucratic information.
B. construct precise models of buildings.
C. create spectacular special effects.
D. allow practice in simulated real-life situations.
E. improve the efficiency of telephone networks.
F. test theories in varying simulated conditions.
20
1. Hardware, Bits and Codes
3
The CPU
9
CPU is the abbreviation of Central
Processing Unit and is the computer
component that carries out the instructions
contained in a program using the working and
the I/O memory. If we compare a computer to
a human being, the CPU is definitely the brain.
The main components of a CPU are the
Arithmetic and Logic Unit (ALU), which is
the processing component where the logic and
arithmetic operations are processed, and the
Control Unit (CU), whose task is to
coordinate all the actions needed for the
processing of a single instruction or set of
instructions. The Control Unit communicates
with the working memory and input/output
devices to give the ALU the correct sequence of
data and instructions to process and to take the
results from it.
Apart from the ALU and Control Unit, the
CPU also contains memory components called
registers, where data (operands) are loaded
from time to time and are required by the ALU
for every single operation. The result of every
operation executed by the ALU is placed in a
register called an ‘accumulator’ and later moved
by the Control Unit to the working memory in
order to free some space for the next
computation results.
The term CPU was not used during the
production of the first electronic calculators
because of the dimensions of the electronic
components at the time. That is, thermionic
valves, the ALU and the Control Unit were
placed in two different rooms, so they were two
different blocks located in different places. The
first CPU ever put into business was the IBM
709 Central Processing Unit, which had
thermionic valves, but was situated in one room
only and used in an IBM computer called
IBM 709 Data Processing System in 1958.
With the introduction of transistors and
integrated circuits, the CPU has gradually
reduced in size, from occupying a whole room
to a single electronic board that you could hold
in one hand as an integrated circuit. This is the
shape that everybody knows nowadays
because it is in every personal computer and is
known as a microprocessor.
The first CPU, even if in limited numbers,
started to be sold in 1971. It was fully
contained in a monolithic integrated circuit and
was the Intel 404 microprocessor designed
by an Italian, Federico Faggin, who later
made other Intel microprocessors with even
better performance. After working for Intel,
Federico Faggin founded and directed Zilog,
the first company which produced only
microprocessors and which later gave birth to
the famous Z80, a microprocessor which is still
being produced today and which was the main
component of several successful personal
computers made in the 1980s. Because of
these products, which increasingly became
more powerful and cheaper, Federico Faggin
made a remarkable contribution to the
spread of personal computers and electronic
devices in general.
GLOSSARY
carry out (v.): eseguire
processing:
elaborazione
loaded: caricato
because of: a causa
di, in ragione di
whole: intero
shape: forma
microprocessor:
microprocessore
remarkable:
notevole
21
3. The CPU
The CPU
CHECK YOUR KNOWLEDGE
1. Answer the following questions by choosing the correct option.
1. What is the purpose of the CPU?
 A. To create data.
 B. To store data.
 C. To process data.
2. What does the Control Unit do?
 A. It controls and monitors
communications between the
computer and any attached hardware.
 B. It holds the data and programs that
the CPU needs.
 C. It carries out calculations and logic
operations.
3. What does the Arithmetic and Logic Unit do?
 A. It controls and monitors
communications between the
computer and any attached
hardware.
 B. It holds the data and programs that
the CPU needs.
 C. It carries out calculations and logic
operations.
5. How many instructions can a CPU process
at a time?
 A. One.
 B. Many.
 C. It does not process instructions.
6. When the CPU fetches the instruction from
the main memory, where does it store it?
 A. In the Control Unit.
 B. In the Arithmetic and Logic Unit.
 C. In the Immediate Access Store.
7. What is it called when the CPU carries out
the action of an instruction?
 A. Fetching the instruction.
 B. Decoding the instruction.
 C. Executing the instruction.
4. What can often be referred to as the
registers in a CPU?
 A. The Control Unit.
 B. The Immediate Access Store.
 C. The Arithmetic and Logic Unit.
Wise people say that laughter is the best medicine
- have a go!
Last summer, an unlucky computer programmer
drowned at sea. Many people were on the shore
and heard him cry out in despair ‘F1! F1!’, but
nobody understood.
(F1 = Help)
From www.academictips.org
22
1. Hardware, Bits and Codes
4
The Motherboard
10
The motherboard is an electronic board which
constitutes a physical and electrical support for the
components of a computer, especially the CPU
and memories. Like all electronic boards, the
motherboard is a printed circuit board where all
the electronic components are soldered to make
the system work. The bus, which is the set of
links that allows the CPU, memory and peripherals
to communicate with each other, is one of the
fundamental components of the architecture of a
computer and is made with appropriate copper
tracks inside the motherboard.
The first motherboards had quite a number of
expansion slots that allowed other boards, used
to manage various input and output devices such
as the keyboard, mouse, video, printers and
storage devices (hard disk, floppy disk, CD and
DVD players), to be connected to them. Modern
motherboards integrate all the electronics needed
to create a complete computer: video card, USB
ports for connecting a keyboard, mouse, printer
and even the board for the network connection
thanks to the recent progress in the production of
increasingly complex and smaller integrated
circuits. These features make it extremely easy,
at least for insiders, to assemble a personal
computer. You can just plug in the CPU and the
memory and connect the mass storage devices
through special cables to the specially made
connectors on the motherboard.
Probably the most difficult operation during the
assembly phase is inserting the whole thing in a
case equipped with the power supply which is
needed to provide the right electrical parameters
to all the components, to make them work
properly.
In choosing a motherboard we need to take into
account the necessary CPU to work with; in fact
every motherboard contains a socket that holds
an integrated circuit or a microprocessor
corresponding to the desired CPU. The main
difference between microprocessors is the number
and positioning of their pins and the data that is
sent and received through them. The socket
connections must correspond to the chosen CPU
pins, otherwise the system might not work
properly or, even worse, it can get damaged.
These are the reasons why companies produce
more than one type of motherboard, so it can
support families of CPUs; therefore, a group of
CPUs share the same pins.
GLOSSARY
motherboard: scheda madre
printed: stampato
copper: rame
expansion slot: slot di espansione
feature: caratteristica
power supply: fonte di alimentazione
socket: presa
support (v.): sostenere, supportare
23
4. The Motherboard
READING COMPREHENSION
1. After reading the passage, answer the following questions.
1. What is a motherboard? …………………………………………………………………………
………………………………………………………………………………………………………
2. Why can it be considered an electrical support? ……………………………………………
………………………………………………………………………………………………………
3. What is the function of the bus? …………………………………………………………………
………………………………………………………………………………………………………
4. What are the main features of modern motherboards? ………………………………………
………………………………………………………………………………………………………
5. What is it important to do during the assembly phase of a motherboard? …………………
………………………………………………………………………………………………………
6. What is the role of a socket within the motherboard? …………………………………………
………………………………………………………………………………………………………
7. What is important to remember in order to avoid the risk of damaging the system? ……
………………………………………………………………………………………………………
8. Why are there different types of motherboards on the market? ……………………………
………………………………………………………………………………………………………
TRANSLATION
2. Translate the following sentences into English.
1. I computer sono usati per vari scopi come scrivere, elaborare dati e informazioni.
………………………………………………………………………………………………………
2. La scheda madre funziona da centro delle comunicazioni.
………………………………………………………………………………………………………
3. Più in fretta lavora la CPU, più potente è il computer.
………………………………………………………………………………………………………
4. Il codice ASCII onnipresente è stato originariamente definito come un set di caratteri
a sette bit.
………………………………………………………………………………………………………
5. L’unità di capacità di stoccaggio di misura è il byte.
………………………………………………………………………………………………………
24
1. Hardware, Bits and Codes
PET
Listening – Part 2
11
3. For each question, choose the correct answer.
1. You will hear two friends talking about
watching films on the computer. What kind
of solution does the man suggest?
 A. To buy a new computer.
 B. To install a new graphics card.
 C. To adjust the picture quality of the
screen.
2. You will hear two friends talking about a
new computer. The woman thinks that
 A. her device seems unable to manage
more programs open at the same
time.
 B. she really can’t manage with that new
computer.
 C. she should add some extra RAM
memory.
3. You will hear two friends talking about
some videos to share. What’s the best way
to do that?
 A. Copying them on the computer’s
hard disk.
 B. Adding a new USB port.
 C. Transferring them on an external hard
disk.
4. You will hear a man complaining about his
computer. What does his friend suggest
him to do?
 A. He thinks his computer is too old and
slow, especially for playing computer
games.
 B. He wonders if he could buy a new
microprocessor.
 C. She proposes him to upgrade the
CPU.
5. You will hear two friends talking about the
new speakers she’s bought. What does
the man propose?
 A. He suggests her to get new ones.
 B. He proposes to change the sound
card of the computer.
 C. He suggests to check the sound
quality.
25
5. Memory
5
Memory
12
The component of the computer used to store
or remember information.
All computers have some internal memory
located within the system and close to the
central processor.
One of the fundamental components of
computer architecture is the working
memory, which holds data and instructions
required for the processing done by the CPU
and which stores the results from every
computation. The working memory is better
known as RAM in modern computers.
Random Access Memory is electronic
memory available as integrated circuits.
From the logic point of view, we can think of
the memory as a set of cells where every cell
can contain a byte, which is equal to an
alphanumeric character. Each cell is identified
by a progressive number called ‘address’, which
unambiguously identifies that cell, thus
allowing the CPU to select any single cell to
read or edit its contents.
The term Random Access refers to the way
that the CPU reaches the various memory cells,
that is, via their address instead of being
accessed sequentially like in memory tapes,
where the desired cell is found by analysing the
cells one by one. The ‘random’ term could be
misleading because there are no random things
in the mechanisms of memory management.
The main features of all memories, including
RAM, are storage capacity and access
time. The former is the amount of data that
can be stored, while the latter is the
read/write speed of data in the memory itself.
The storage capacity unit of measurement
is the byte, which corresponds to the amount
of memory needed to store an alphanumeric
character as well as the size of a single cell.
In modern computers, especially when referring
to RAM or storage devices (hard disk, CD and
DVD), the capacity is expressed in multiples of
bytes: kilobytes, megabytes, gigabytes and
terabytes. A kilobyte equals 1,024 bytes (2 to
the power of 10), a megabyte equals 1,024
kilobytes, a gigabyte equals 1,024 megabytes,
and a terabyte equals 1,024 gigabytes. To
have a reasonably accurate idea of size, we can
replace the factor 1,024 with 1,000, which
allows an easier calculation. We can therefore
say that a kilobyte is approximately 1,000
bytes, a megabyte is approximately one million
bytes, one gigabyte is about one billion bytes,
and so on.
The access time is the time span that goes
from the moment when a memory device
(RAM or mass memory) receives the request
from the CPU to read or write data in a
particular cell, to the time when the data is
actually read or written. Since the writing
operation is usually more expensive in terms
of time, the access time is related to writing.
The access time is measured in submultiples
of a second and is generally expressed in
nanoseconds (billionths of a second) for
electronic types of memories like RAM, and in
milliseconds (thousandths of a
second) for mass storage
devices such as hard disk
devices, which are way
slower because of the
necessity to move
mechanical parts to
terminate their
operation.
GLOSSARY
store (v.): immagazzinare
hold (v.): tenere, contenere
cell: cella
thus: in modo da, così
VOCABULARY
the former… the latter: il primo/i primi…
il secondo/i secondi
allow (v.): permettere, consentire
submultiple: sottomultiplo
– PAIR WORK
1. Read the passage and with a classmate look for the definitions of the following terms.
1. RAM
2. Working memory
3. Milliseconds
4. Address
5. Storage capacity
6. Memory
7. Gigabyte
26
1. Hardware, Bits and Codes
READING COMPREHENSION
2. Read the passage and decide if the following sentences are true (T) or false (F).
Correct the false ones.
T
F
1. ‘RAM’ is not available as integrated circuits.
………………………………………


2. Access time is measured in multiples of bytes. ……………………………………


3. RAM is a typical feature of modern computers. ……………………………………


4. Terabytes are multiples of bytes. ………………………………………………………


5. Access time, as well as storage capacity, is available only in specific types
of computer memory. ……………………………………………………………………


6. Hard disk devices are slow because they lack memory.……………………………


7. 1,024 kilobytes make a megabyte. ……………………………………………………


READING COMPREHENSION
3. Reorder the multiples of bytes, starting with the smallest one.
…… Gigabyte
6
…… Kilobyte
Bits and Codes
We have seen that a byte is the unit of data
storage capacity for the memory, and
corresponds to the space needed to store an
alphanumeric character. Despite its reduced
capacity, the byte is not the smallest
information unit that can be memorised in a
computer – the bit is. The meaning of the
word ‘bit’ also comes from the words binary
digit, a number that can assume two values
only: 0 and 1. Other information, such as true
or false, or yes or no, can be associated with
these values.
It is possible to represent (encode) any number
or any generic information by using a set of bits
in a binary system. For instance, if we want to
represent the traffic light state, we can
associate 11 with green, 00 with red, 01 with
amber and 10 with blinking amber. As the
example shows, the higher the amount of
information to represent is, the higher the
amount of bits to associate with each
information (to have a string of zeroes and a bit
that identifies each piece of information in a
unique way) is going to be. We can say that a
byte is a string of 8 bits since we need 8 bits to
represent any of the standard alphanumeric
keyboard characters.
We can ask ourselves why computer memory is
represented as sets of binary digits such as 0
and 1. Well, the answer is quite simple: 0 and 1
are values that can be easily generated,
…… Terabyte
…… Megabyte
13
memorised, processed and transmitted by
electronic circuits. Let’s analyse this picture to
clarify the above statement: a lamp will turn on
as we turn its switch on, and will turn off as
we turn its switch off. Both switch states can be
represented with values like 0 when the switch
is on and 1 when it’s off.
Indeed, a computer can be seen as a gigantic
matrix of switches operated by appropriate
electrical signals rather than by our manual
intervention. The first electronic computers had
these switches made with vacuum tubes,
GLOSSARY
despite: nonostante
digit: cifra
value: valore
blinking: lampeggiante
keyboard: tastiera
switch: interruttore
27
6. Bits and Codes
modern computers use transistors, located
directly inside as integrated circuits. We
might ask ourselves ‘What is a bit?’. Well, we
could say that it is a transistor with
infinitesimal dimensions within a memory chip
or a CPU. The invention of the transistor, as
we know it today, was made by William
Shockley, who designed it in 1948 and
received a Nobel Prize for Physics in 1956
along with colleagues Walter Brattain and
John Bardeen. A drastic reduction in the size
of electronic equipment, which is one of the
main obstacles to the development of
increasingly complex and powerful computers,
was made possible with the use of transistors
instead of vacuum tubes.
VS
GLOSSARY
inside: all’interno
instead of: in luogo di, invece di
VOCABULARY
1. Match the pictures with the words in the box.
string  CPU  vacuum tubes  matrix  transistor  electronic circuit
1. ………………………………
2. …………………………………
3. ………………………………
4. ………………………………
5. ………………………………
6. ………………………………
READING COMPREHENSION
– PAIR WORK
2. After reading the passage, answer the following questions with a classmate.
1.
2.
3.
4.
5.
6.
7.
What is a byte?
Is the byte the smallest information unit that can be memorised in a computer?
What does ‘bit’ stand for?
How many values can a binary digit have?
Why is using a set of bits in a binary system important?
Why is a byte said to be a string of 8 bits?
To what extent do the components of the first electronic computers and the
modern ones differ?
8. Why was William Shockley awarded the Nobel Prize for Physics in 1956?
28
1. Hardware, Bits and Codes
7
Binary Codes and ASCII Code
14
The computer is an electronic machine that is able to recognise only two
values: zeroes and ones. Obviously, these values cannot be intended as
we understand them, but they correspond to electrical signals or, more
precisely, to voltage levels: 0 corresponds to zero volts and the value 1
corresponds to a voltage of a few volts. 5 volts are quite often used to
represent the value 1 even though modern personal computers tend to
use lower voltage levels to optimise performance and power supply
consumption. If we have only two digits available, this does not imply a
limitation on the amount and nature of information that can be stored and
processed by a computer, but only a tie that must be respected for their
representation, or their encoding.
Thanks to techniques like floating point representation, we can display
either large or small numbers without using long and difficult sequences
of 0s and 1s.
When the information to represent is not a numeric value, then we should
associate to each piece of information a sequence (binary string) of
zeros and ones in such a way as to make each element identified by
distinguishing it from others. This is called ‘encoding’. The more
information there is to be encoded, the longer the binary strings will
be. To clarify the concept of encoding, let’s assume we have to
represent the four compass points. We can associate North with 00,
South with 01, East with 10 and West with 11. But even if we had to
represent the intermediate points NE, SE, NW and SW we would not
have any available long string combinations of zeros and ones formed
by at least three digits or three bits. In this way we can associate a
binary string with any distinct information and get, for example, 000 for
North, 001 for South, 010 for East, 011 for West, 100 for North East,
101 for South East, 110 for North West and finally 111 for South
West. Encoding can also be done by using more binary
digits than what is strictly necessary, and so by
GLOSSARY
referring to the previous example we could have to
select strings of four or more bits using only a portion
voltage: tensione
elettrica
available: disponibile, a disposizione
of possible distinct combinations arising from them.
tie: vincolo
In this case, the encoding is defined as redundant
encoding: codifica
and is mainly used in telecommunications for the
arise from (v.): verificarsi, avere origine da
recognition and automatic error correction in data
redundant: ridondante
transmission.
29
7. Binary Codes and ASCII Code
Data encryption requires the producers of digital electronic systems to
adopt some specific rules. For example, a manufacturer of keyboards
cannot adopt a coding of its own choice as we did for the cardinal
points, but must respect a standard which is known as ASCII code.
This encoding guarantees that by connecting the keyboard produced
by company X to the computer produced by company Y, when we
press ‘A’ the computer will recognise the code sent by the keyboard
as the character ‘A’. ASCII stands for American Standard Code for
Information Interchange and is the standard for the exchange of
information. It provides the basis to associate a string of eight binary
digits, or a byte to every character, and then justifying what we
have previously said: one byte corresponds to the memory space
required to contain an alphanumeric character.
GLOSSARY
justify (v.): spiegare,
giustificare
alphanumeric:
alfanumerico
VOCABULARY
1. Use a monolingual dictionary and orally explain the following words taken
from the passage above. Do you understand them all?
• Sequence
• Binary string
• To encode
• Redundant
• Encryption
• To require
• Abbreviation
• Alphanumeric
Meet a Very Special Computer – HAL 9000
Hal 9000 is a peculiar computer indeed. It is one of the main characters – in a way, the protagonist –
of Stanley Kubrick’s film 2001: A Space Odyssey. As the title suggests, the story takes place on the
Discovery One spaceship which is controlled and maintained by the high-tech computer Hal 9000.
2001: A Space Odyssey was filmed and released in 1968, and being a
science fiction movie, the computer was given features that made it
very different from real computer machines of that time.
Hal 9000 can:
• speak;
• recognise faces and people;
• read lips;
• play chess;
• express and infer emotions.
PET
Writing – Part 3
2. Read the following quotation and write a short text to comment it and express your
point of view. Write your answer in about 100 words.
‘I do not fear computers. I fear the lack of them.’ (Isaac Asimov)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
MIND MAP
Amount of data
that can be stored
Read / Write speed
of data in the memory itself
is
is
Storage capacity
Access time
Main features
WORKING
MEMORY
known
as
RAM (Random
Access Memory)
holds
from logic
point of view
stores
Data
and instructions
required by CPU
Results
from every
computation
Is a set of cells
each of them
containing a byte
GLOSSARY
31
Microprocessor
ALU (Arithmetic
and Logic Unit)
Motherboard
Binary Code
Pin
CDs/DVDs
Plug
Computer
Punched cards
CPU (Central
Processing Unit)
Socket
CU (Control Unit)
Spreadsheet
Enigma Machine
Switch
GUI (Graphical
User Interface)
Transistor
Keyboard
Vacuum Tube
glossary • glossary• glossary• glossary• glossary• glossary• glossary• glossary
Alphanumeric
Audio
INPUT, OUTPUT AND
STORAGE DEVICES
• Types of Computers
• The Computer System
• Computer Storage
1
Types of Computers
When we speak about computers we can refer to any
device used to perform calculations with numbers,
even a simple abacus. However, nowadays we
normally think of a computer as an electronic device
which carries out tasks or calculations by following a
specific series of instructions called ‘a program’. A
computer is a combination of hardware and software.
Hardware refers to all the pieces of equipment that
you can see and touch, for example the keyboard,
the screen and, most important of all, the Central
Processing Unit (CPU), a microprocessor which
functions as the brain of the computer controlling all
its actions. Software refers to all the programs
which tell the hardware what to do.
Computers come in all shapes and sizes, from a tiny
embedded computer built inside a microwave oven
to a gigantic mainframe computer which can be as
big as an entire room. Embedded computers are
microchips found inside a variety of machinery and
equipment, including pocket calculators,
smartphones, car engines and video game consoles.
They are pre-programmed to carry out a very
specific, limited number of tasks. Mainframes are
large powerful super computers with thousands of
linked microprocessors, used by governments and
universities to perform highly complex calculations.
The most common type of computer is called a
‘personal computer’ because it is designed to be used
by one person at a time, and has developed into a
number of different forms.
2
• Bits and Codes Part 2: How Big Is a Bit?
From Valves to Transistors
and Integrated Circuits
15
A picture showing Alessia Ranzi, Alessandra Rebecchi
and their students from Aldini Valeriani High School in
Bologna at Cosworth Electronics UK.
GLOSSARY
abacus: abaco
screen: schermo
built inside: costruito all’interno
embedded: integrato
mainframe: elaboratore centrale
at a time: alla volta, per volta
33
1. Types of Computers
READING COMPREHENSION
1. Read the passage and give a simple explanation of the following terms.
1.
2.
3.
4.
5.
6.
Hardware ……………………………………………………………………………………………
Software ………………………………………………………………………………………………
Program ………………………………………………………………………………………………
Personal computer …………………………………………………………………………………
Embedded computer ………………………………………………………………………………
Mainframe computer ………………………………………………………………………………
VOCABULARY
2. Choose the correct name (A-I) for the computer in each picture.
A. Notebook/Laptop
……
B. Smartphone
……
C. Personal computer
……
D. Desktop
……
2
3
1
6
4
E. PDA (Personal Digital
Assistant)
……
F. Tablet
……
G. Device with embedded
computer
……
5
7
8
H. Mainframe computer
……
I. Netbook
……
LISTENING
9
16
3. Listen and decide which device corresponds to each of the following descriptions.
1. They allow the user to access the Internet and make phone calls.
…………………………………………………………………………………………………………
2. Their shape and screen size makes them suitable for watching videos and reading e-books.
…………………………………………………………………………………………………………
3. They are as powerful as desktop computers and are easier to transport.
…………………………………………………………………………………………………………
4. They are very easy to carry and are mainly used to store data.
…………………………………………………………………………………………………………
5. They consist of separate components which need to be connected.
…………………………………………………………………………………………………………
6. They were designed particularly for web browsing and e-mail.
…………………………………………………………………………………………………………
34
2. Input, Output and Storage Devices
CHECK YOUR KNOWLEDGE
4. With the help of the pictures below describe the range of computers now in use.
3
1
2
VOCABULARY
5. Match each word or expression (1-15) with the correct definition (A-O). Report orally
the Italian translation of the words to the teacher.

2. 
3. 
4. 
5. 
6. 
7. 
8. 
9. 
10. 
11. 
12. 
13. 
1.
Back-up
Bluetooth
To configure
To crash
To digitise
To erase
Driver
Hertz
High-definition
To log on
Peripheral
Portable
Universal Serial Bus
(USB)
14.  To upgrade
15.  Wi-Fi
A. A copy of the information held on a computer, stored
separately from the computer.
B. A piece of hardware, such as a printer, which is external to a
computer but connected to it and controlled by it.
C. A piece of software which allows a peripheral device to work
with a computer.
D. Technology allowing two electronic devices which are close
together to communicate using radio waves and without wires.
E. A unit of frequency equal to one cycle per second.
F. A way of connecting a device to a computer using wires so
that they can work together.
G. A way of connecting computers or electronic devices to a
network without using radio waves.
H. Having a high quality screen which can show images in
great detail.
I. Light and easy to carry.
J. To arrange a computer or other electronic system so that it
works with other equipment.
K. To connect a computer to a computer system so that you
can start working.
L. To make a device or program better and be able to do more
things.
M. To remove information from a computer memory.
N. To suddenly stop functioning.
O. To translate information into a digital form.
TRANSLATION
6. Translate the following sentences into English.
1. I computer sono usati per controllare i movimenti dei robot industriali.
…………………………………………………………………………………………………………
2. Un modem comunica con altri computer usando le linee telefoniche.
…………………………………………………………………………………………………………
3. Il mouse è un piccolo congegno attivato dalla mano che controlla il movimento del punto
di inserimento sullo schermo. ………………………………………………………………………
…………………………………………………………………………………………………………
4. I mainframe possono elaborare più informazioni e risolvere i problemi più complessi
di qualsiasi altro tipo di computer. …………………………………………………………………
…………………………………………………………………………………………………………
35
2. The Computer System
2
The Computer System
A computer is a complex device consisting of many different components. This hardware
can be divided into four groups corresponding to the four basic computer functions.
The computer
• takes in data;
• processes the data according to the instructions in the programs;
• shows the results of this processing to the user;
• stores these results in its memory.
WARM-UP
1. Match each word listed below with its correct definition.
1.
 Input
is
A.
B.
2.
 Processing
is
3.
 Output
is
4.
 Storing
is
C.
D.
the equipment which displays the results
of the computer work (printer, screen etc.).
the equipment needed to feed data into
the computer (keyboard, mouse etc.).
the hardware which functions as the
computer memory (hard disk). It allows
storage of data so that it can be used
again in the future.
the equipment which follows the orders of
programs to transform data. The most
important element is the microchip called
the Central Processing Unit (CPU).
Hardware Groups
All the different pieces of hardware are somehow interlinked
through a communication network called a ‘bus’. The centre
of communications is the computer principal circuit board,
known as the ‘motherboard’, which works under the
control of the CPU. The CPU is therefore the most
fundamental element of computer hardware with a
double function. It processes the data the users
input into a computer. At the same time, it also
controls the operations of all the other pieces of
hardware so that the computer functions as a single
unified system.
The faster the CPU works, the more powerful the
computer is. The speed of a CPU is determined by its
clock frequency and is measured in hertz (Hz), cycles
per second, with each cycle representing one
elementary operation. A CPU with a clock speed
of 4GHz (gigahertz) can perform 4 billion
operations every second. The faster the
clock, the more instructions the CPU can
execute per second.
GLOSSARY
interlinked: interconnesso
unified: unificato
perform (v.): compiere
36
2. Input, Output and Storage Devices
READING COMPREHENSION
2. Read the passage and match the beginning of each sentence with the correct ending.
1.
2.
3.
4.
5.
6.
7.
8.








A bus
Computer hardware
A CPU
A hard disk
A motherboard
An input device
An output device
The clock speed
A.
B.
C.
D.
E.
F.
G.
H.
can be divided into four groups.
feeds data into the computer.
functions as the computer memory.
indicates how fast the computer can work.
is a communication network linking the hardware.
is the computer central circuit board.
processes data and controls computer operations.
shows the results of the computer work.
VOCABULARY
3. Match the pictures of input and output devices (1-15) with their name (A-O).
K. Scanner
……
G. Microphone ……
L. Touchscreen
……
……
H. Printer
……
M. 3D-printer
……
D. Keyboard
……
I. Touchpad
……
N. External hard drive ……
E. Mouse
……
J. Modem
……
O. USB key
A. Joystick
……
F. Speaker
B. Monitor
……
C. Sensor
……
……
1
2
3
5
4
6
8
7
9
11
10
13
14
12
15
37
2. The Computer System
VOCABULARY
4. Match the names of input and output devices from the previous exercise with the
following descriptions.
A.

Joystick
1. In addition to the letters of the alphabet, this device also
includes function keys to perform special tasks and keys
to control the movement of the cursor on the screen.
B.

Monitor
2. A portable storage device which is generally used to
back up computers, thus avoiding data loss.
3. Registers changes in the external environment, for
example temperature or light, and converts them into
digital data which can be stored by the computer or
trigger it into taking action.
C.

Sensor
D.

Keyboard
E.

Mouse
5. Enables communication between computers over
telephone lines by converting digital data into telephone
signals and vice versa.
F.

Speaker
6. A device that uses light sensors to digitise photographs
and other illustrations, translating them into numerical
form for processing by a computer.
G.

Microphone
7. This device usually takes the form of a flat screen panel
with a display based on liquid crystal technology. Older
models use a cathode ray tube.
H.

Printer
I.

Touchpad
9. This device is usually light and small so it is very easy to
carry around in your pocket and bag to store information
and data.
J.

Modem
10. Transforms digital signals into sound waves which can be
heard by the user as, for example, music or speech.
Scanner
11. This device enables the user to activate the computer by
using a finger to touch symbols or words shown on the
screen.
K.
L.
M.



Touchscreen
3D-printer
N.

External hard drive
O.

USB key
4. By moving this device around any flat surface, the user
can direct the movement of the cursor on the screen. It
can give instructions by selecting icons on the screen
and clicking on a button.
8. Produces output on paper. The most common types are
inkjet, spraying liquid ink, or laser, using a dry ink called
toner.
12. By moving a finger around a small area of sensitive
plastic, the user can control the movement of the cursor
on the screen, select icons and give instructions by
clicking on a button.
13. This device converts sound waves into electronic signals
which can be read by the computer and stored in its
memory.
14. This device manufactures three-dimensional solid objects
from a digital file.
15. This device has a part which can move in different
directions and the movement is translated into
corresponding signals to be shown on a screen or to
control the actions of a robot.
38
2. Input, Output and Storage Devices
LISTENING
17
5A. You will hear a speaker talking about the components inside a computer.
Decide if the following sentences are true (T) or false (F) and correct the false ones.
T F
1. There are five major components in a PC. ………………………………………………  
2. The motherboard is comparable to the brain of the computer. …………………………  
3. CPU stands for Central Procession Unit. …………………………………………………  
4. The speaker compares the CPU with the brain of the computer. ………………………  
5. The people who design CPU chips often hide drawings or pictures under
the cover of the CPU. ………………………………………………………………………  
6. The hidden pictures or drawings are usually very large. ………………………………  
7. RAM stands for Random Access Memory. It holds the data of the software
which is running. ……………………………………………………………………………  
8. Adding RAM to speed up a computer is an extremely difficult operation
to perform. ……………………………………………………………………………………  
9. The video card connects to the CPU via a video card slot. ……………………………  
10. The purpose of the video card is to create images on the monitor.
…………………………………………………………………………………………………  
11. There can be up to four video cards on a single computer machine.
…………………………………………………………………………………………………  
PET
Listening – Part 4
18
5B. For each question, choose the correct answer.
Now you will hear the second part of the recording about computer components.
1. The power supply usually sits
 A.at the bottom of the case.
 B.at the top of the case.
 C.between the CPU and the motherboard.
2. The hard disk holds information
 A.only when the computer is on.
 B.whenever the computer is connected
to a power source.
 C.even when the computer is off.
4. When donating or recycling our old
computer, it is useful to remember that it
may contain a lot of data and personal
information. According to the speaker, the
best way to make sure that no data is
available on the PC is
 A.to destroy the hard drive.
 B.to delete every file carefully and then
empty the trash bin.
 C.to install a proper anti-virus software.
3. The optical drive is placed
 A.at the rear of the PC.
 B.at the top of the case.
 C.at the front of the PC.
5. CDs and DVDs are read via
 A.laser technology.
 B.MRI technology.
 C.ultrasound technology.
39
2. The Computer System
SPEAKING
6. Read the following article on the latest 3D-printed work and report it orally to the class
saying what the main advantages of such a creation would be.
Dubai has opened what it has said to be the world’s first functioning
3D-printed office building, part of a drive by the Gulf’s main tourism and
business hub to develop technology that cuts costs and saves time.
The printers – used industrially and also on a smaller scale to make digitally
designed, three-dimensional objects from plastic – have not been used much for
buildings.
This one used a special mixture of cement, a Dubai government statement
said, and reliability tests were done in Britain and China.
The one-storey prototype building, with floor space of about 250 square metres,
used a 6-metre by 36-metre by 12-metre printer, the government said.
‘This is the first 3D-printed building in the world, and it’s not just a building, it has
fully functional offices and staff,’ the United Arab Emirates Minister of Cabinet
Affairs, Mohamed Al Gergawi, said.
‘We believe this is just the beginning. The world will change,’ he said.
The arc-shaped office, built in 17 days and costing about $140,000, will be the
temporary headquarters of Dubai Future Foundation – the company behind the
project – in the centre of the city, near the Dubai International Financial Center.
Gergawi said studies estimated the technique could cut building time by
50-70 percent and labour costs by 50-80 percent. Dubai’s strategy was to have
25 percent of the buildings in the Emirates printed by 2030, he said.
(Reporting by Lara Sukhtian; written by Sami Aboudi; edited by Louise Ireland)
GLOSSARY
3D-printed office building: edificio a uso ufficio stampato in 3D
mixture of cement: amalgama di cemento
headquarters: quartier generale
READING COMPREHENSION
7. After reading the passage, choose the correct option.
1. Where has the first 3D-printed building
been opened recently?
 A. In Singapore.
 B. In Paris.
 C. In Dubai.
 D. In New York.
2. The 3D-printed building was printed using
 A. carbon and steel alloy.
 B. a mixture of cement.
 C. the latest biotechnologies.
 D. heat-resistant plastic.
3. In the short run, the building will be
used as
 A. a 5-star Hotel.
 B. a Financial Centre.
 C. a Wellness Centre.
 D. Company Headquarters.
4. How long did it take to finish the building?
…………………………………………………
…………………………………………………
5. How much did the building cost?
…………………………………………………
…………………………………………………
6. According to the United Arab Emirates
government
 A. this is going to be the first and only
3D-printed building as it proved to be
too expensive.
 B. investments will be made for more
3D-printed buildings in the future.
 C. this technique has proved to be too
slow to be profitable.
 D. 3D-printed buildings are not safe
enough.
40
2. Input, Output and Storage Devices
3
Computer Storage
19
Internal Memory
The computer works with two types of internal memory.
ROM (Read Only Memory) is a small permanent store of data which
cannot be erased or changed. It contains essential details about the
computer and programs which enable the CPU to start working when the
computer is switched on.
RAM (Random Access Memory) is the memory used by the computer
temporarily to store files and programs which the user is working on at
that moment. The computer transfers the data needed from the hard disk
to RAM because it can work much more quickly with this form of
memory. However, RAM can only keep its contents when the power is
on. As soon as the computer is switched off, data is lost unless a copy has
been saved on the hard disk or on another storage area.
Methods of Storage
There are several ways of storing data more permanently, called ‘backing storage’.
• The hard disk, the main internal backing storage, consists of magnetised
metal disks, one on top of the other. Each disk has thousands of concentric
tracks, divided into sectors, where data is stored digitally. The disks spin rapidly
while reading or writing data. The hard disk has a large capacity, and is able to
store hundreds of gigabytes. You can also add an external drive by connecting a
cable to the USB port.
• SSDs (Solid-State Disks) use integrated circuit assemblies as memory to store
data permanently. Unlike their name suggests, they have neither an actual disk
nor a drive motor to spin a disk. They are more resistant to physical shock than
electromechanical disks (hard, floppy, optical disks) and run silently and faster.
• Optical disks store digital data in the form of small indentations (called ‘pits’)
on the reflective surface of the disk. When inserted into the computer disk drive,
the data is read by moving a laser beam over the pits and reading the change in
position of the reflected beam. The laser can also write data onto an optical disk.
• CDs (Compact Discs) can hold up to 700 MB of data. A CD-ROM contains data
which can only be read; a CD-R (Recordable) is a blank disk which can be written
on only once; a CD-RW (Re-Writable) is a disk on which data can be erased and
rewritten repeatedly.
• DVDs (Digital Versatile Discs) can hold 4.7 gigabytes of data. Variations include
DVD-ROM, DVD-R and DVD-RW. Blu-ray discs can hold up to six times as much
data as a standard DVD.
• Memory sticks (also called ‘pen drives’) use a technology called ‘flash memory’
to store up to 64 GB of data in conveniently small devices. Data can be read or
written by inserting them into the computer USB port. Memory cards, used in
digital cameras and mobile phones, also work with flash memory and fit into
special slots on the side of many computers.
Older forms of data storage include floppy disks, zip disks and magnetic tape.
GLOSSARY
erased: azzerato, cancellato
spin (v.): girare, ruotare
cable: cavo
neither… nor: né… né
indentation: depressione
beam: raggio
repeatedly: ripetutamente
hold (v.): tenere, contenere
tape: nastro
41
3. Computer Storage
READING COMPREHENSION
1. Read the passage and fill in the missing names in the following sentences.
1. A computer …………………………… contains vital programs which allow the CPU to start
working.
2. The 700 megabytes of data on a …………………………… can be read but not changed
or added to.
3. An …………………………… disk is read by a laser beam in a computer disk drive.
4. The …………………………… is the main source of backing storage inside the computer.
5. When a computer is switched off the data in its …………………………… disappears.
6. A …………………………… holds data in the form of flash memory and can be plugged into
a USB socket.
WRITING
2. Using your own words, summarise the key information about computer storage.
1. What is the difference between the two types of internal computer memory?
2. What are the main ways of storing computer data permanently?
PET
Reading – Part 5
3. For each question, choose the correct answer.
PONG, ATARI AND VIDEO GAMES
Modern video games are high-tech, three-dimensional, extremely realistic products, involving
players of different ages in long gaming sessions, either with friends 1. ……… online.
2. ………, it may sound funny to think that one of the 3. ……… successful video games ever
created was a rather plain, two-dimensional table tennis game 4. ……… Pong. It 5. ………
developed and released in the early 1970s 6. ……… Atari – a company 7. ……… products
helped create and spread the electronic entertainment
industry from the 1970s 8. ……… the mid-1980s.
Due 9. ……… the recession of the video game industry
– also known as ‘the video game crash’ – 10. ………
1983 Atari was split and a part of it was later bought by
Hasbro. 11. ………, the brand name Atari is still
associated with famous arcade games 12. ………
Space Invaders, Centipede, Asteroids, Breakout and
many others.
1. A. and
2. A. However
3. A. least
4. A. called
5. A. were
6. A. with
7. A. which
8. A. –
9. A. for
10. A. in
11. A. Eventually
12. A. with
B. with
B. Because of
B. more
B. was
B. has been
B. by
B. whose
B. at
B. by
B. –
B. Furthermore
B. such as
C. or
C. Finally
C. less
C. match
C. was
C. –
C. that
C. by
C. to
C. at
C. Because of
C. as
D. –
D. Due to
D. most
D. play
D. did
D. of
D. wherever
D. to
D. at
D. on
D. Nevertheless
D. such
42
2. Input, Output and Storage Devices
Buying Hardware
20
LISTENING
4. Listen and complete the following paragraphs with the words in the box. There is an
extra word.
increases  unit  time  per  system  swap file  communication  memory 
components  faster  brain  average  rate  powerful  required  by  chip 
balanced  minute  amount
The performances of a personal computer
depend mainly on three main hardware
1. ……………………: the CPU, RAM and hard
disk.
As we have seen, the CPU is the
2. …………………… of our computer and it
executes the instructions provided by
software applications.
The performance of a CPU is affected by its
architecture, for example a quad core is more
3. …………………… than a dual core. Each
CPU ‘core’ in fact is a separate central
processing 4. ……………………, which is the
part of the CPU that actually does the work.
A multi-core 5. …………………… may look
like a single CPU chip, but it actually has
more than one physical central processing
unit on the chip.
From the clock it is possible to know the
calculation speed of a CPU using the simple
formula T = 1/clock, where T is the
6. …………………… needed to perform a
single elementary operation. For example,
with a clock of 1 GHz (gigahertz) T is 1 nS
(a billionth of a second) and with a double
clock we have half time, so speed
7. …………………… clock frequency.
Since the motherboard and RAM work with a
lower clock than CPU, the amount of cache
memory integrated in the CPU itself is
significant. In fact, cache memory is a kind of
RAM that works with the same speed as the
CPU and is filled with data and instructions at
the same time whenever an operation is
being performed by the CPU. If the cache is
empty, the CPU must wait until the next data
and instructions are fetched from RAM with a
consequent slowness of the whole
8. …………………… .
The 9. …………………… of RAM is
involved with multitasking: more RAM means
more applications running at the same time
without a significant decrease in
performance.
Of course, the speed of this
10. …………………… as determined by the
clock provided by the motherboard is
important as well.
In addition, hard disk capacity and
performance are central for a
11. …………………… system, not only when
retrieving or saving data, but also for
multitasking. When RAM is full the operating
system can use a percentage of disk space
called 12. …………………… as a ‘virtual
RAM’ to increase the running of the
applications at the same time. A fast hard
disk may reduce the decrease in
performance when swap file is used.
The performance of the hard disk is specified
by the time 13. …………………… to move the
heads to a track or cylinder (average access
time) plus the time it takes for the desired
sector to move under the head
(14. …………………… latency, which is a
function of the physical rotational speed in
revolutions per 15. ……………………).
A disk with a rotational speed of 7,200 rpm
is 16. …………………… than one with
5,400 rpm.
The speed of a hard disk is also determined
by the data transfer 17. ……………………,
that is, the rate at which the data is
transmitted to the system. It depends on the
interface of 18. …………………… between
the hard disk and the motherboard and is
measured in megabit 19. ……………………
second.
43
3. Computer Storage
RESEARCH TASK
5. Mr Travi owns and runs a holiday company called Norfolk Hero Inc. that offers specialist
holidays to exotic places around the world. Mr Travi is thinking of buying a computer
system for the company and wishes you to advise him on the purchase of the machine.
He has a budget of just £1,000.
The company needs a computer to perform the following tasks:
• design and build a website for the company;
• design a colour leaflet showing trips to Timbuktu and Mongolia as possible places
of interest;
• produce an interactive multimedia presentation for customers;
• make a video showing the exotic locations that the company goes to.
Use the Internet to find the specifications of at
least 3 different types of computer. You may need
to use websites of leading computer manufacturers.
Specifically, Mr Travi is interested in:
• What type of computer he can have within the
budget mentioned above.
• What speed the processor will be and why this is
important. What make of processor is being used.
• What resolution monitor comes with the computer.
• What the hard drive space is and what RAM is
available on the machine.
• What peripherals (hardware and software) come with
the machine (digital camera, scanner etc.).
• What after-sales service is available.
• What guarantee the manufacturers can offer.
• What printer you would recommend and why.
• What storage devices are available with the machine.
• What software comes with the package and how
much an up-grade to office costs.
• What other hardware you would recommend.
1
VIDEO
2 Using a word processor, write
a short report to Mr Travi
explaining which computer is best
for the purpose. Include a picture
and make sure that you answer
the parts mentioned above.
3 Mr Travi has a real gift for
building computers. He is
thinking of launching the Norfolk
Hero Computer Company and
basing it in the town of Swaffham.
Find the latest prices for the
components necessary to build a
computer and make a list, such
as motherboard, memory,
processor, cable etc. What are
their current prices? What
hardware can you find?
3
6. Watch the video ‘How to Identify the Components Inside Your Computer’ and write a
summary of the information while answering the following questions.
• What are the four basic functions of a computer?
• What equipment can be used for each function?
• Why is the CPU the most important piece of hardware?
• Is there a very up-to-date input or output device which has not been mentioned in the text?
SPEAKING
– CLASS DEBATE
7. Divide the class into two groups and debate the following quotation.
Remember to give reasons for your statements. Let your voice be heard!
[
‘Computer games tend to be boys’ games, warlike games with more
violence. We have not spent enough time thinking through how to
encourage more girls to be involved in computing before coming to
college so they can see a possible career in information technology.’
(Freeman A. Hrabowski III)
From www.brainyquote.com
]
44
2. Input, Output and Storage Devices
4
Bits and Codes Part 2: How Big Is a Bit? From
Valves to Transistors and Integrated Circuits
READING COMPREHENSION
1. The paragraphs of the passage have been jumbled. Read them and put them in the
correct order from A to F.
(……) The image shows different types of
transistors, the size and the case depending on the
power each transistor is designed for. But it is
important to notice that the real size of the
‘semiconductor sandwich’ making up the transistor
is a very small fraction of the whole case. Thanks
to the reduced dimensions of the real component,
it is possible to build a complex electronic device in
a single chip of semiconductor, as a computer
memory which is made up of a transistor, resistors
and other components wired together in an
integrated circuit.
(……) Since a vacuum tube can reach a size
comparable to that of a small glass, the first
modern computer memory required a large
amount of space to implement a small amount
of memory used by the CPU to fetch data and
instructions.
(……) Computer production took advantage of
integrated circuit technology, not only to reduce
the size of the memory, but also for the other
components like the CPU and peripherals.
Today it is possible to integrate an impressive
number of transistors in a single chip, e.g. in 2015
the highest transistor count in a commercially
available CPU, Intel’s 18-core Xeon Haswell-EP
(in one chip of a small number of square
millimetres) is over 5.5 billion transistors and this
count is going to increase even more.
(……) In 1950 three American scientists solved the
physical and technological problems of the
transistor thanks to an idea dating back to the early
1900s to use semiconductors instead of vacuum
tubes to build an amplifier. The original transistor
was made of a germanium plate, called a ‘base’,
one face of which was connected to an electrode,
while on the other face two thinner electrodes were
connected: one was called an ‘emitter’, the other a
‘collector’. In this way they had two contact points,
one between the base and the emitter and the
other between the base and the collector. The
well-known transistor graphic symbol (shown in the
image) owes its origin to its initial configuration.
GLOSSARY
semiconductor: semiconduttore
comparable to: paragonabile a
peripheral: periferica
plate: lastra
owes its origin: deve la sua origine
A
(……) ENIAC (Electronic Numerical Integrator and
Calculator), the first modern computer, started
operating in 1946 and had a memory of only
20 ten-digit signed accumulators. Each digit
required 36 vacuum tubes, 10 of which were the
dual triodes making up the flip-flops, which are
electronic circuits used to store a single bit.
(……) A single transistor is only a few millimetres
big and by using it to substitute a vacuum tube to
build a computer memory we can reduce the space
of memory itself or make possible the
implementation of a larger amount of memory in
the same space.
The idea of integrating electronic circuits into a
single device was born when the German physicist
and engineer Werner Jacobi developed and
patented the first known integrated transistor
amplifier in 1949 and the British radio engineer
Geoffrey Dummer proposed to integrate a variety
of standard electronic components in a monolithic
semiconductor crystal in 1952. A year later
Harwick Johnson filed a patent for a prototype
integrated circuit (IC). These ideas could not be
implemented by the industry in the early 1950s,
but a breakthrough came in late 1958. Three
people from three US companies solved the
fundamental problems that hindered the industrial
production of integrated circuits. Jack Kilby of
Texas Instruments patented the principle of
integration, created the first IC prototypes and
commercialised them, thus starting the age of
microelectronics.
GLOSSARY
patent (v.): brevettare
MIND MAP
function
Process data
and instructions
and stores results
in memory
CPU
(Central
Processing
Unit)
factors
of speed
Clock
Cores
Cache
Stores data,
instructions
and results
function
COMPUTER
includes
Memory
technology
Solid state
(integrated circuit)
Optical (CD, DVD,
Blu ray)
Magnetic (hard
and floppy disk)
function
Used to put
information into
and to get
information out
of the computer
Peripheral
devices
categories
(based on their
relationship with
the computer)
Input (keyboard,
mouse…)
Output (video,
printer…)
Input / Output
(modem…)
GLOSSARY
47
Screen
Desktop
Personal
Computer
External Hard
Drive
Printer
Joystick
Scanner
Mainframe
computer
Sensor
Microphone
Speaker
Modem
Touchpad
Monitor
Touchscreen
Mouse
USB Key/
Memory stick
glossary • glossary• glossary• glossary• glossary• glossary• glossary• glossary
3D-printer
Audio
FROM MAINFRAMES
TO SMARTPHONES
• Mainframes, the First Electronic
Computers
• Personal Computers
1
3
• Portable Computers, Notebooks
and Netbooks
• PDAs, Tablets and Smartphones
Mainframes, the First Electronic Computers
Man has always looked for ways to make
calculations and do complex operations. Even
before the advent of electronics, there were
some mechanical machines which could
perform calculations, but their exactness was
poor due to the lack of accuracy of their
moving parts. One of the most successful
examples is the Jacquard loom which could
weave complex patterns simply by ‘reading’ the
holes suitably punched on cardboard cards:
these were the first punch cards.
During the ‘Electronic Age’, mechanical parts
were replaced by relays and vacuum tubes, yet
computers could perform single functions
determined by the electronic components used
and their connections. These calculators were
not programmable, so in order to modify the
function it was necessary to use a welder.
The first programmable electronic computer
was Mark-1 Colossus, used by the British
Army during World War II to decipher the
coded messages sent by the Germans and
anticipate their moves. Alan Turing’s theories
(see Unit 1) laid the foundations for the
creation of modern computers and gave
impulse to the making of Colossus.
Due to the secrecy of the Colossus project for
war reasons, the ENIAC computer was long
believed to be the first programmable electronic
computer in history. Built in 1941, the ENIAC
consisted of 17,468 vacuum tubes, 7,200
diodes, 1,500 relays, 70,000 resistors and
10,000 capacitors and around five million
hand-soldered connections, with the ability to
program the operations to be performed.
One of the original ENIAC programmers was
John von Neumann, the creator of the
architecture of modern computers (see Unit 1).
After World War II, mainframes continued to
grow and became more powerful too, thanks
to the invention of the transistor. Transistors,
replaced the valves, consequently reducing the
size of computers. From their use in war,
mainframes later spread to universities and
industry.
They are still used for specific applications,
especially for calculations in the field of
scientific research. Nonetheless, the progress of
electronics, with its continuous production of
smaller and less expensive components, has led
to a widespread use of PCs.
GLOSSARY
due to: in ragione di, a causa di
lack: mancanza
loom: telaio
21
cardboard: cartone
in order to: allo scopo di, al fine di
welder: saldatore
coded: codificato, in codice
hand-soldered: saldato a mano
spread (v.): diffondersi
49
1. Mainframes, the First Electronic Computers
The Jacquard loom
Mark-1 Colossus
VOCABULARY
1. Scan the passage and look for the English translation of the following words.
1. Cercare ……………………………………
7. Diodo ………………………………………
2. Eseguire ……………………………………
8. Condensatore ………………………………
3. Telaio ………………………………………
9. Sostituire ……………………………………
4. Scheda perforata …………………………
10. Calcoli ………………………………………
5. Saldatore (di parti metalliche) ……………
11. Diffuso, esteso ……………………………
6. Decifrare ……………………………………
READING COMPREHENSION
2. Read the passage and decide if the following sentences are true (T) or false (F).
Correct the false ones.
T
F
1. The first machines able to do calculations were invented
after the advent of electronics. ………………………………………………………… 

2. Changing the function on the earliest computers was not an easy task.
……………………………………………………………………………………………… 

3. The electronic computer Colossus was used to decipher coded messages
during World War I. ……………………………………………………………………… 

4. The Colossus project was classified. ………………………………………………… 

6. Mainframes were no longer used after World War II. ………………………………… 

7. The invention of the transistor had little effect on the size of computers.
……………………………………………………………………………………………… 

8. Nowadays, personal computers are cheaper and more convenient to use
than mainframes. ………………………………………………………………………… 

PET
Speaking
3. Answer the following questions orally.
• Is there a personal computer in your home?
• What kind of computer is it?
• What do you use it for?
• What are the advantages of using a PC at work/school, in your opinion?
• Can you think of any downsides in using personal computers? Give examples.
50
3. From Mainframes to Smartphones
2
Personal Computers
From the end of the 1960s, attempts were
made to make computers extremely widespread,
thus overcoming the problems of cost and size
which were typical of mainframes.
In 1957, the Italian Company Olivetti, stimulated
by Enrico Fermi’s studies in the development of
electronic computers, launched ELEA 9300,
one of the earliest ancestors of modern
computers.
In the 1970s, Hewlett Packard introduced new
computers programmed using BASIC language
that could be placed on a desk. These machines
were equipped with a small display, keyboard, and
even a printer. However, the real impulse for the
proliferation of personal computers occurred after
1975, thanks to the possibility of including several
microprocessors in single integrated circuits and
not by separate components assembled in large
containers.
The year 1981 witnessed the release of the first of
a series of personal computers that became very
popular: the IBM 5150, also known as the IBM
PC. It was still very expensive, had low power,
and needed expensive hard drives or external
tape drives to manage large amounts of data.
On the other hand, it was a solid and reliable
machine and, above all, it was expandable.
This key feature was shared only by ‘Apple II’
at that time.
Due to its success, the IBM PC became the
standard machine in the personal computer
industry. However, since IBM supplied wiring
diagrams with the PC, information technology
industries located in Asia were rapidly able to
clone it; after a few years the world was ‘flooded’
with huge amounts of IBM-compatible PCs, which
were increasingly powerful and at lower costs.
In the meantime, on 24 January 1984,
Apple introduced the Macintosh, another
innovation designed for large-scale
proliferation.
This computer was already equipped with a set of
graphical interfaces and a mouse. The Macintosh
was a huge business success, thanks to a
user-friendly approach, especially as to its
operating system, the Mac OS. Moreover, the
graphical user interface employed easily
understandable ‘metaphors’ such as ‘trash bin’,
‘desk’ and ‘window’ (just like the icons we are now
familiar with), consequently allowing people with
limited computer skills to use computers.
22
GLOSSARY
attempts were made: vi furono tentativi
earliest: dei primi (in senso cronologico)
even: persino
assembled: assemblato, montato
reliable: affidabile
supply (v.): fornire
large-scale: su larga scala
skills: capacità, abilità
51
2. Personal Computers
Following the success of the Macintosh, many of
these features were ‘borrowed’ by Microsoft in the
creation of its Windows operating system,
triggering a legal battle lasting well over a decade.
All these events thus contributed to spreading the
concept of ‘WIMP’ (Windows, Icons, Menus and
Pointer), now a standard in the delivery of all user
interfaces for personal computers, no matter what
their operating system is.
GLOSSARY
trigger (v.): scatenare, innescare
no matter what: indipendentemente da
READING COMPREHENSION
1. Summarise the main events listed in the passage in chronological order by completing
the grid.
When?
SPEAKING
Company/Product
Features
– PAIR WORK
2. Ask and answer questions using the information above with a classmate.
Example:
– ‘When was ELEA 9300 released on the market?’
– ‘It was launched in 1957.’
Ask the Right Question – Use WH Question Words!
Question words are really easy to use. In direct questions, there will always be one and it
will be at the very beginning of the question itself. What are you waiting for? Start asking!
WHO?
WHEN?
WHAT?
WHY?
WHERE?
WHICH?
HOW?
Who was one of the most famous ENIAC programmers?
When did Apple release Macintosh?
What were Hewlett Packard computers equipped with?
Why was it comparatively easy for some IT industries to clone IBM PCs?
Where were the first icons used?
Which features were ‘borrowed’ in the creation of the Microsoft operating
system?
How can you explain the meaning of the acronym ‘WIMP’?
SPEAKING
3. Look at the pictures of ELEA 9300, IBM 5150 and Macintosh (on the previous page).
How different are they from modern computers and laptops we currently use at home
and at work?
52
3. From Mainframes to Smartphones
3
Portable Computers, Notebooks and Netbooks
READING COMPREHENSION
1. The paragraphs of the passage have been jumbled. Read them carefully and reorder
them from A to F.
The growing spread of personal computers
and the simultaneous reduction of the size of
the electronic components made it possible, in
the mid-1970s, to manufacture computers that
could be transported with ease and used in
situations – typically in the industrial field –
where a computer alone could cover different
areas at different times. In addition, it is
important to highlight that in those days
computers were rather expensive, so the
possibility to use only one of these machines
allowed significant savings.
(……) After the release of the IBM 5100,
lighter and lighter portable devices were
made, but it was difficult to go below 10 kg
using CRT screens of acceptable dimensions
that not only contributed to burden the
machine by weighing it down, but affected
negatively on the weight of the batteries due
to the energy consumption.
A
(……) The first portable computer
released on the market was the IBM 5100
in 1975. It weighed 25 kg and looked rather
different to the laptops we know today. What
made these computers so heavy were mainly
the mass storage (tape drives) and the CRT
(Cathode Ray Tube) 5” monitor.
(……) The cost of the earliest notebooks was
significantly higher than desktop computers
having the same performance, mainly
because of the high cost of producing
TFT monitors. Indeed, the cheapest ones
were equipped with a monochrome screen.
Improvements in screen production technology
and, in general, in the electronics field, have
now erased differences in cost between
notebooks and desktops by allowing us to
choose the type of computer according to the
use we make of it, without being particularly
influenced by our budget.
(……) On the other hand, further progress
in the electronic field later led to the production
of the CPU and low-energy consumption,
small-sized mass memories. Moreover, the
construction of even smaller and more
powerful batteries and the availability of thin
and light TFT (Thin Film Transistors) instead
of the old huge and heavy CRT monitors,
eventually led to the production of our
notebooks or laptops as we know them today.
(……) Notebooks are made using two
hardware elements of similar size (monitor and
computer with embedded keyboard and mouse)
which are connected together by one or more
hinges so as to form a structure that
resembles a notebook. The ability to ‘close’ the
computer by superimposing the two blocks
consequently means they are safer and easier
to carry.
(……) Finally, following concerns about the type
of use, the netbook appeared – a small-sized,
slightly power-reduced notebook suitable for
web browsing, e-mailing and word processing.
Generally speaking, if you do not need the most
advanced applications computers can provide,
netbooks are a practical and cost-effective
solution, although they are now being
replaced by tablets – lighter, more practical and
more user-friendly than notebooks.
growing spread: crescente diffusione
with ease: facilmente
lighter and lighter: sempre più leggeri
burden (v.): appesantire
further: ulteriore
instead of: invece di, in luogo di
suitable: adatto
although: anche se
released: lanciato (sul mercato), distribuito
because of: a causa di, in ragione di
hinge: cardine
GLOSSARY
VOCABULARY
2A. Read the passage and underline all the linkers and connectors. What purpose do they
achieve, in your opinion?
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
53
3. Portable Computers, Notebooks and Netbooks
2B. Look at the words below. Can you find any synonyms? Look them up in your dictionary!
1. Furthermore: ………………………………
4. Thus: ………………………………………
2. Nonetheless: ………………………………
5. Actually: ……………………………………
3. Finally: ………………………………………
Did you find any synonyms in the passage, too?
PET
Listening – Part 3
23
3. For each question, write the correct answer in the gap. Write one or two words or a
number or a date or a time.
You will hear a conversation between Jerry and Sue talking about ‘digital natives’ and
‘digital immigrants’.
Jerry and Sue are talking about a 1. ………………… assignment on ICT. ‘Digital natives’ are
typically young people who have 2. ………………… with technology and use it not only for
entertainment, but also to solve problems, communicate, work with other people and learn.
‘Digital immigrants’ are different, because they’re the ones who have to read
3. ………………… and have troubles in using technology sometimes.
The term ‘digital natives’ was first used in 4. ………………… by Marc Prensky in an article.
It seems that when you use technology a lot, you can 5. ………………… and learn differently.
Digital natives are not very keen on reading; digital immigrants, instead, prefer to
6. ………………… a document so they can read it and take notes from it.
CHECK YOUR KNOWLEDGE
4. Test your knowledge on (old) mobile phones by choosing the correct option.
1. The first hand-held mobile 3. How heavy was the first
phone dates back to
mobile phone prototype?
 A.the late 1960s.
 A.1.1 kg.
 B.the early 1970s.
 B.0.5 kg.
 C.the early 1980s.
 C.1.4 kg.
 D.the late 1990s.
 D.0.750 kg.
2. How big was the first
mobile phone prototype?
 A.8 cm long,
2 cm deep
and 7.5 cm wide.
 B.20 cm long,
5.5 cm deep
and 6 cm wide.
 C.23 cm long,
13 cm deep
and 4.45 cm wide.
 D.15 cm long,
15 cm deep
and 5 cm wide.
4. How long could mobile
phone conversations last?
 A.Less than 2 hours.
 B.Less than 1 hour.
 C.About half an hour.
 D.About one hour and
a half.
6. The first commercially
sold mobile phone was
released in
 A.1989.
 B.1976.
 C.1983.
 D.1981.
7. The very first preloaded
game on a mobile phone was
 A.Snake, in 1998.
 B.Tetris, in 1995.
 C.Space Invaders, in 1999.
 D.Pong, in 1989.
8. When were the first apps
5. How long did it take to
commercially released?
recharge?
 A.In 1990, by Nokia.
 A.It took about 4 hours.
 B.In 2001, by Samsung.
 B.It took about 10 hours.
 C.In 1987, by Motorola.
 C.It took about 6 hours.
 D.In 2008, by Apple.
 D.It took about 12 hours.
Adapted from ‘A brief history of mobile phones’, wikipedia.org, www.ding.com
0-4 Maybe you are too young to
know about the early mobile
phones, but carry on and
study ICT!
SCORE
4-6 Well, either your teacher has
given you a couple of hints or
you’re a very keen ICT
student indeed!
7-8 This can’t be possible unless
you ARE an ICT teacher. Well
done, anyway!
54
3. From Mainframes to Smartphones
4
PDAs, Tablets and Smartphones
24
As the evolution of personal computers proceeded, towards the
mid-1980s new devices were introduced. They were hand-held, you
could manage a list of contacts, a calendar of commitments, and
they were equipped with other features such as clock and calculator.
These brand-new devices were real computers that could fit in the
palm of a hand (hand-held computers or palmtop) and were known by
the acronym PDA (Personal Digital Assistant). Over time, PDAs
were equipped with ever-increasing features such as document
management and games, web browsing and e-mailing, as well as real
operating systems. In addition, they could sync contacts and your
calendar with those on personal computers via cable, infrared or
Bluetooth. From the point of view of hardware evolution, there were
significant improvements, especially through the use of touch screens
of increasingly high quality.
Parallel to the evolution of PDAs, from the 1990s there was
considerable development of mobile phones with the production of
devices with more and more features such as a contact list, a calendar,
games and calendar management. That is, the same as the earliest
hand-held devices. With this parallel evolution, it was natural to take
the next step: to provide PDAs with mobile phone features and to
develop the hardware and software of a mobile phone providing it
with the most sophisticated features of a hand-held device. This idea
led to the production of smartphones, which include the functions
of a PDA and a cell phone, thus marking the end of hand-held
computers.
Tactile display technology was also employed on notebooks
between 2000 and 2010 to make the device more compact and
lighter, consisting of a single panel where the computer itself and the
touch screen were ‘built’ together. In this case, a touch screen was
used instead of the keyboard, although it was possible to connect an
external keyboard. In some models, the external keyboard was
provided directly by the manufacturer in the form of a
screen-panel connected to the computer to endow it with the look
of a proper notebook.
These devices were equipped with the hardware of an actual PC and
looked like a tablet, even if of a greater thickness than current
tablets. They were called PC-tablets after personal computers, or
first-generation tablets.
With the evolution of smartphones, whose functions
required higher and higher resolution screens and more
powerful processors, it was possible to rethink the tablet
from the perspective of the architecture of the smartphone,
thus leading to second-generation tablets.
Indeed, these devices are merely smartphones with screen
sizes and functionality like those of a netbook, but smaller
and lighter. Many tablets, unlike netbooks, do not require
external devices to connect to the Internet when you do not
have a Wi-Fi network, thus making it more convenient to
use. As a consequence, as mentioned above, netbooks have
now been replaced by second-generation tablets.
GLOSSARY
commitment: impegno
brand-new device: dispositivo
nuovo di zecca
via: attraverso, tramite, via
that is: come a dire
tactile: tattile
manufacturer: produttore
thickness: spessore
unlike: diversamente da
LISTENING
25
1. Listen and match each word listed below with its correct definition.
1.
2.
3.
4.
5.
6.






Device
PDA
Notebook
Tablet
Smartphone
Tactile
A. A mobile phone with computerised features
which can access web services.
B. Relating to or affecting the sense of touch.
C. A flat, hand-held, rectangular-shaped computing device.
D. Something made for a particular purpose or function.
E. A small, light laptop computer.
F. A lightweight hand-held digital device capable of
managing different functions.
56
3. From Mainframes to Smartphones
PET
Reading – Part 5
2. For each question, choose the correct answer.
ON’
THE ‘APP REVOLUTI
Have you 1. ………… counted how many apps are displayed on your tablet
or smartphone? I’ve just done that and there are ‘only’ 38. A friend of mine
has 2. ………… 150, and as she’s a 3. ………… person, her apps are neatly
stored in elegant folders, labelled by topic: ‘Work’, ‘Music’, ‘Social media’,
’Well-being’, ‘Games’, ‘Utilities’ and so on. There is virtually an app – very
often, more 4. ………… one – for every situation and need. And they’re
5. ………… easy to use, so colourful and very cheap too – many of us would
have trouble thinking of a world with no apps, nowadays, wouldn’t we?
Yet it may seem odd to think that our commitment
6. ………… the app world started in about 2007, so it is comparatively a short
period of time. Even 7. ………… attempts had been made earlier, what is
sometimes referred to as ‘The App Revolution’ is still closely associated with
the launch of Apple’s first smartphone, that is, the worldwide-known iPhone,
in 2007, and the release of the App Store the following year. At the beginning,
there 8. ………… about 500 applications to choose 9. …………, while
nowadays there are over one million available. Of course, not only iOS
provides apps. Most apps can be 10. ………… either in the iOS or the
Android version, both operating systems being used by customers on
different devices. I could linger on the topic for hours, but 11. ………… on
a minute… what’s that sound? Oh dear! My calendar’s reminding me
12. ………… my dentist’s appointment!
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
A. always
A. for
A. clean
A. that
A. so
A. with
A. though
A. are
A. about
A. found
A. wait
A. of
B. never
B. about
B. messy
B. then
B. not
B. at
B. but
B. wasn’t
B. at
B. find
B. tell
B. that
C. ever
C. with
C. tidy
C. than
C. such
C. by
C. yet
C. were
C. from
C. finding
C. why
C. to
D. tried
D. because
D. cheerful
D. this
D. are
D. to
D. some
D. was
D. to
D. founded
D. hold
D. at
57
4. PDAs, Tablets and Smartphones
PET
Writing – Part 1
3. This is part of an e-mail you have received from a Scottish penfriend.
In my free time I like playing games on my tablet. My favourite one is ‘Clash of Clans’.
Do you like playing videogames? What are your favourites? My nick is ‘McBraveOne’.
What’s your nickname? How often do you play, and how long?
Write a reply to your penfriend and answer his/her questions in about 100 words.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
SPEAKING
– CLASS DEBATE
4. Divide the class into two groups and debate the following statement. Remember
to give reasons for your ideas. Let your voice be heard!
[
Should students be allowed to use smartphones in class?
Could they be used as a tool to improve education and teamwork
or are they just another way to lose yourself and be distracted?
]
MIND MAP
Colossus
Mainframes
Eniac
Hewlett
Packard
Personal
computers
IBM 5150 (1981)
IBM PC, IBM
Compatible
and Apple
MacIntosh
A key contribution to its
creation was given by Alan
Turing
One of the original
programmers was John von
Neumann, the creator of
the architecture of modern
computers
Programmed using BASIC
language and equipped
with small display, keyboard
and printer
It was still very expensive
and had low power
Increasingly powerful at
lower costs and user-friendly
interface
COMPUTERS
Notebook
Portable
computers
Netbook
PDA (Personal
Digital Assistant)
Hand-held
computers
Smartphone
Tablet
Progress in the electronic
fields led the production
of smaller and lighter
computers with powerful
batteries and low energy
consumption
Small-sized and power
reduced notebook suitable
for web browsing, e-mailing
and word processing
Used to manage lists of
contacts and a calendar
of commitments
The parallel evolution of
PDA and mobile phones led
to the production of one
device including the
functions of both devices
Tactile display technology
made devices more
compact and lighter. Using
touch screen instead of
keyboard and progress in
the electronic fields led the
production of thin hand
held portable computers.
GLOSSARY
59
Notebook/
Laptop
Battery
PDA (Personal
Digital Assistant)
Capacitor
Pointer
Cardboard
card
Relay
Diode
Resistor
Display
Smartphone
Icon
Tablet
Loom
Trash bin
Netbook
Welder
glossary • glossary• glossary• glossary• glossary• glossary• glossary• glossary
App
Audio
4
AUTOMATION
AND ROBOTICS
• Introduction to Automation
• Using PCs in Automation –
Microcontrollers
• Open Source Computer Boards
• Domotic Applications
• Industrial Applications
WARM-UP
brainstorming
• Have you ever heard the word ‘Automation’?
• What does it usually refer to?
• Can you think of any examples of automation you know?
1
Introduction to Automation
26
A. Humans have always tried to apply their invention
of machines to the fields of trade and commerce,
just think of the machines designed by Leonardo da
Vinci with applications in agriculture and industry.
The concept of automation can be defined as
machines that are capable of replacing human
functions through automatic process control.
One of the first examples of ‘automated control’ is
the water clock (shown left). Water clocks, as well as
other instruments such as oil lamps, wine dispensers
and water tanks, were equipped with float-valve
regulations. These devices have been used since
ancient times (Greek, Arabic and Egyptian societies).
GLOSSARY
field: campo, ambito
replace (v.): sostituire
tank: cisterna
For further information on water clocks and on the history
of automated control engineering, go to the YouTube video
provided by the Edison Tech Center:
www.youtube.com/watch?v=KlxYtk4Fiuw&noredirect=1.
61
1. Introduction to Automation
On the right: a fantail, that is, one
of the earliest feedback control
mechanisms mentioned in recorded
history. A fantail is essentially a small
windmill mounted at the rear of a
windmill. This device was patented in
1745 by Edmund Lee, an English
blacksmith, and was later perfected
on mills around Leeds and Hull
towards the end of the 18th century.
Nowadays we can spot fantails on
all types of traditional windmills and
are especially useful where changes
in wind direction are frequent.
B. Whenever a computer is used
with a machine to replace human
toil, the automation concept can be
better explained and understood as
the use of machines that control
other machines in the performance
of a production process. As a
machine capable of processing large
amounts of information rapidly,
the computer proves to be the most
efficient device to handle an
automation process.
GLOSSARY
fantail: rotore ausiliario
at the rear: nella parte posteriore
spot (v.): avvistare, scorgere
amount: quantità
C. Actually, the statements above
should not be such surprising
news, since we have all seen
TV commercials and videos of
automated factories, quite often in
the automotive field, where robots
are used to assemble a product.
What is perhaps not easy to
understand is how an electrical
signal, which contains either
information or a command, can be
converted into a corresponding
mechanical action, and vice versa.
D. A computer on its own is unable to control the reality
around it. We know that software is necessary for it to perform
the functions we want it to execute. To do so, however, we also
need to equip our machine with ‘senses’ similar to the human
body’s that requires the five senses to interact with the outside
world. This can be achieved by using so-called transducer
devices, which can measure a physical quantity through an
element called a sensor, and turn it into an electrical value that
will be proportional to the initial physical quantity. In this way,
for example, it is possible to ensure that a computer can acquire
the temperature of a room by means of a suitable transducer
and decide, based on a previously set reference value, whether
to turn on air conditioning, heating or neither of them.
E. Furthermore, when dealing with automated factories, we
should point out that an opposite conversion also needs to be
performed. That is, an electrical command – supplied by a
computer – has to be changed to a mechanical movement.
When dealing with rotating movements, electric motors are used
directly as Direct Current servo motors (gear motors),
actuators (servo) or stepper motors. In case of rectilinear
movements, linear actuators – devices able to turn the rotary
motion of an electric motor into a linear displacement of a
mechanical element – are used.
F. Automation is now a reality not only in factories, but also
in our everyday life. Good examples are on-board computers
that equip not only luxury cars but also city cars and home
automation, which we shall deal with later in this unit (see
Domotic Applications). The current spread of automated
technology was made possible not only through the evolution
of computers, but also to the possibility of making transducers
increasingly accurate and reliable. The transducer is, in fact, a
critical component of an automation system because it is often
in contact with the external environment and it is likely to be
operated in highly variable weather conditions. Possible threats
therefore include sudden changes in temperature and pressure
(e.g. in a weather station) or the presence of corrosive agents
which tend to wear out the device thereby making it useless or,
even worse, altering the value of the measure.
GLOSSARY
surprising: sorprendente
either … or: o … o
unable: non in grado di
so-called: cosiddetto
transducer: trasduttore
actuator: attuatore
stepper motor: motore
passo-passo
factory: fabbrica
through: tramite, mediante,
attraverso
environment: ambiente
threat: minaccia
useless: inutile
63
1. Introduction to Automation
READING COMPREHENSION
1. Match the headings (1-7) with the paragraphs (A-F). There is an extra heading.
1.
2.
3.
4.
Automation today
Transducer devices
Origins of automation
Beyond automation
……
……
……
……
5. Automation and computers
……
6. What automated factories need ……
7. Examples of automated facilities ……
READING COMPREHENSION
2. After reading the passage, choose the correct option.
1. Ever since ancient times
 A. humans have dreamt of computers
to help them.
 B. humans have tried to ease their
labour by using machines.
 C. humans have firmly refused to be
helped by machines.
2. Automation implies
 A. interaction between humans and
machines.
 B. separation between computers and
humans.
 C. interaction between computers and
machines.
3. ‘Automated factory’ means
 A. a factory ruled by automated machines.
 B. a factory with a high rate of automation.
 C. a factory where workers are useless.
4. Transducer devices
 A. are just like the human body as they
have electrical sensors.
 B. need no sensors to collect and
process electrical data.
 C. employ sensors to measure physical
quantities and turn them into
electrical data.
5. In automated factories
 A. electrical commands need to be
changed into mechanical movement
and vice versa.
 B. only the conversion from electrical
impulse to mechanical movement is
relevant.
 C. what really matters is the conversion
from mechanical movement to
electrical impulse.
6. Nowadays, automation
 A. is relevant and employed in the
industrial field only.
 B. can be found mainly in the
automotive industry.
 C. is widespread in a number of
different applications.
7. Some of the threats transducers face
 A. depend on the reliability of their
sensors as they are not high-tech
enough.
 B. are due to varying outdoor
conditions.
 C. can be overcome by using
transducers only inside sheltered
buildings.
READING COMPREHENSION
3. Match the beginning of each sentence with the correct ending.
1.

Ever since ancient times, water
clocks and other tools
A. in places where frequent changes
in wind direction occur.
2.

In simple words, we can say that
a fantail is basically
B. were equipped with valves to
regulate the flow of liquids.
3.

Transducers can measure a
physical quantity through sensors
4.

C. a small windmill mounted at the
rear of a windmill.
On-board computers like car
equipment and home automation
5.

Fantails are still employed
nowadays and prove to be
particularly useful
D. show how automation has become
an important part of both the work
environment and everyday life.
E. and turn it into an electrical value.
64
4. Automation and Robotics
READING COMPREHENSION
4. Complete the passage below with the words in the box. Some words may have to be
slightly changed.
sensor  active  system  type  bulb  torque  energy 
device  transducer  often  from  even
What Is a Transducer?
A transducer is an electronic 1. ………………………… that converts
energy from one form to another. Common examples include
loudspeakers, microphones, thermometers, position and pressure
2. ………………………… and even antennae. Although not commonly
thought of as 3. …………………………, photocells, LEDs (light-emitting
diodes), and even common light 4. ………………………… are
transducers. Transducers are 5. ………………………… used in the fields
of automation, measurement and control 6. …………………………, where
electrical signals are converted to and 7. ………………………… other
physical quantities such as energy, force, 8. …………………………, light,
motion and so on. In other words, transduction is the process of
converting one form of 9. ……………………… to another. There are
different 10. ………………………… of transducers, such as
11. ………………………… or passive sensors, actuator and
12. ……………………… bidirectional transducers.
65
1. Introduction to Automation
PET
Reading – Part 5
5. For each question, choose the correct answer.
LEONARDO DA VINCI’S AMAZING MACHINES
Leonardo da Vinci 1. ……………… born in Vinci – a small town 2. ……………
northern Tuscany – in 1452 and 3. ……………… in Amboise, France, in 1512.
He was a scientist, a talented painter, sculptor and poet, a brilliant inventor, an
4. ……………… in anatomy and a skilled engineer. Being a man and a scholar
of the Renaissance, he sought to intersect and involve different fields of human
knowledge. As a 5. ……………… of fact, his detailed drawings and sketches,
his notes and Codes – which 6. ……………… inspired contemporary writers like
Dan Brown, the author of The Da Vinci Code, 2003 – tell us about physics,
mechanical engineering, classical 7. ……………… and medical observation.
Above all, they reveal Da Vinci’s outstanding creative 8. ……………… and ability
to 9. ……………… tools for a future time he would not obviously witness. In the
Leonardo Da Vinci Museum in Rome, for example (www.museodavinci.it), visitors
can have a 10. ……………… at amazing, crafted life-size machines based on
Leonardo’s 11. ……………… and notes. Some are truly impressive, but the
12. ……………… astonishing one is maybe… the bicycle. What a genius he was!
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
A. is
A. in
A. die
A. expert
A. question
A. has
A. study
A. strength
A. imagine
A. see
A. paintings
A. very
B. was
B. at
B. is dead
B. scientist
B. matter
B. had
B. studied
B. energetic
B. build
B. watch
B. drawings
B. more
C. being
C. on
C. was dead
C. good
C. problem
C. would have
C. studies
C. power
C. think
C. show
C. dreams
C. most
D. would be
D. –
D. died
D. intellectual
D. issue
D. have
D. students
D. energy
D. paint
D. look
D. Renaissance
D. less
66
4. Automation and Robotics
2
Using PCs in Automation – Microcontrollers
As explained in the previous passage,
computers – often personal computers – can be
used in the field of automation as a machine for
process control. Obviously, this machine has to
be connected to appropriate sensors and
actuators in order to monitor the process and
perform appropriate actions. The connection
between the computer, transducers and
actuators is achieved through specific
expansion cards serving the purpose of all new
peripherals, input for the transducers and
output for the actuators.
In the case of industrial application, the
computer is often used in an environment that
is not suitable for a standard personal
computer, mainly because of the presence of
dust and of different temperatures to those
of a normal office. For these reasons,
industrial PCs are likely to be included as
27
part of the production processes. These
machines are equipped with the same
functional characteristics of standard personal
computers, but are designed to withstand
the possible harsh environment changes of a
workshop in terms of temperature, dust,
humidity, vibration and power surges.
Moreover, industrial PCs are made with
electronic components of higher quality and
with special attention to the cooling system.
Furthermore, keyboards, monitors and cases
are built in such a way as not to let moisture
and dust in.
GLOSSARY
achieved: raggiunto
dust: polvere
withstand (v.): sostenere, resistere a
cooling system: impianto di raffreddamento
Industrial PCs in a workshop
The extraordinary progress of electronics, especially in the
field of manufacturing of integrated circuits with an
increasing number of transistors on an equal surface, has
contributed to the production of increasingly powerful and
complex microcontrollers. The microcontroller is
nothing more than a proper computer, integrated in a single
chip: it is equipped with a microprocessor, memory and
input/output, it is often programmed with high-level languages
such as C (see Unit 7) and requires, in most cases, very few
electronic components to interface with the outside world.
These components are specifically necessary when the card
has to control devices powered at 220 volts or higher. In this
case, for example, they need to be interposed between the
card and the relay devices.
Thanks to microcontrollers (also known as an MCU, a Micro
Controller Unit), it has been possible to replace costly industrial
personal computers with simpler and cheaper cards within
the automation process control. In automation, the computer
often performs a single program and does not require
continuous intervention by an operator via a keyboard and
monitor which might result in a waste of money as well as
space. This is why in workplaces where the interaction of the
machine with a human operator is non-existent or, at any rate,
infrequent, an ‘embedded’ card is preferred, meaning a
computer without a monitor, mouse and keyboard on which a
specific program is loaded. The program itself is included in the
system to be controlled. Currently, the majority of embedded
systems are based on microcontrollers.
The programming of embedded systems is achieved by using a
personal computer on which the program is developed and
subsequently loaded onto the card through a link that can be
serial, USB or even in the local network. Should you need to
make updates to, and carry out maintenance on, the
embedded software system, just connect the card to a personal
computer via a communication port (serial, USB, Ethernet)
and then transfer the updates developed on the PC card.
As part of industrial processes, where it is necessary to
manage even greater power, the employed embedded system
is the PLC (Programmable Logic Controller). The PLC
also executes a program in which analogue and digital
signals, which come from transducers, are processed and
generated to the actuators in an industrial plant. PLCs are
specifically designed for industrial applications. This is why
they contain the power electronic devices required to drive
devices supplied with 220 volts or higher, which is unlike
previous systems.
GLOSSARY
increasing: crescente
microcontroller: microcontrollore
interposed: interposto,
frapposto
within: all’interno, nell’ambito di
waste: spreco, dispendio
loaded: caricato
maintenance: manutenzione
analogue: analogico
previous: precedente
A microcontroller
Programmable
Logic Controller
68
4. Automation and Robotics
READING COMPREHENSION
1. Read the passage and decide if the following sentences are true (T) or false (F).
1. Expansion cards act as peripherals, connecting computers
to transducers and actuators.
2. Industrial applications of computers pose no safety issues.
3. Only temperature changes can affect computer operating conditions.
4. When used in a workshop, PCs are equipped to resist
potentially hazardous conditions.
5. Microcontrollers are chip-integrated computers.
6. Microcontrollers can be programmed in C language only.
7. The use of MCUs has enhanced automation process control.
8. In highly automated workplaces, embedded cards are usually preferred
to computers.
9. Personal computers are definitely more expensive than embedded cards.
10. Computers are useless for the programming of embedded systems.
11. PLCs are widely employed in the industrial field.
12. PLCs are unable to handle devices that are supplied with over 220 volts.
13. We can state that PLCs are powerful and flexible devices.
T
F


























DID YOU KNOW THAT …?
PLCs are widely employed in
industrial applications, but not only!
Actually, we can find PLCs in
surprisingly different fields
including alarm systems, home
automation control units and even…
roller coasters!
PET
Listening – Part 3
28
2. For each question, write the correct answer in the gap. Write one or two words
or a number or a date or a time.
You will hear a short description of ‘The Three Laws of Robotics’ by Isaac Asimov.
The 1. ………………… law says that a robot can’t harm a human being or allow a
human being to come to harm.
Number 2. …………………: a robot must obey the orders given to it. But under no
circumstances a robot can’t be ordered to 3. ………………… a human being.
Rule number three: a robot must protect its own existence unless that violates rules #1
or 4. ………………… . A robot must proceed to self-destruction if it has to follow an
order or to save a 5. ………………… .
69
2. Using PCs in Automation – Microcontrollers
LISTENING
3. Listen to the extract again and decide if the following sentences are true (T) or false (F).
1. If a robot sees a human being in a dangerous situation, it can keep still
and avoid acting.
2. A robot must obey anyone’s orders.
3. A robot must protect human lives.
4. A robot can never protect its own existence.
5. Self-destruction is inconceivable for a robot.
6. Robots can choose which rules to follow.
T
F












SURFING THE INTERNET
4. Now surf the Internet for information about Isaac Asimov and answer the following questions.
1. When and where was he born? …………………………………………………………………
………………………………………………………………………………………………………
2. Where did he spend his childhood? ……………………………………………………………
………………………………………………………………………………………………………
3. What is he famous for? ……………………………………………………………………………
………………………………………………………………………………………………………
4. What was his job? …………………………………………………………………………………
………………………………………………………………………………………………………
5. What are his best-known works? ………………………………………………………………
………………………………………………………………………………………………………
6. When did he die? …………………………………………………………………………………
………………………………………………………………………………………………………
7. To what extent did his works influence other authors? ………………………………………
………………………………………………………………………………………………………
VIDEO
4
5. The video Animatronics Showreel shows some animatronics which have been used in
recent movies. Animatronics are also used in dark rides and amusement parks. Some
of them are amazing. Have a look!
SPEAKING
– CLASS DEBATE
6. Divide the class into two groups and debate the following quotation. Remember to
give reasons for your statements. Let your voice be heard!
[
‘I don’t believe in afterlife, so I don’t have to spend my whole
life fearing hell, or fearing heaven even more. For whatever the
tortures of hell, I think the boredom of heaven would be even
worse.’ (Isaac Asimov)
]
3
Open Source Computer Boards
The gradual spread of microcontrollers and the
consequent lowering of their cost have
contributed to the development of electronic
programmable cards, which allow the
creation of automated controls and home
automation with an ease that was unthinkable
only a few years ago. Basically, these cards
have a microcontroller and a few other
components for the management of the clock
and the power supply. More specifically, they
are made up of a series of connectors used
to join sensors, amplifiers and relays that
constitute the ultimate ‘meaning’ of our system
and allow the microcontroller to communicate
with the outside world.
The ease of use of these cards is not only from
the hardware point of view, but also the
software one, as it is possible to program them
in complex programming languages such as
C++ and Python and no longer in Assembler
which, in addition to being particularly difficult,
does not allow the programmer high
productivity.
Notwithstanding the purely technical details,
the most surprising phenomenon linked to
these devices is that the projects they
contributed to developing are ‘open source’
electronics. This concept applies not only to
the software that was developed for
applications of these cards – thus extending it –
but also to the electronic schemes used to
design their own interface with the various
sensors and external devices. With a simple
web search, it is possible to get an idea of the
amount of projects and applications that have
been shared in the last few years. Among the
main open source cards, it is worth
29
remembering Raspberry Pi. It was designed
and made in the United Kingdom with the aim
of producing a very low-cost computer – all in
all, it costs a few dozen euros – to be used for
educational purposes in developing countries.
This card, which is based on the Linux
operating system, was such a success that it
exceeded all expectations: from a planned
initial production of 10,000 items, about a
million were manufactured in a year. The
reasons for this success can be credited to the
small size, easy interfacing and the wide
availability of programs and solutions offered by
the Linux world. All reasons that allow
Raspberry Pi to operate not only as a personal
computer, as initially planned, but also as an
embedded system.
Currently one of the most successful ones is the
Arduino card. This Italian project arose from
an idea by Massimo Banzi, a computer expert
and teacher, between 2001 and 2002 in Ivrea
– the Italian city that experienced the glories of
Olivetti, a famous Italian manufacturer of
typewriters, computers, tablets, smartphones,
printers and other business products like
calculators and fax machines. Arduino allows
the creation of highly technological applications
starting from a basic knowledge of
Electronics and Programming. It is basically a
very cheap card – its cost is similar to Raspberry
Pi’s –, which fits in the palm of a hand and
allows the easy application of sensors, actuators
and other electronic components and the
possibility to program them easily. The success
of this card can also be attributed to its system
of cross-platform development that can
interface with both Mac and PC.
GLOSSARY
lowering: riduzione
they are made up of: sono costituiti da
notwithstanding: a parte, tralasciando
aim: scopo
planned: pianificato, programmato
knowledge: conoscenza
interface: interfaccia
71
3. Open Source Computer Boards
READING COMPREHENSION
– WRITING
1. After reading the passage, answer the following questions. Then, use your answers to
write a summary of the text you have just read.
1.
2.
3.
4.
5.
6.
What do electronic programmable cards allow us to do?
What are their main components and what purpose do they perform?
List the advantages of electronic programmable cards.
What is Raspberry Pi?
What was it initially meant for?
List the features of Arduino mentioned in the passage.
Reading – Part 1
2. For each question, choose the correct answer.
PET
NO TEXTING
WHILE
DRIVING
Hi Liz, the concert starts
at 8 p.m.
Lets meet at 6 at Gate 5.
Tube stop is Circo Massimo.
CU there!
Oak Tree County Library
Opening times
9 a.m. - 14 p.m. Mon-Wed-Fri
8.30 a.m. - 17 p.m. Tue-Thu
 A. It is forbidden to use your mobile while driving.
 B. If you’re driving, you’re not allowed to text.
 C. In case you’re driving, you can text after the sign.
 A. Liz is meeting her friend at the tube stop at 6 p.m.
 B. Liz and her friend are meeting two hours before
the concert.
 C. Liz and her friend are meeting at Gate 5 just
before the concert starts.
 A. You can’t borrow or return books at 7.45 on
Thursday mornings.
 B. The library will be open at 4 p.m. on Friday
afternoons.
 C. You can’t borrow or return books on Mondays
after 9 a.m.
4
Domotic Applications
The word domotics is made up of two words:
Domus, a Latin word meaning ‘home’, and
Robotics, which is a cross-curricular
science dealing with the improvement of the
quality of life inside a home or in any place
where people live or work.
This discipline benefits from the contribution
of other branches of learning such as
architecture, civil and environmental
engineering and electrical engineering.
Nonetheless, the real turning point was the
development of electronics,
telecommunications and Information
Technology, as it made domotics widespread
and available to people on a large scale.
Currently, domotics displays many different
applications ranging from a basic on/off
control switch for appliances to the full control
of the electrical and electronic devices of the
whole building.
Moreover, the constant development of
portable devices such as PCs, smartphones and
tablets, together with the growing spread of
broadband Internet connections, have allowed
house remote control through an
Internet-connected PC – frequently,
smartphones and tablets. It is now possible, for
instance, to remote-switch home appliances
on and off, set the air conditioning system and
even monitor rooms via a webcam, provided a
web connection is available.
These applications allow us to witness the
expansion of Internet not only to a virtual
world, but also to our everyday environment
made of real places and objects. That is,
‘The Internet of Things’.
Not only do domotic applications contribute to
improving our lives by making them more and
more comfortable, they also offer advantages in
a variety of different fields, e.g. increasing safety
and security through the management of alarm
systems and video surveillance or of sensors
detecting gas leaks.
In addition, domotics contributes substantially to
energy saving – with positive environmental
benefits – due to the use of applications that
optimise the switching on and off of air
conditioning or heating systems. Other ways to
save energy can be achieved through the
management of the lighting system, e.g.
switching lights off when not needed or
30
automatically opening curtains or blinds
whenever sunlight is detected.
All these applications allow remote interaction
by the user who can choose interactively what
operations to perform via any Internet-connected
computer. The user can choose to operate
– by switching home appliances on and off,
for instance – or simply monitor the working
conditions of the home automation system.
Due to open source electronic cards such as
Raspberry Pi and Arduino, a large number of
amateurs can now design and assemble a lot
of these applications. Just a few years ago, this
would have required advanced electronics and
IT skills and knowledge.
Domotics is becoming more and more
accessible – not only for customers of
home-automated products, but for people who
are willing to make them as well.
GLOSSARY
cross-curricular: interdisciplinare
turning point: punto di svolta
remote-switch: telecomandare
leak: perdita, fuga
whenever: ogniqualvolta
amateur: dilettante, non professionista
willing: desideroso
73
4. Domotic Applications
VOCABULARY
1. Look for the synonyms of the words below in the passage.
You may use a monolingual dictionary if needed.
1. Branch of learning ………………
10. Progress……………………………
2. Significantly ………………………
11. Domotics …………………………
3. Situation, Setting …………………
12. Enhancement ……………………
4. Nevertheless ………………………
13. Antitheft alarm ……………………
5. Accomplished ……………………
14. For instance ………………………
6. Accessible…………………………
15. Entire ………………………………
7. Exhaustive …………………………
16. Thanks to …………………………
8. Benefits ……………………………
17. Treasure (to) ………………………
9. Sensed, Perceived
………………………………………
PET
Speaking
2. Look at the pictures below and describe one to a classmate using your own words.
Then swap roles.
1
FCE
2
3
Speaking
3. You are about to buy your dream home, so you would like it to be equipped with the
best facilities and appliances money can buy. You are currently designing home
automation. Look at the floor plan below and decide how your future home has to be
arranged from this point of view. Then explain your choices. (4 minutes)
74
4. Automation and Robotics
5
Industrial Applications
31
The best-known industrial application – and perhaps, the most important – lies in
CNC (Computerised Numerical Control) machines. These high-tech machine
tools have almost taken over traditional lathes for product manufacturing due to
their enhanced versatility.
As their name suggests, the movements of these machines are controlled by an
integrated computer executing an operation worksheet-based program
depending on what item to manufacture. The same machine can be used to make
different products, depending on the program loaded onto the computer.
Needless to say, manufacturing new items entails the involvement of a skilled IT
technician to write and run the program needed to create the operation worksheet.
That is, the sequence of actions and movements the machine has to perform to
complete the part.
In most cases, in order to program these machines, it is not necessary to use a
programming language, as the CAD (which stands for Computer-Aided Design)
software allows us to draw the part to be manufactured. The CAD drawing is then
shifted to a CAM (short for Computer-Aided Manufacturing) software to be analysed
and translated into CNC machine instructions. The CNC-integrated computer reads
the instructions and the machine is thus able to start the production process.
Furthermore, CAD and CAM software are becoming more and more sophisticated
and are now able to draw and manage 3D-chart templates of complex items and
products.
It is worth highlighting that 3D-printers can also be considered to be
CNC machines. Thanks to their now affordable price, these new-generation
printers are widely used in DIY (Do-It-Yourself) as well as in the industrial field.
Unlike Computerised Numerical Control lathes, 3D-printers shape items using
melted plastic material, whereas CNC lathes manufacture the part by removing
unwanted material from a raw block. Thanks to this specific feature, 3D-printers do
not need complex CAM software. Moreover, some CAM programs are available for
free, which helps people looking for 3D-printing adventures to reduce costs and the
initial outlay.
When dealing with industrial automation or automated factories, people normally
think of robots – that is, machines substituting workers in dangerous situations or
very tiresome tasks. As we have all seen on TV, some factories have completely
automated assembly lines where machines assemble parts automatically
– e.g. in the automotive industry – and human involvement is limited to mere
control and supervision.
Within these applications, we can witness extremely high integration and
interaction between electronics and mechanics as far as automated controls are
concerned. The new word ‘Mechatronics’ has been coined to describe this.
Needless to say, within this specific field dealing with programmable devices,
electronics and Information Technology need to be interconnected. The most
widely used electronic devices in automation are PLCs, as they mix computer
‘intelligence’ with ‘strength’ – which is achieved thanks to specifically designed
components. This combination gives us the ability to control the movements of
machines requiring considerable power, strength and resistance.
GLOSSARY
lathe: tornio
operation worksheet: ciclo
di lavoro
draw (v.): disegnare
it is worth highlighting: vale
la pena sottolineare
melted: sciolto, fuso
initial outlay: investimento iniziale
tiresome: faticoso
assembly line: catena di montaggio
high: elevato
requiring: che richiede
Automated assembly line in the car industry
READING COMPREHENSION
1. After reading the passage, choose the correct option.
1. CNC machines are widely used
 A. because they are more modern than
traditional machine tools.
 B. thanks to their low cost.
 C. because traditional lathes need more
maintenance.
 D. because of their versatility.
2. CNC-integrated computers
 A. need to be programmed for every
single item to manufacture.
 B. need no maintenance.
 C. need new programming when
changing the kind of item to make.
 D. are very easy to troubleshoot.
3. In order to program CNC machines
 A. CAD software is required.
 B. CAD and CAM software are
employed.
 C. a specific programming language
is needed for successful
programming.
 D. CAM software is required.
4. 3D-printers
 A. are equated with CNC machines.
 B. work in the same way as CNC
lathes.
 C. need more manufacturing time than
CNC lathes.
 D. are more versatile than CNC
machines.
5. 3D-printers
 A. need no CAM software to work.
 B. can be used for DIY only.
 C. can use inexpensive software.
 D. need an IT engineer to work.
6. The term ‘Mechatronics’
 A. is a new word used in the automotive
industry only.
 B. means that mechanics is more
important than electronics in
automated systems.
 C. refers to the integration of mechanics
and electronics in automation.
 D. hints at the fact that electronics is
somehow more relevant in
automated process than other
branches of engineering.
7. In automated factories, robots are often
employed
 A. because workers are useless.
 B. in complex operations only.
 C. to reduce troubleshooting.
 D. in hazardous and tiring tasks.
8. The use of PLCs in automated factories
 A. is due to the combination of different
performing abilities.
 B. is limited to the car industry.
 C. is very dangerous and should be
avoided.
 D. is suitable for large factories only.
76
4. Automation and Robotics
SPEAKING
– PAIR WORK
2. Work with a partner and answer the following questions.
• Have you ever seen a 3D-printer? What was it like?
• Have you ever used one?
• How does it work?
• Can you give at least 5 examples of what you can print with one?
• Have you ever seen an automated assembly line/factory? Give details.
• What was it like?
• In your opinion, what are the advantages of using CNC machines and
robots in workplaces?
• Can you think of any downsides in employing automated machines
and robots in factories?
PET
Writing – Part 2
3. You have received the following text message from your
friend Matt, who is spending a holiday in Italy with his family.
Write your answer in about 100 words.
…………………………………………………………………………
…………………………………………………………………………
…………………………………………………………………………
…………………………………………………………………………
…………………………………………………………………………
…………………………………………………………………………
…………………………………………………………………………
…………………………………………………………………………
…………………………………………………………………………
Yesterday I went
to a
big amusement pa
rk
nearby and tried
the
coolest roller coas
ter
EVER! I LOVE th
e thrill
it gives you! I en
joy
dark rides too – Ja
net
screams all the tim
e
there J. How do
you
like amusement
parks?
What’s your favo
urite
ride? CU soon
10:07 AM ✓✓
FCE
Writing – Part 1
4. Write an essay of 140-190 words in an appropriate style commenting on the following
quotation by the famous writer Isaac Asimov, expressing your opinion on the issue
and giving reasons for your statements.
‘It is change, continuing change, inevitable change, that is the dominant factor in society
today. No sensible decision can be made any longer without taking into account not only
the world as it is, but the world as it will be.’ (Isaac Asimov)
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
77
5. Industrial Applications
MATCHING
– FALSE FRIENDS
5. False friends can be really a nuisance… even when studying a foreign language!
Some of them may be tricky, but you can use your monolingual dictionary to match
the words with their definitions. There are two extra ones you do not need.
1.

Attic
2.

Sensitive
3.

Sympathy
4.

Attend (to)
5.

Sensible
6.

Annoy (to)
7.

Confidence
8.

Scholar
9.

Pretend (to)
A. Someone who is able to take good decisions and
judgements that are based on reason rather than on
emotions.
B. A person who has gained extensive knowledge of a
particular subject – usually of an academic subject.
C. A strong and sharp smell or taste, usually unpleasant.
D. Someone who shows a deep understanding of other
people’s feelings and emotions.
E. To be present at.
F. A feeling of sorrow, e.g. for someone who has
suffered a misfortune.
G. To act in a way as to make people feel angry or
irritated.
H. To make plans and preparations for an event to
happen at a future time.
I. A magazine containing stories told in pictures.
J. To act in a way that could make people believe that it
is the case, even though it is not.
K. A room on the top of a house, just below the roof.
L. Belief in the reliability of a person or thing; a feeling of
being certain.
10.  Arrange (to)
FALSE FRIENDS
– WORDSEARCH
6. Find 8 very famous false friends. Help yourself with the definitions.
1.
2.
3.
4.
5.
6.
7.
8.
A small restaurant where food or snacks are sold, as in a school: C _ _ _ _ _ N
A large area of land in the country, with some property on it: E _ _ _ TE
A disagreement over a particular topic: A _ _ _ _ _ NT
A place where people can borrow books, newspapers or magazines: L _ _ _ _ _ Y
Someone who shows courage: B _ _ _ _
A publication issued at regular intervals: M _ GA _ _ _ _
Someone who gives birth to or brings up a child: P _ _ _ _ _
An unpleasant and unfortunate event that happens by chance: _ CC _ _ _ _ T
T
T
P
A
R
E
N
T
M
D
H
D
C
O
R
X
N
T
A
E
C
A
N
T
E
E
N
F
G
B
T
S
L
S
D
E
E
Y
A
R
L
Y
Q
I
M
T
E
O
Z
A
G
E
C
U
B
M
J
U
I
V
Y
C
G
E
Q
R
G
T
N
E
A
R
X
G
H
T
A
X
E
N
A
S
T
J
N
C
R
R
V
W
E
N
E
S
T
A
T
E
Y
S
MIND MAP
COMPUTERS
IN AUTOMATION
connected to
Sensors
connected to
Actuators
function
based on
Industrial
PCs
based on
based on
PLC
(Programmable
Logic
Computers)
Microcontroller
boards
can manage
function
employed in
employed in
Greater power than
an industrial PC or a
microcontroller board
Monitor
the process
Perform actions
according to events
detected by sensors
Embedded system
programmed by
Communication interface:
video and keyboard
are not present
INDUSTRY 4.0
WARM UP
79
(PART 1)
– PAIRWORK
1. Complete the spidergram
below with all the words
that in your opinion relate
to Industry 4.0, then
compare it with your
classmates.
Industry 4.0
MATCHING
2. Complete the drawing with the correct label.
A. Mass production
Assembly line
Electricity
B. Computer and automation
C. Mechanisation
Water power
Steam power
D. Cybernetic systems
When talking about Industry 4.0, we may also refer to it as the Fourth Industrial Revolution.
It relies on digital technology to build models, as well as to manage communication and
production processes.
CLIL
History
3. Find information about the First, Second Third and Fourth Industrial Revolutions.
You can use the WH-questions (When? Where? What?) to help you organise the
information.
CLIL
ICT
4. In pairs, summarise your report in a multimedia presentation. You can add images,
maps and photographs to clarify your ideas. Each pair will then show and report it
orally in class.
Assembly line
Model T machine
Spinning Jenny
Industrial robot
Numerical control machine
Audio
5
OPERATING
SYSTEMS AND
SOFTWARE
• What Is an Operating System?
• A Bit of History
• Operating Systems for Personal Computers
• Mobile Operating Systems
1
What Is an Operating System?
32
After covering the hardware features of a computer, in this unit we are
going to focus on the basic software generally supplied by the
manufacturer: the operating system.
An operating system (OS) is a program that permits the user to control
the basic functions of a computer, thus allowing the user to communicate
with the hardware using input/output peripherals, as well as managing files
and data by specific application programs.
User Interface
The operating system allows the user to ‘speak’
with the hardware and one of its most important
features is that it must be easy to use. In other
words, it has to be ‘user-friendly’.
The first operating systems like MS-DOS were
text-based and the user communicated with the
hardware by typing commands into the keyboard.
This way of communication is very difficult,
especially for a non-skilled user, due to the
number of commands and syntax to remember.
Thanks to Steve Jobs, modern operating systems
now provide users with a more intuitive Graphic
User Interface (GUI).
Through a GUI, the user can give the system a
command by pointing a mouse to an object
displayed on the screen such as an icon, a
window, a button or text.
GLOSSARY
supplied: fornito
syntax: sintassi
Main Components and Multitasking
The user interface is the component of an
operating system between the user and the rest
of the system. With this component it is
possible to access the other parts of an
OS designed to perform a specific function.
For example, the file system is the
component of an OS which is specifically
developed to manage the files stored in every
mass storage device of a computer. By means
of this component, users can issue commands
and, depending on the (available) interface,
copy, move, rename or delete files or folders
in a disk.
Other components manage the peripherals and
the memory, and each of these is controlled by
the kernel that provides the most basic level of
control over all of the computer hardware
devices. The kernel manages memory access
for programs in the RAM and determines
which programs gain access to hardware
resources etc.
A specific memory managing technique that can
provide a modern operating system with an
important feature is called multitasking,
which permits the running of multiple
independent programs on the same computer,
thus giving the impression that it is performing
the tasks at the same time. Since most
computers can do at most one or two things at
a time, this is generally done via time-sharing,
which means that each program uses a share of
the computer time to execute.
BIOS
The operating system of a personal computer is
stored on the main hard disk. This memory
support allows users to choose which operating
system to install (Windows, Linux…) and an
easier way to update it, by simply uploading
installation files from the producer’s website.
The operating system is loaded on the memory
at the power on of the computer, but this
means that another program is needed to tell
the hard disk to start and load the OS.
This program is called BIOS, which stands for
Basic Input Output System, and is
embedded on a memory chip of the computer.
At the power on the hardware is designed to
read the memory chip containing the BIOS first
and perform the program stored in it.
This initial operation is called ‘bootstrap’ and
the term derives from the Anglo-Saxon idiom
‘To pull oneself up by one’s bootstraps’, that
is, put on your boots and stand up alone
without any help. The expression was later
introduced into computer language to describe
the initialising process of a PC thanks to
BIOS, so operating systems could ‘stand up
by themselves’.
GLOSSARY
by means of: tramite,
mediante, attraverso
folder: cartella
running: esecuzione,
attività
update (v.): aggiornare
bootstrap: tirante
initialising:
inizializzazione
82
5. Operating Systems and Software
READING COMPREHENSION
1A. After reading the passage, answer the following questions.
1.
2.
3.
4.
What is an operating system?
What does it allow the user to do?
How does it manage files and data?
What is the main and most important
feature of an operating system?
5. Why were the first operating systems
complicated to use?
6. What does the acronym GUI stand for?
7. What does a GUI allow the user to do?
8. What does ‘user interface’ mean?
9. Are there any examples of user interface
in the passage?
10. Why is the kernel important?
11. What does multitasking permit?
12. What does ‘bootstrap’ mean and
how does it work?
13. Where does this term stem from?
1B. Now use your answers to summarise orally the passage about operating systems.
DID YOU KNOW THAT …?
The word Bios comes from ancient
Greek meaning ‘life’.
It is still widely used in modern
languages as a prefix.
Can you think of any English and
Italian words containing it?
LISTENING
33
2A. Listen to the recording and fill in the blanks. The recording is taken from a video,
which is the reason why the tone is rather informal.
WHAT IS THE BIOS AND WHAT DOES IT DO?
I want to 1. ……………………… to you about the BIOS. The BIOS
2. ……………………… for basic input/3. ……………………… system. The BIOS is
the first 4. ……………………… program that 5. ……………………… when you start
up your system. The first time you press the 6. ……………………… button on your
computer, the 7. ……………………… goes into 8. ……………………… .
Your next 9. ……………………… might be: ‘What does the BIOS
10. ………………………?’ The BIOS is 11. ……………………… a program that
12. …………………… your operating system, such as 13. ……………………
7 or even the Linux-based operating 14. …………………… what to do.
It also 15. ……………………… all the parameters for the hardware that’s
16. ……………………… inside of your computer.
The next question you 17. ……………………… have is: ‘Where is the BIOS
18. ………………………?’ The BIOS is 19. ……………………… on what is called a
ROM or Read 20. ……………………… Memory chip on the motherboard.
The 21. ……………………… sits inside of your computer.
83
1. What Is an Operating System?
2B. After checking the passage, complete the following sentences.
1.
2.
3.
4.
BIOS stands for ………………………………………………………………………………… .
The BIOS goes into action …………………………………………………………………… .
ROM stands for ………………………………………………………………………………… .
The BIOS is stored ……………………………………………………………………………… .
Idioms
What is an idiom?
According to the Collins
Cobuild Dictionary, ‘an
idiom is a group of words
which, when they are used
together in a particular
combination, have a
different meaning from the
one they would have if you
took of all the individual
words in the group.’
MATCHING
Get one’s ducks in a row, that is ‘to prepare things well and be organised’
– IDIOMS
3. Idioms are widely used in the English language. You will find some of them listed below.
Can you match each one to its meaning? Have a try! There is an extra description.
1.
2.
3.
4.
5.
6.






7.

8.
9.


10. 
Apple of my eye
Rain cats and dogs
A piece of cake
Out of the blue
Back to square one
A grin like a Cheshire
cat
Kill two birds with one
stone
Beat around the bush
Every cloud has a
silver lining
Flog a dead horse
SPEAKING
A. To insist on something that has already been
talked about or that nobody can change.
B. To avoid talking directly about an unpleasant
topic.
C. To choose between two disagreeable situations.
D. To accomplish two goals with one single action.
E. A loved or very cherished person.
F. A large and wide smile.
G. To start something from the very beginning…
again.
H. There are positive aspects even in the worst
situations.
I. An easy task to do.
J. To rain heavily.
K. Suddenly and unexpectedly.
– CLASS DEBATE
4. Divide the class into two groups and debate the following quotation. Remember to
give reasons for your statements. You may use practical examples taken from your
everyday experience. Let your voice be heard!
[
‘I fear the day that technology will surpass our human
interaction. The world will have a generation of idiots.’
(Albert Einstein)
]
2
A Bit of History
34
Since operating systems are closely related to the computer hardware,
we can talk about the evolution of operating systems starting from the
architecture of the computers on which they run, distinguishing a number of
distinct phases or generations. The first generation dates back to the 1940s.
The Earliest Electronic Digital Computers
The 1940s: First Generation
The earliest electronic digital computers were
designed to perform a single specific function
depending on the electronic circuits wired
into them.
The only way to change the function of these
computers was to change the electronic circuit
structure. For this reason, the earliest electronic
digital computers had no operating system.
Machines at that time were so basic that programs
were often entered one bit at a time on rows of
mechanical switches (plug boards). Programming
languages were unknown at that time, including
Assembly languages. It can be said that operating
systems as we now know them were unheard of.
The Early 1950s: Second Generation
By the early 1950s the routine had somehow
improved with the introduction of punched
cards. The General Motors Research
Laboratories implemented the first operating
systems in the early 1950s for their IBM 701.
The systems that characterised the 1950s were
mainframe computers, i.e. a single computer
with a number of terminals depending on the
number of users and which generally ran one job
at a time. A user program had to be added to a
process queue together with those of other
users and wait for its turn to run.
GLOSSARY
since: poiché
wired: collegato, cablato
i.e.: dal latino id est, che significa
vale a dire, ossia
queue: coda
85
2. A Bit of History
The 1960s: Third Generation
The systems of the 1960s were able to take better
advantage of the computer resources by running
several jobs at once. In accordance with this
innovation, operating systems designers developed
the concept of multiprogramming in which several
jobs are simultaneously present in the main
memory; a processor can be switched from job
to job as needed, to keep several tasks (jobs)
advancing while having the peripheral devices in
use. For example, on the system with no
multiprogramming, when the current job paused
to wait for other I/O operations to complete, the
CPU simply sat idle until the I/O finished. The
solution for this problem was to partition the
memory into several pieces, with a different job
for each one. While one job was waiting for I/O
to complete, another one could use the CPU.
Further on: Fourth Generation
With the development of LSI (Large Scale Integration)
integrated circuits (chips), the operating system became part
of the age of the personal computer and the workstation.
Microprocessor technology evolved so much that it was now
possible to build desktop computers as powerful as the
mainframes of the 1970s. The most important early
operating system was Microsoft MS-DOS, or PC-DOS when
supplied by IBM. It derived from the CP/M-80, an operating
system based on the famous Z80 microprocessor.
The personal computer compatible with this OS had a
small-integrated boot program (BIOS) in a memory chip
(ROM) which loaded the OS itself directly from the disk.
The decreasing cost of display equipment and processors
made it practical to provide graphical user interfaces for
many operating systems, such as the generic X Window
System that is provided with many Unix systems, or other
graphical systems such as Microsoft Windows, the
Commodore’s Amiga OS, Atari’s TOS, Apple’s Mac OS,
or even IBM’s OS/2. The original Graphical User Interface
(GUI) was developed on the Xerox Alto computer system at
Xerox Palo Alto Research Center in the early 1970s and
sold by many vendors throughout the 1980s and 1990s.
Since the late 1990s there have been three operating
systems in widespread use on personal computers: Microsoft
Windows, Apple Inc.’s OS X, and the open source Linux.
GLOSSARY
switched: cambiato, spostato
idle: inattivo
as powerful as: potente come
decreasing: in diminuzione, ridotto, calato
throughout: nel corso di, durante tutto,
per tutto l’arco di
86
5. Operating Systems and Software
READING COMPREHENSION
1. Summarise the main events listed in the passage in chronological order by completing
the grid.
When?
Company/OS
Features
READING COMPREHENSION
2. Read the passage again and decide if the following sentences are true (T) or false (F).
T
1. The first operating systems date back to the 1950s.

2. First-generation computer machines had no proper OS.

3. Punched cards were a significant improvement in the late 1960s.

4. Prior to multiprogramming, memory partition was a failure.

5. Multiprogramming means that the processor can run several jobs at the same time. 
6. The OS eventually became part of computers due to LSI circuits.

7. MS-DOS and PC-DOS are completely different operating systems.

8. BIOS is a boot program that loads the OS automatically.

9. The GUI was first developed by Apple Inc.

10. Since the 1990s only two main OSs have been used in computers.

11. Linux is an open source OS.

PET
F











Speaking
3. Ask and answer the following questions with a classmate, then switch roles.
• What kind of operating system is your mobile/smartphone provided with?
• Do you own any other devices that have a different operating system? Which OS?
• In your experience, what are the differences and similarities between different operating systems?
• Can you give any practical examples?
• Have you ever used an open source operating system?
• Can you explain in your own words the main differences between open source operating
systems and operating systems like Android or iOS?
• Look at the picture below. Do you agree or disagree with its meaning? Who could make such a
statement? Give reasons.
If your child can use
a smartphone,
they can easily operate
any of the above!
87
2. A Bit of History
FCE
Speaking
4. Role-play a complete dialogue using the information provided. You may take notes
prior to the speaking exercise and search the Net for information in English if needed.
Then swap roles. (4 minutes)
A. You work as a shop assistant in a large shop in town. The shop sells high-tech devices
such as mobile phones, smartphones, tablets, notebooks and computers. Some items
may also be second-hand, but in perfect condition and with a 6-month warranty. Your
goal is to find the product that best fits the customer and sell it to him/her.
B. You are one of the four customers below. Have a look at who you are and what you are
looking for in the shop.
Name: Kate Pedrosa
Age: 29
Occupation: Primary
school teacher
She has been working with children for 8 years
and she loves it, which is why at home she
sometimes surfs the Net to find new activities to
do at school with her pupils. Her sister Ramona
lives in Mexico – her native country – and they
often chat and see each other on Skype. She is
looking for a new computer because her old one
has become too slow. She would like to find a
bargain, as she is saving money for her holidays
in Mexico.
Name: Jonah Jamesboy
Age: 56
Occupation: Director
of the local newspaper
and journalist
He normally uses instant messaging, social
networks, net surfing, apps to write and collect
articles, videos and pictures for his job. He
makes a lot of phone calls, often abroad. He is
looking for a handheld device so he is not
burdened by too many things to carry when
travelling on business. He has no budget
limitations, but does not like wasting money.
Name: Paddy O’ Brien
Name: Milly Blooms
Age: 16
Age: 35
Occupation: Student
Occupation: Attorney
Paddy lives a highly connected life. Like most
teenagers, he can’t live without music, instant
messaging, and social networks. He loves
watching hip-hop videos on YouTube and
sometimes uploads self-made music videos of
his rehearsals with his band ‘Warriors and
Scarecrows’. He loves playing online racing
games as well but at present he’s studying for his
A-level exams so he doesn’t have much time to
spare. Yesterday his mobile phone fell in the
bathtub, so he urgently needs a new one but he
can’t afford a very expensive one.
Her job can be rather stressful, so in her spare
time she sometimes relaxes on social networks,
instant messaging, working out (jogging and
swimming), and long walks in the woods. She
loves listening to music while jogging. She
normally uses her mobile at work, but she has an
office phone, too. She is looking for a new
smartphone. She’d love to find a waterproof one.
She’s well-off but she definitely doesn’t want to
pay too high a price.
88
5. Operating Systems and Software
3
Operating Systems for Personal Computers
35
There are many operating systems that you can install on a personal computer,
but there are three main ones: Linux, Mac OS and Windows.
Linux
Linux is a family of operating systems whose architecture is very similar to
Unix’s, a well-known network operating system implementing the
TCP/IP network Internet protocol.
‘Linux’ is named after Linus Torvalds, a student at Helsinki University
who started to write this free operating system and who sent an
invitation e-mail to a large community of programmers asking them
to help in its development. The final X in the name is a reference
to the close links between Linux and Unix.
Linux is a free software and an open source development. It is
not restricted by property code, i.e. no company or
individual owns this operating system and anyone is free to
make copies and redistribute it. Moreover, Linux is an open
source program and people can make changes to its source
code to suit their own needs and these source code
modifications are licensed under a General Public License (GPL).
Not only is Linux a single operating system with a free licence, it is a
family OS and it is even possible to choose the most suitable distribution
(Ubuntu, Debian, Red Hat…) according to the user’s needs.
Mac OS
GLOSSARY
well-known: noto, conosciuto
free: gratuito, libero
need: bisogno, esigenza, necessità
ensuing: relativo, derivante
discourage (v.): scoraggiare,
dissuadere
On 24 January 1984, Apple Computer Inc.
introduced the Macintosh personal computer,
known as the Macintosh 128K model. The
operating system of the early Macintosh was
called ‘System Software’ or ‘System’, and its
ensuing series was later renamed Mac OS after
System 7. The Macintosh platform is credited
with having popularised the concept of the
graphical user interface.
Nowadays, the Mac OS X version is the
preinstalled operating system on Apple
personal computers.
Even if the modern Mac’s hardware is not different from
another type of PC and the Mac OS X can run smoothly
on typical PCs, the Apple licence agreement and the way
they limit their software discourage people from
installing it on a computer other than Apple.
The most important element of this operating system is
the powerful and easy-to-use graphical interface
that allows the user to manage and configure every
resource and peripheral without being a computer expert.
The latest versions of Mac OS are closely related to Linux,
in fact they are Unix-compatible and they can run Unix
applications. Such operating systems with this feature are
called ‘Posix systems’.
89
3. Operating Systems for Personal Computers
Windows
The first independent version of Microsoft
Windows – version 1.0, released on 20
November 1985 – was originally going to be
called ‘Interface Manager’, but Rowland Hanson,
the head of marketing at Microsoft, convinced the
company that the name ‘Windows’ would be
more appealing to customers.
Windows 1.0 was not a complete operating
system, but rather an ‘operating environment’
requiring the text-based MS-DOS operating
system and extending it with a graphical user
interface.
Microsoft had worked with Apple Computer
to develop applications for Apple’s new
Macintosh computer, which featured a
graphical user interface. As part of the related
business negotiations, Microsoft had licensed
certain aspects of the Macintosh user interface
from Apple; in a later lawsuit, a district court
summarised these aspects as ‘screen displays’.
In the development of Windows 1.0, Microsoft
intentionally limited its borrowing of certain
GUI elements from the Macintosh user
interface, to comply with its licence.
The first version of Windows running on a
workstation as a fully operating system and not
as an operating environment was Windows 95
in 1995.
Many versions have been developed since
1995 not only for workstations, but also for
servers with network configuration and
administration features.
Windows 10 is currently installed on
personal computers. It is an improved version
of Windows 8 which allows the user to choose
between a standard graphic interface and the
same interface of a Windows Mobile
smartphone or tablet. Choosing this second
interface is convenient for non-expert users and
whenever a computer is equipped with a touch
screen.
GLOSSARY
appealing: accattivante, invitante, di interesse
lawsuit: azione legale
comply with (v.): osservare, rispettare
currently: attualmente
90
5. Operating Systems and Software
READING COMPREHENSION
1. Quickly scan the passage again and take notes on the pros and cons of the OSs
mentioned, including their development.
Operating system
Pros
Cons
Linux
Mac OS
Windows
5
VIDEO
2. Watch the video The Story of Linux and fill in the blanks.
This video is about the story of 1. ……………………, on the occasion of its 20th anniversary.
Name
Linus Torvalds
Occupation
Computer science 2. ………………………
In those days, he lived in 3. ……………………… .
On 8th August 4. ……………………… Linus
wrote a post that has become one of the most
famous entries in computer history, telling
about his 5. ……………………… .
Later on, this 6. ……………………… source
project started spreading around the
• the freedom to 12. ……………………… the
software to suit your needs;
• the freedom to share the software with your
13. ……………………… and neighbours;
• the 14. ……………………… to share the
changes you make.
7. ……………………, with a large number
Linux has had an outstanding success since
of developers contributing to its improvement.
1991 and a lot of companies, such as Red
Linus called his OS kernel Linux and chose
Hat and 15. ………………………, have
a penguin as a 8. ……………………… .
adopted it.
Torvalds decided to use a penguin
The speaker’s opinion is that Linux has
because of a little incident at the
revolutionised computing and is still doing it:
9. ……………………… .
every three months, another version of Linux
He also made a crucial decision, choosing
is 16. ……………………… .
the 10. ……………………… created by
The final part of the video shows how Linux is
Richard Stallman. This licence allows very
now being used and spread in different fields
important freedoms, such as:
of our lives, i.e. the Internet, phones,
• the freedom to use the software for
17. ………………………, computers as well as
any 11. ………………………;
in many devices we use every day.
91
3. Operating Systems for Personal Computers
PET
Reading – Part 1
3. For each question, choose the correct answer.
Cranberry Hotel
Help us protect the Earth. Do not
waste water!
Please use your towel more than
once. If you hang your towel on the
towel rail, we won’t change it. You
will get a new towel if you leave
the old one in the shower or on the
floor. Thank you!
Glory Days Music
Lounge & Shop
Showing this card will entitle
you to get a complimentary
Glory Days ML souvenir with
at least a $25
purchase in the Café
or Vintage Shop.
Cedar Town Science Museum
Opening Times – Daily 9 a.m. - 5 p.m.
Admission charges
Adults
12
Concessions
6
School children, students, trainees
5
Family ticket (up to 2 adults + up to 3
children aged 0-16)
18
 A.If you drop your towel on the floor,
you will be fined.
 B.You are not allowed to hang towels
on the rail.
 C.You can decide when your towels
need to be changed.
 A.If you spend $25 in the shop, you
will receive a present.
 B.If you show the card and spend $25
in the café, you can have a gift.
 C.You can get a gift if you buy
products or merchandise for $20
and show the card.
 A.Only large families can buy a family
ticket for the Science Museum.
 B.Only students can buy a discounted
ticket.
 C.You can visit the museum on
weekdays, too.
Hi mum, we’re planning our summer holidays
but it’s becoming very complicated indeed!
Dan needs a rest after these last few terrible
months and doesn’t want to drive too far. The
twins have already told the whole school that
we’re heading to Orlando. Janie’s been
dreaming about Venice for ages but the fares
are terribly high these days. And me – well,
I was going to ask you if you’d be willing to
host all of us at the farm, would you?
J Love, Megan
 A.Megan is going to decide for the
whole group.
 B.Planning summer holidays is easy
in Megan’s family.
 C.The twins can’t wait to go on holiday
to the farm.
92
5. Operating Systems and Software
4
Mobile Operating Systems
READING COMPREHENSION
1. The paragraphs of the passage have been jumbled. Read them carefully and reorder
them from A to F.
(……) Today the market for mobile devices and particularly smartphones is
the battlefield for three operating systems: Google Android, Apple iOS
and Microsoft’s Windows Phone (WP).
While the platform of the ‘big G’ equips devices from different manufacturers,
iOS and WP are reference operating systems for the iPhone and Microsoft
Lumia smartphones respectively. Regarding Android and iOS, the battle later
extended to tablets, while in this area Windows offers tailor-made
solutions. All three competitors own an Application Store Market to
distribute Applications for both desktop and mobile devices and for each
operating system several apps for many different purposes are now available.
(……) In June 1998, Symbian Limited (formerly Symbian Foundation) was
founded and in 2001 the first version of Symbian OS 6.x was released.
It was one of the most famous and popular systems equipping the first
smartphones, especially those made by Nokia.
(……) Until 2006 the market for operating systems for mobile devices was in
an ‘embryonic’ state, as the ‘phone’ was the core around which the operating
system features were designed. Other designers started planning electronic
diaries (such as the calendar, address book and notes) and enhancing
telephone functions.
(……) After 2006, Google and Apple entered the mobile device market.
Mere ‘phone’ functions became marginal and the new heart of the operating
system was ‘the application’. As a consequence, the development of mobile
applications became an important employment opportunity for programmers.
Apple’s goal was to bring the Application Store Market – whose Linux
version for desktop computers had existed for years – to mobile devices.
A
(……) A mobile operating system or ‘mobile OS’ is a program that
controls a mobile device in the same way a PC operating system controls a
desktop computer or a laptop, dealing with issues related to the nature of
the mobile device. These include limited memory and CPU resources, the
absence of external power, the need for wireless technology to access the
Internet (Wi-Fi, GPRS, HSDPA...), input methods (touch screen, mini
keyboards) and reduced display dimensions.
(……) Symbian was equipped with platforms for application development such
as Java, Python and C++, which are also standard tools for desktop
computers. Many Java and C++ programmers started to write applications
not only for personal computers, but also for smartphones: these are the
so-called Apps. On 11 February 2011, Nokia announced that it would use
Microsoft’s Windows Phone OS as its primary smartphone platform, while
Symbian would be gradually wound down.
GLOSSARY
battlefield: arena, campo di battaglia
tailor-made solutions: soluzioni
(proposte) su misura
enhance (v.): potenziare
issue: questione
wound down: dismesso, abbandonato
A
93
4. Mobile Operating Systems
2. The following words are taken from the passage you have just reordered. How would
you translate them into Italian? You may use a dictionary, if needed.
1. Manufacturers
……………………………
5. Goal …………………………………………
2. Released ……………………………………
6. Wireless ……………………………………
3. Embryonic …………………………………
7. Equipped ……………………………………
4. Marginal ……………………………………
8. Core …………………………………………
PET
Writing – Part 1
3. Below is a letter you have received from your friend Claire, who is particularly keen
on learning and attends a high school in Dover.
Hi Sue, we had a substitute teacher in Psychology class today. We spoke about different
aspects of education and an interesting lesson came out of this topic. Before the bell rang,
she wrote a quotation on the board and asked us to reflect on it. Here it is: ‘Don’t limit a
child to your own learning, for he was born in another time.’ (Rabindranath Tagore)
I’m sure you’ll be impressed too and I’m dying to know what you think of it!
Write back soon
Claire
Write your answer to Claire in about 100 words.
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
FCE
Writing – Part 1
4. Your town sponsors a journalist award for high school students and you intend to
take part with an article on education.
Some quotations are provided and may be used in the article to support your ideas.
Write your article in 140-190 words in an appropriate style.
• ‘Education is the most powerful weapon which you can use to change the world.’
(Nelson Mandela)
• ‘The function of education is to teach one to think intensively and to think critically.
Intelligence plus character – that is the goal of true education.’ (Martin Luther King)
• ‘It is a miracle that curiosity survives formal education.’ (Albert Einstein)
• ‘Observation more than books and experience, more than persons, are the prime
educators.’ (Amos Bronson Alcott)
MIND MAP
SOFTWARE
Operating system
Operating systems
for PCs
Application software
Word processor
Linux
Microsoft Word
Windows
Open Office Writer
Mac OS
Google Docs
Mobile operating
systems
Spreadsheet
IOS
Microsoft Excel
Android
Open Office Calc
Google Sheets
Presentation software
Microsoft Power Point
Open Office Impress
Google Slides
Graphics software
CAD programs
Paint / Draw programs
and Photo
Manipulation programs
Development tools
Classic
development
environment
Integrated
development
environment
INDUSTRY 4.0
95
(PART 2)
We are currently experiencing the fourth step of technological
evolution which is characterised by a series of standards (paradigms)
known as Industry 4.0.
Such paradigms are a multifactorial complex of applications allowing
process optimisation due to their interconnection with manufacturing
and marketing processes.
The core of Industry 4.0 is digital technology. In order to comply
with this industrial system, plants ought to satisfy as many paradigms
as possible (see picture below).
CYBERSECURITY
INTERNET
OF THINGS
AUGMENTED
REALITY
BIG DATA
CLOUD
COMPUTING
INDUSTRY
4.0
AUTONOMOUS
ROBOTS
SYSTEM
INTEGRATION
SIMULATION
CLIL
ADDITIV E
MANUFA CTURIN G
IT Systems and Networks
1. Look at the image above. Using a bilingual or a monolingual dictionary, try to
define in your own words the different features of Industry 4.0. You can also make
examples from the topics you have studied in IT Systems and Networks or during
your school-work experience.
• Autonomous robots
• Simulation
• System integration
• Internet of Things
• Cybersecurity
• Cloud Computing
• Additive Manufacturing
• Augmented Reality
• Big Data
Audio
6
APPLICATION
SOFTWARE
• Word Processors
and Spreadsheets
• Presentation Software
• Graphics Software
• Development Tools
WARM-UP
brainstorming
• Have you ever used a word processor? To do what?
• Do you know what a spreadsheet is?
• What are the main advantages of writing a text using
a word processor over a hand-written document?
1
Word Processors and Spreadsheets
VOCABULARY
1. Match the pictures (1-8) with the words (A-H) describing them.
A. Italics
………
E. Bold
B. Fonts
………
F. Spreadsheet ………
C. Underlined
………
G. Chart
………
D. Grid
………
H. Crossed
………
Game over
1
2
………
3
Phil - Dentist’s
Game over
4
He lives in Rome
at 5 p.m.
Game over
5
6
CU there at 8!
7
Somewhere,
over the
rainbow…
8
97
1. Word Processors and Spreadsheets
Word Processors
36
A word processing program, or word processor,
is the most commonly used computer software
application.
The main advantage of a word processor over a
typewritten or hand-written document is that the user
can keep going back to the document and amend it.
Previously this would have meant retyping or rewriting
the whole text or ruining its appearance by crossing out
or using correcting fluid. This is the Editing function
of a word processor, which allows the user to keep
returning to a document to change, add or delete
text before printing it and thus saving paper.
Another important feature of a word processor is the
Formatting function, which is used to alter the appearance of
the text’s size, font, colour and style (bold, italic, underlined…).
The paragraph style can also be set to determine line spacing
and text alignment and many other functionalities to create a
document that looks consistent with its purpose and audience.
Because of these features, word processing programs have largely
replaced typewriters and pen and paper in both the domestic and
business environment.
Spreadsheets
GLOSSARY
amend (v.): correggere,
apportare modifiche
delete (v.): cancellare,
eliminare
audience: astanti, pubblico
37
A spreadsheet is an information-processing
tool that organises data into rows and columns.
Each data is stored in a cell and identified by
the intersection of a row and a column. A cell
can contain numeric values, but also a formula
to calculate new values involving data stored in
other cells of the document.
Modern spreadsheets are extremely
versatile and may be used to create
graphical displays or simple databases, but
their predominant use is the processing of
statistical and financial data. Their ability to
embed mathematical and statistical functions makes them the
ideal electronic replacement for traditional accounts books,
inventory sheets and budget summaries.
An important use of spreadsheets is Modelling, which is
setting up a sheet to insert various data into predefined cells
so that users can produce a variety of outputs to test
different scenarios.
For example, a model of how fast a checkout staff-member
in a supermarket can serve each customer can help to work
out the average queue time per customer. By increasing
the number of staff packing or working till queue time should
show different outcomes and this can help management to
decide how many staff they ideally need if they want to keep
queue times to an acceptable level. This is known as running
‘What if’ scenarios. In this example the predefined data is
changed to answer the questions: ‘What if I employed more
staff?’ and ‘What if I employed less staff?’
GLOSSARY
row: fila
versatile: versatile
replacement: sostituzione
average: medio
98
6. Application Software
PET
Reading – Part 3
2. For each question, choose the correct answer.
1. Word processing programs
4. The versatility of spreadsheets
 A. are not suitable for tablets and
 A. has led them to substitute word
smartphones.
processing programs.
 B. can amend only some kinds of
 B. is limited to the financial and statistical
texts.
fields.
 C. allow editing and formatting.
 C. is being slowed down by inventory
sheets, account books and budget
 D. allow video-making.
summaries.
2. Formatting a text may include
 D. is leading them to substitute old account
 A. deleting text before printing.
books and budget summaries.
 B. changing font type.
5. Modelling is an important feature of
 C. writing an essay.
spreadsheets because
 D. avoiding wasting paper.
 A. it allows the user to be connected to the
Internet.
3. Spreadsheets
 B. it allows the creation of simulation
 A. normally contain data.
models.
 B. are very useful for essay writing.
 C. it helps supermarket managers to
 C. cannot include text.
dismiss employees.
 D. keep data stored and organised
in long rows.
 D. it reduces customer queues.
What If …?
• What if I employed more staff?
• What if my car hadn’t broken down on my sister’s wedding day?
• What if I started a diet?
• What if your parents decided to move to Australia and start a new life there?
The questions above deal with different situations, but they have something in
common: they are all hypotheses. In other words, we can consider them as
conditional sentences.
Note that ‘What if’ + Past Simple refers to something that might happen in the
future (even though we cannot be sure about it) just like the 2nd Conditional.
However, ‘What if’ + Past Perfect refers to a situation that is bound not to be
fulfilled, just like the idea of unreal past expressed with the 3rd Conditional.
WRITING
3. Now it’s your turn. What if you wrote five questions using
‘What if’ + Past Simple and five using ‘What if’ + Past Perfect?
The best question might win a prize!
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
LISTENING
4. Surf the Internet and listen to What if, a song by the English band Coldplay. Fill in the
missing words in the numbered gaps.
WHAT IF
What if there was no 1. ………………………
Nothing wrong, nothing right
What if there was no 2. ………………………
And no reason, or rhyme
What if you should 3. ………………………That you don’t want me there by your side
That 4. ………………………don’t want me there in your 5. ………………………
What if I got it wrong
And 6. ……………………… poem 7. ……………………… song
Could put right what I got wrong
Or 8. ……………………… you feel I belong
What if you should decide
That you don’t want me there by your 9. ………………………
That you don’t want me there in your life
Ooh ooh-ooh, that’s right
Let’s take a 10. ……………………… try to put it aside
Ooh ooh-ooh, that’s right
11. ……………………… can you know it, if you don’t even
12. ……………………… .
Ooh ooh-ooh, that’s right
Every 13. ……………………… that you take
Could be your biggest mistake
It could 14. ……………………… or it could break
That’s the risk that you take
What 15. ……………………… you should decide
That you don’t want me there in your life
16. ……………………… you don’t want me there
by your side
Ooh ooh-ooh, that’s right
17. ……………………… take a breath try to put it aside
Ooh ooh-ooh, that’s right
How can you 18. ……………………… it when you don’t even try
Ooh ooh-ooh, that’s right
Oh – Ooh ooh-ooh, that’s right
2
Presentation Software
Presentation software is used by anyone
who wishes to display information intended for
an audience and is particularly useful in a
school or business environment.
This kind of application can make presenting
information more dynamic and interesting
when used in conjunction with a projector
and audio equipment. Text and images can be
animated and timed to appear at a given time
by clicking the mouse. Multimedia files such as
sound effects and video files can be added to
the presentation to make it more appealing to
the audience. Teachers, university lecturers,
students and professionals involved in
corporate training all use presentation software
to present their projects, research or thesis to
their audience. A very common example is
38
high-school students during their final exams
and displaying their project essays via
PowerPoint. The ability to combine a range of
different data into a logical and simple layout
has attracted many types of users who can
constantly modify their presentation to improve
it and enhance what they have done after each
show, sales pitch or lesson. A presentation
document is divided into slides; each slide is a
single screenshot corresponding to a particular
focus. The transition between slides can be
activated by clicking the mouse, a key stroke or
as in a show with pre-set timing. There are also
special wireless devices with function switches
to navigate throughout the slides; usually these
devices embed a laser pointer to help the
speaker during the presentation.
Some Functions
Text is very important in a presentation for the
audience because using too many multimedia
elements in a document can take up a lot of
memory and resources with a high risk of
slowing down the presentation.
This is the main reason why editing and
formatting are important functions for both
word processors and presentation tools. As we
have previously seen, editing allows the user to
keep revising a document and adding or
deleting text until they are happy with the
content, whereas formatting is used to alter
the appearance of the text’s size, font, colour
and style.
A presentation program allows the user to
import any text they wish, but it can also
import different objects. These objects may
include graphs created with a spreadsheet
program, images from a digital camera or a
graphics software, and also audio and video
files. By using these options, users can easily
create exciting multimedia presentations.
One set of functions to be found in a
presentation package relates to the way text
and objects appear on the screen. For
example, instead of displaying a flat, still text,
it can be made to move from one side to
another and reach its position on the screen or
emerge gradually from a point, or even spin in
from the middle of the screen. These types of
effects liven up the slide show and capture
the audience’s attention.
Similar functions can be used to define slide
transition, a function to define the way each
slide merges into another, for example as one
slide finishes it ‘dissolves’ into the next.
GLOSSARY
in conjunction with: insieme a, in modo
congiunto
thesis: dissertazione di laurea, tesi
sales pitch: discorso promozionale, legato
alle vendite
slow down (v.): rallentare
whereas: mentre
flat: piatto, bidimensionale
liven up (v.): ravvivare, animare, rendere più
vivace
101
2. Presentation Software
READING COMPREHENSION
1. Read the passage again and decide if the following sentences are true (T) or false (F).
1.
2.
3.
4.
5.
6.
Presentation software applications are mainly useful in business environments.
Users can freely add animation and videos to suit their needs.
Slide shows should contain no videos.
Changing font size implies you cannot add any animation.
Multimedia elements should not be used in presentations.
Large amounts of multimedia elements may have negative effects
on the slide show.
7. Users can activate slide transition by pre-set timing only.
8. Varying text effects can prevent the audience from being unfocused.
9. Only professionals can use presentation software applications effectively.
T





F













READING COMPREHENSION
2. Scan the passage and write statements about all the options you can add to a slide
show using a presentation software application.
PET
Listening – Part 4
39
3. For each question, choose the correct answer.
You will hear a woman talking about cool PowerPoint tricks to look like a ‘tech genius’.
1. According to the speaker, how many ways
are there to look like a ‘tech genius’?
 A. Four.
 B. Three.
 C. Two.
2. Using a live poll means that
 A. the audience can vote using their
own devices.
 B. the audience will challenge the results.
 C. the results won’t be shown in real time.
3. One of the advantages of using a live
text box is that
 A. you can easily cheat by altering
the scores in real time.
 B. you can use it to write down your
audience’s answers in real time.
 C. you can use it together with a live poll.
FCE
4. The last tip the speaker gives for a
successful presentation is to
 A. catch up with you slides.
 B. have fun with your slides.
 C. spice up your slides.
5. Which adjectives does the speaker use
to describe how animation and effects
should be?
 A. Astonishing and amazing.
 B. Stunning and unexpected.
 C. Lively but soothing.
Speaking
4. Your best friend has been given an assignment to make a PPT about his school. It
has to be about 5 slides long and include text and some images. Short videos are
allowed and animation is valued. However, there is a problem – your friend has
never used a presentation program and really needs help!
Give him/her instructions to complete the assignment, using your own words.
The deadline is tomorrow! (5 minutes)
102 6. Application Software
3
Graphics Software
40
Graphics software is designed to allow the user to store, manipulate and
print graphical images. There are different varieties of graphics software, each
designed for a different purpose, but the main ones are Computer-Aided
Design programs, Photo Manipulation programs and Paint/Draw programs.
Computer-Aided Design
(CAD) Programs
CAD programs require a high level of
knowledge and are used by engineers,
designers and architects to draw and design
objects. These programs use vector-based
images, representing them as geometric
objects such as lines, curves and polygons
based on mathematical equations. By using
this format, they can be changed or
scaled-down without losing quality and
can take up less memory and resources of an equivalent bitmap image.
The efficiency in the manipulation of this vector-based format allows the user to
view objects from different perspectives and model them at different stages of
design. For example, a car may be shown both as a sketch and as the final product.
Photo Manipulation Programs
Thanks to the spread of low-cost digital cameras
and the increased quality of integrated cameras in
smartphones and tablets, more and more people,
professionals and non-professionals, are using
digital format cameras to take their photographs and
their computers to store them.
These programs work with bitmap format
images, made up of collections of tiny squares
(pixels), allowing users to manipulate their size and
shape. Photo manipulation software has grown in
popularity and there is a variety of applications now
available, some aimed at the professional, some at
the home user. These programs are equipped with a
wide range of special effects to change functions like
colour, light or contrast. One of the most well-known
effects is the red eye removal filter, which allows the
user to get rid of red eyes when a flash is used
when taking a photograph of a person.
GLOSSARY
vector-based image: rappresentazione grafica
vettoriale, immagine vettoriale
scaled-down: in scala ridotta
professional: professionista
square: riquadro
get rid of (v.): sbarazzarsi, eliminare, rimuovere
103
3. Graphics Software
Paint/Draw Programs
The purpose of Paint/Draw programs is
to facilitate the user in the creation of
images. With these programs, a
document is a sort of ‘blank canvas’ to
be painted by the user by means of a set
of graphical tools that are a computerised
equivalent of pencils, brushes, paint
sprays, colour palette and so on. The
image built up by the user can be edited
and modified with the addition of new
elements and new effects. These
programs are used by both general users
and professional artists in ‘Computer Art’ or
‘Digital Art’. They can also be used in adverts
and TV programs. An evolution of these programs
is Computer Animation Software, used by
animators to create animated cartoons or to add
effects in movies and video games.
GLOSSARY
blank canvas: telo bianco, foglio bianco
brush: pennello
advert: messaggio promozionale
(pl. adverts = ads)
READING COMPREHENSION
1. After reading the passage, answer the following questions.
1. What is graphic software designed for?
2. Can you find any examples of graphic software in the passage?
3. What does ‘CAD’ stand for?
4. What are the main advantages of this software?
5. Is CAD a software anyone can use? Why?/Why not?
6. What are the reasons for the growing popularity of photo manipulation programs?
7. Is their use for professionals only?
8. List some of the functions this kind of software allows the user to perform on pictures.
9. What is the purpose of Paint/Draw programs and what do they allow the user to do?
10. What are some of the professional applications for this kind of software?
WRITING
– SPEAKING
2. Now use your answers to summarise the passage you have read. Practise your
summary orally as well.
PET
Speaking
3. Answer the following questions orally.
• Have you ever used Paint? Do you normally use it? How good are you at it?
• What can you use Photoshop for? How does it differ from Paint?
• Do you think that only models and famous people use photo manipulation programs?
Give reasons.
• If you saw an edited picture of your best friend on their Facebook wall, what would
you think?
• Some people could be tempted to ‘remove’ their friends or girlfriend/boyfriend from
pictures after breaking up or after an argument. What’s your opinion on this issue?
104 6. Application Software
4
Development Tools
READING COMPREHENSION
1. Complete the paragraphs below with the words in the box. Some words may have to
be changed slightly.
understand  translate  consist  submit  word  execute 
software  call  support  source  language  editor
A development tool or 1. ……………………… development tool
is a computer program that software developers use to
create, maintain, or otherwise 2. ……………………
other programs and applications.
Classic Development
Environment
Before the spread of development tools a
programmer used a text
3. ……………………… program to write the
instructions in a programming language. These
instructions are written at a high-level language,
which 4. ……………………… of a small set of
5. ……………………… that are typically instructions in
English. In general, this language is 6. ………………………
programming language (Basic, Pascal, C, Java). The program written in a high-level
programming language is called
7. ……………………… code and can’t be executed directly by a machine that
8. ……………………… only binary code like a computer.
After writing a program in a high-level 9. ……………………… with a text editor, a
software developer must 10. ……………………… the source code to a compiler.
A compiler is a program that 11. ……………………… source code into a binary code,
called machine language or 12. ……………………… code because it can be
interpreted and executed by a computer.
LISTENING
41
2. Listen and match the beginning of each sentence with the correct ending.
1.

Software development tools
are used
2.




Compilers serve the purpose
3.
4.
5.
‘Executable code’ means that
Instructions are written using
Compilers are submitted
A. to translate source code into a binary code.
B. a small set of words resulting in
English-written commands.
C. source codes by programmers.
D. by developers to create, support and
enhance programs and applications.
E. only computers can interpret and run it.
Integrated Development Environment
The growing complexity of today’s programs
makes it difficult to approach software
development in the ‘traditional’ way. The
development of a graphic user interface or a
well-formatted print report can be almost
impossible to achieve with a bare text editor.
Nowadays, most programmers use software
development tools to increase their
productivity. These tools integrate not only an
editor and compiler, but also other important
widgets such as graphic WYSIWYG screen
and report designer. WYSIWYG means What
You See Is What You Get: a programmer
can draw a graphic interface without writing
any line of code and letting the development
tool translate the drawing into source and
machine code.
There are many other important features
shared by most of the main development tools,
but one of the most important ones is a smart
text editor, which can check the syntax code
written in real time, therefore avoiding many
errors before compiling the source code. These
smart editors also help developers to avoid
errors with an auto-complete function: when
starting to write an instruction a smart tag
appears near the first typed characters
suggesting the possible instruction starting
with these characters.
Moreover, a source code written by a text
editor of an integrated development tool is
42
more readable as it uses different colours to
distinguish instructions from other elements of
a program (variables, comments etc.). It also
offers an auto-indent function to organise
the distribution of the instruction in the source
code efficiently.
Choosing which development tool is suitable
for us depends on the computer and the
programming language we want to use. For
example, for Macintosh with Mac OS, there is
a free tool called ‘Xcode’ to develop C, C++
and Objective-C programs for both computers
and mobile devices. A Java developer can use a
free multiplatform tool (available for PC, Mac
and Linux computers) called ‘Eclipse’ that can
also be used to develop applications for
Android mobile devices.
A good solution for developers in the Windows
environment is ‘Visual Studio’, which allows
the use of many programming languages
(Basic, C etc.), and can be employed to
develop websites or applications for computers
and mobile devices.
GLOSSARY
bare: semplice, essenziale, spoglio
widget: congegno grafico, dispositivo
source: sorgente, origine, fonte
auto-indent function: funzione (funzionalità)
di rientro automatico
employed: utilizzato, impiegato
106 6. Application Software
READING COMPREHENSION
3. Scan the passage and write down the words the descriptions below refer to.
1. They prevent mistakes in the syntax code.
………………………………………………………………………………………………………
2. They provide developers with a wide range of functions, including computer and mobile
device application development.
………………………………………………………………………………………………………
3. They are designed to incorporate widgets, editors and compilers.
………………………………………………………………………………………………………
4. Their proficiency is enhanced by software development tools.
………………………………………………………………………………………………………
5. They show smart suggestion tags after the first characters are typed.
………………………………………………………………………………………………………
6. It organises and distributes the instructions in the source code in the most efficient way.
………………………………………………………………………………………………………
SPEAKING
– CLASS DEBATE
4. Divide the class into two groups, A and B. Each group has to defend its own point
of view, giving reasons for each statement. Let your voice be heard!
[
PET
Group A definitely agrees with this quote: ‘Photoshop is an art, and you
can do a lot with it. Change the atmosphere through different lighting
and make the pictures more interesting.’ (Crystal Renn)
Group B firmly endorses this quote: ‘I don’t love Photoshop: I like
imperfection. It doesn’t mean ugly. I love a girl with a gap between her
teeth, versus perfect white veneers. Perfection is just… boring. Perfect
is what’s natural or real; that is beauty.’ (Marc Jacobs)
]
Writing – Part 2
5. Your English teacher has asked you to write a short story. The title is
‘A blurry photograph’. Write your answer in about 100 words.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
FCE
Writing – Part 2
6. You recently attended a course on Computer-Aided Design at school.
The course lasted four weeks; lessons were twice a week from 2 p.m.
to 4 p.m. After the final test, you received the following e-mail.
We hope you enjoyed the course and would be
grateful if you could provide us
with feedback. We would appreciate receiving a
report on the course you have just
attended expressing your point of view on the follo
wing points:
• Organisation
• Length
• Contents
• Suggestions
Thank you in advance,
James H. Denver
Easy CAD Team
Write your report on the course in 140-190 words in an appropriate style.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
MIND MAP
APPLICATION
SOFTWARE
Word processor
Spreadsheet
Presentation software
main
functions
made up of
made up of
Cells
Slides
other
functions
Text editing
Text formatting
Layout
Revision
Headers and footers
identified
by
which may
contain
which may
contain
Rows and columns
Text, images, movies,
sounds and
animation effects
Numbers, text,
formulae
INDUSTRY 4.0
(PART 3)
REVISION
1. Complete the following summary using the words in the box.
Computer-Aided  may  skilled  Word  carry  tools  software  know
In this Unit, you have studied different types of 1. ………………………,
such as Spreadsheets, 2. ……………………… Processors, Presentation,
Graphic and 3. ……………………… Design software and development
4. ……………………… . You can choose which ones to use according to
the task you have to 5. ……………………… out. To do this, you need to
6. ……………………… the characteristics of each software to take a good
You also need to be 7. ……………………… in its use, otherwise the output
decision on which one to use.
8. ……………………… not be satisfactory.
ICT / Citizenship
2. Task: creating a digital safety brochure.
Your class is taking part in a European project about the importance of keeping
attention high on safety, especially regarding the Covid-19 pandemic.
You will work in groups of 4 students; each group has to create a leaflet and
show it to the class. To comply with safety rules, only digital leaflets can be
shown.
CLIL
The brochure
must include:
• facts and
figures;
• safety measures
and PPE
(Personal
protective
equipment, e.g.
face masks);
• tips to promote
safety.
You may add
music, animations,
comics and
images to make
the digital leaflet
more lively and
entertaining.
109
Audio
ALGORITHMS
AND PROGRAMMING
LANGUAGES
7
• Algorithms
• Writing Algorithms Using a Flow Chart
• Programming Languages
WARM-UP
brainstorming
• Have you heard of the term ‘algorithm’?
• What do you associate it with?
• Where can algorithms be found in everyday life?
1
Algorithms
43
As previously seen, the computer is a complex machine capable
of performing an impressive amount of operations per second.
Modern computers, including the ones in our homes, have a
memory that can hold huge amounts of data – files, movies,
sounds or simple text documents.
These features allow computers to carry out functions, even
very complicated ones. However, to make this possible, we
must specify the operations through a set of instructions that
allow the machine to process the data appropriately and
consequently deliver the required results. This set of instructions
is called a program.
The aim of a calculator is to solve a problem, which could be
mathematical, scientific or economical.
However, it is necessary to formulate the problem in such a way
that it can be ‘understood’ by the computer, and then studied by
an analyst who identifies the set of initial data and instructions
that have to be performed to obtain the set of the final data,
that is, the results. Even without knowing in detail how a
computer is made, we can use it. To start with, we should think
of it as a black box that receives data and commands and
provides results as shown in the following picture.
GLOSSARY
huge: ampio, vasto
data: dati (dal latino
datum = dato)
appropriately: in modo
adeguato
111
1. Algorithms
PROGRAM
INITIAL DATA
CALCULATOR
RESULTS
The first step to solving a problem by means of
the computer is therefore to identify a method
of formulation of the problem and of rules, so that
an automatic machine could use it. This means we
need to identify a set of elementary operations
which, if properly carried out on the initial data,
enables the user to obtain results.
The sequence of elementary operations describing
a method for the automatic resolution of a
problem is called an ALGORITHM and a
program is nothing but an algorithm expressed in
a suitable form for a computer.
The term algorithm reportedly derives from the
Persian astronomer and mathematician
Muhammad ibn Musa al-Khwarizmi
(Baghdad, around 780 – around 850), who is
considered the inventor of the process that allows
the calculation of the multiplication of two
numbers by arranging the numbers under each
other, a method we still use nowadays.
GLOSSARY
therefore: quindi, dunque, di conseguenza
reportedly: a quanto si dice
arrange (v.): disporre, sistemare, ordinare
READING COMPREHENSION
1. Read the passage and match the beginning of each sentence with the correct ending.
Computer memory
2.


3.

In order to carry out
functions
1.
Solving problems of varying
types
Initial data and instructions
5.


6.

A computer program is
4.
Algorithms can be
described as
A. an algorithm expressed so as to be
understood by a computer machine.
B. are detected and studied by analysts
to get the required results.
C. can hold different kinds of data.
D. operations in a computer have to be
detailed in sets of instructions.
E. is the ultimate purpose of computer
machines.
F. sequences of simple operations used
to solve a problem.
112 7. Algorithms and Programming Languages
PET
Reading – Part 5
2. For each question, choose the correct answer.
A MATHS GENIUS FROM THE PAST
Muhammad ibn Musa al-Khwarizmi was a Persian mathematician, 1. ………
and geographer during the Abbasid Caliphate and a scholar in the House of
Wisdom 2. ……… Baghdad. We know very 3. ……… about his life: his family
had Persian origins and he 4. ……… in Greater Khorasan which we now know
as Xorazm Region in Uzbekistan. He 5. ……… his masterpiece
The Compendious Book on Calculation by Completion and Balancing in 830.
In this book, he 6. ……… the first systematic solution of linear and quadratic
equations in Arabic, later leading to algebra. Al-Khwarizmi’s contributions to
mathematics, 7. ………, astronomy and even cartography established the
basis of innovation in Algebra and Trigonometry. 8. ……… being considered
one of the fathers of algebra, he also reviewed Ptolemy’s geography and also
wrote on astronomy and astrology. He also studied and wrote on mechanical
9. ……… like the astrolabe and sundial. 10. ……… the 12th century, Latin
translations of his work had a great influence 11. ……… the advancement of
mathematics in Europe. 12. ………, they helped to introduce the decimal
positional number system to the 13. ……… world.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
A. astronomy
A. of
A. few
A. was born
A. writes
A. introduces
A. geographer
A. Besides
A. gears
A. On
A. about
A. Eventually
A. West
B. astrologer
B. with
B. much
B. born
B. written
B. introduced
B. geography
B. However
B. devices
B. At
B. in
B. Moreover
B. South-West
C. astronomer
C. at
C. little
C. is born
C. write
C. introduce
C. geographic
C. Finally
C. things
C. In
C. after
C. Nonetheless
C. Northern
D. astrolabe
D. in
D. lots of
D. were born
D. wrote
D. ’s introduced
D. jeopardy
D. At first
D. objects
D. When
D. on
D. Due to
D. Western
2
Writing Algorithms Using a Flow Chart
How can we set the rules to solve problems
with no ambiguities that would threaten the
reliability of the results?
As we know, an algorithm consists of a series
of elementary instructions to be executed in
a given specific order. To ensure that the
procedure is successfully completed, each
instruction has to be described
correctly and without ambiguity.
It is possible to formulate an algorithm in
human language and this becomes necessary
when the problem has to be solved by a human
– when a student is struggling with a Maths
problem, for instance. However, we ought
to be very careful about the words we choose
to employ because human language may lead
to misinterpretation.
To avoid the typical ambiguities human
language, it is possible to generate the solving
procedure in graphic form without losing its
effectiveness. It can also prove
Reading instruction: it requires the
initial data and it is necessary to specify
the requested data.
advantageous when this process has to be
translated into a program.
This form of representation of an algorithm is
called a flow chart and consists of graphical
symbols where instructions are written.
In a flow chart, oriented lines (ending with an
arrow at one end) interconnect the graphic
symbols. These lines determine the correct
order of the sequence of the operations to be
performed. The sequence normally develops
from top to bottom.
Let’s have a closer look at the symbols we
can use.
GLOSSARY
threaten (v.): minacciare, minare
we ought to be: è bene essere
advantageous: vantaggioso
flow chart: diagramma di flusso
arrow: freccia
Alternative instruction: the
processing continues according to the
condition indicated within the symbol
(true or false).
True
Writing instruction: it prints the
results and it is necessary to indicate the
data to be printed.
44
False
STOP instruction: it detects the end
of the procedure.
STOP
General instruction: it is necessary to
insert the elementary instruction to be
performed.
START instruction: it detects the start
of the procedure.
START
114 7. Algorithms and Programming Languages
READING COMPREHENSION
1. After reading the passage, answer the following questions.
1. What do algorithms consist of? …………………………………………………………………
………………………………………………………………………………………………………
2. What is the condition for a successful procedure to run? ……………………………………
………………………………………………………………………………………………………
3. What is a flow chart?………………………………………………………………………………
………………………………………………………………………………………………………
4. Why is language so important for writing algorithms? ………………………………………
………………………………………………………………………………………………………
5. How can we avoid the dangers of ambiguity posed by human language? ………………
………………………………………………………………………………………………………
6. What is this symbol and what does it specify?
………………………………………………………………………………………………………
7. What other symbols can we have in a flow chart? ……………………………………………
………………………………………………………………………………………………………
READING COMPREHENSION
– SPEAKING
2. Use your notes to give an oral summary of the passage you have read.
ALGORITHMS AND FLOW CHARTS
– GUIDED EXERCISE
3. Write an algorithm to read two whole numbers and print the greater one.
1. Read the two numbers A and B
2. If A is greater than B then write A
3. Otherwise write B
Flow chart:
START
READ A
…………………
FaLsE
tRUE
…………………
…………………
WRITE B
…………………
115
2. Writing Algorithms Using a Flow Chart
The math teacher
was a good dancer
– he had algorithm.
algorithm
noun
Word used by programmers
when they do not want to
explain what they did.
LISTENING
45
Listen to the recording and do the following exercises.
4A. Fill in the blanks.
The speaker defines an algorithm as a set of ……………… to accomplish a ……………… .
4B. Tick the odd one out.
The speaker gives some everyday examples where algorithms are useful for…
 A. going from home to school;
 B. making a grilled cheese sandwich;
 C. scheduling your nutritional habits;
 D. finding items in a grocery store.
4C. Match the companies with the algorithm used.
Some important companies use different kinds of algorithms to suit their needs. For instance:
1.
2.
3.
4.




Google Hangouts
A. Route-finding algorithm
Pixar
B. Optimisation and scheduling algorithm
Nasa
C. Compression algorithm
Google Maps
D. Rendering algorithm
3
Programming Languages
46
Once you find the algorithm to solve a problem, how do you give
instructions to the computer? What language should be used?
As we know, a computer is a digital camera. That it, it understands
only the binary code and the instructions must consist solely of
sequences of zeros and ones. In this case, the language used is called
machine language and it is the only language understandable
by a computer.
For human beings used to communicating in their own language,
it is quite difficult to have to express endless sequences of numbers
in order to interact with a computer. This was necessary when using
the earliest computers and was possible because of their complexity
which was far less than that of current machines and such as to allow
programmers to handle data and instructions in a binary format.
Luckily, it is no longer like this: the instructions are made in a
high-level language, which consists of a small set of words that are
typically instructions in English. In general, this language is called
programming language.
There are many programming languages, for example Basic, Pascal,
C, Java. Each of these can be used to solve the same problem,
depending only on the knowledge of the user: the programmer.
Every language sets out very precise rules on how to formulate
instructions and define the data. The programmer’s knowledge of
vocabulary (together with the set of instructions or keywords) and the
syntax and vocabulary of the language chosen is therefore essential.
How can you move from an algorithm formulated in a programming
language to the corresponding machine language that allows
the computer to operate?
The programmer writes the program in the chosen programming
language. The result of this first phase is one or more text files
containing the instructions. In this form, the program is called
source code.
The source code is subjected to a special program called a ‘compiler,’
which checks the correctness in terms of lexicon and syntax. Once
this first check is done, the compiler translates the source code into
machine language thus producing the executable code.
It is interesting to note that the compiler is intimately linked
to the programming language, having to analyse and translate it,
and to the type of computer (microprocessor) that must run the
machine code produced. Therefore, it is necessary to have a
compiler dedicated to each family of microprocessors and to each
language.
GLOSSARY
solely: esclusivamente
handle (v.): trattare, maneggiare,
disporre di
programming language: linguaggio
di programmazione
keyword: parola chiave
lexicon: lessico
117
3. Programming Languages
READING COMPREHENSION
After reading the passages about algorithms and programming languages, do the
exercises below.
1A. Answer the following questions.
1. What is an algorithm?
6. Who decides which programming
2. What is a program?
language to use?
3. What is the source code?
7. List the programming languages
4. What does ‘machine language’ mean?
mentioned in the passage.
5. What is an executable code?
1B. Complete the sentence.
The compiler is a program which translates the ……………… code into ……………… code.
PET
Writing – Part 3
2. Frank and Joe are 16 years old and close friends. They have known each other
since primary school but now they are attending two different high schools.
They live in the same neighbourhood, though. It’s Friday afternoon and they are
at Joe’s trying to organise the best Halloween party ever thrown in the area.
Write the dialogue between the two friends (about 100 words) and remember
to include the following points:
• where and when the party will take place;
• food and beverages;
• entertainment (music, games etc.);
FCE
• how many people to invite;
• fancy Halloween costumes.
Writing – Part 2
3. You are the editor of your town’s local newspaper and are therefore in charge of the
‘Letters to the Editor’ page. You have just received and read a long handwritten
letter from Mr Jones, the town librarian. Here’s an extract from his note.
Where is all this compulsive online gaming leading us? Everyone seems to be
playing games with smartphones and tablets all the time – on buses, trains,
cars, while queuing at the post office or at the supermarket counter, even
while driving! People can no longer just communicate with each other.
Whole families sit around the same table, each staring at their own hi-tech
device. You see people chasing tiny little monsters along the streets. There
must have been one in the town library, too, as yesterday a group of five
people rushed in frantically holding their smartphones to catch it. I could
not believe my own eyes!
Write a reply to Mr Jones, expressing your opinion about his concerns and accounting
for your statements. Write your answer in 140-190 words in an appropriate style.
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………
MIND MAP
ALGORITHM
is
suitable form for
a computer
A sequence of elementary
operations describing a
method to solve a problem
Program
Compiler
interpreter
a graphic method to
describe a program
described
with
written using
converted in machine
language (binary code) by
A flow chart
A programming language
made of
made of
Graphic symbols and
oriented lines
Instructions
each symbol
contains
Elementary instruction
each symbol corresponds
to a single instruction
which
contain
Keywords
119
MOVIES AND MORE
Algorithm – Official Trailer
Snowden – Official Trailer
WARM UP
– PAIRWORK
1. Discuss the following questions with a classmate.
1. What does ‘to hack’ mean? Look it up in a monolingual dictionary and explain it in your
words.
2. Which words do people and the news usually associate to this verb? You can make
examples to support your ideas.
3. How would you explain the meaning of ‘hacker’ to a friend?
4. What do you know about Edward Snowden? Have you ever read about him in the news?
5. What is MIT?
WATCHING
/ SPEAKING
2. Now watch the official trailers of Algorithm and Snowden and discuss the following
issues.
1. Do the movies seem to portray hackers in a positive or negative way and why?
2. Do you think the two movies have any features in common? How about
possible differences (plot, time, place…)?
3. In the first trailer, the protagonist says: ‘In the late 1950s MIT hackers thought
all information should be free’. In the second one, one of the characters says:
‘Most Americans don’t want freedom. They want security.’
What is your personal opinion on these statements? Can you think of any examples in
the news nowadays about these issues? Try to make as many examples as you can.
Audio
NETWORKING AND
TELECOMMUNICATIONS
• Sharing Resources
• LAN and WAN
1
Sharing Resources
A computer network describes any
situation in which two or more
computers are linked together
via some form of
communication medium
for the purpose of
exchanging data or
sharing resources.
For example, in an
office, a high-quality
and performance
printer to be
shared between
computers could be
a better solution
than providing each
workstation with a
small cheap printer.
Nowadays, almost every
company has its own
computers and some
peripherals linked to a network
environment. Non-networked use of
computers, the so-called stand-alone
environment, is still the norm in
domestic situations, although one
could argue that the Internet
connection present in almost all houses
is rapidly converting domestic users into
network users.
8
• Telecommunications
• Wi-Fi and Cellular Data Technologies
47
GLOSSARY
linked: connesso, collegato
one could argue that…: si potrebbe obiettare che…
consistent: coerente
cost-effective: vantaggioso (in senso economico)
repeater: ripetitore, amplificatore del segnale
infected: infetto, infettato
saving: risparmio, somma risparmiata
121
1. Sharing Resources
Advantages
Data can be shared and accessed by a wide
range of users. This is particularly important
when users need to access one or more
databases. Without a network, a copy of
the database is needed on each workstation.
If users make changes on their copy of the
data, the integrity of the initial database is
compromised and a complex program is
consequently required to rebuild a
consistent version of the database which
includes the changes made by each user.
Hardware resources such as printers and
scanners can be shared as well – a less
expensive solution than providing each user
with their own set of peripheral devices.
In addition, software resources can be shared
instead of buying a single copy for each
workstation. Of course, it is necessary
to purchase a network licence of
the software to share whose cost depends on
the number of authorised users, but this is
a more cost-effective solution than buying
a single licence for each user.
Furthermore, backup procedures, which make
security copies of important data, are easier
as they are centrally located. Users are not
responsible for backing up their data: a
network manager is responsible for running
regular backup tasks.
…and Some Disadvantages
Setting up a computer network is more
expensive than configuring a group of
‘stand-alone’ computers. Usually, for
performance reasons, to store the shared
data a server – that is, a more powerful
computer than the workstation – is employed,
in addition to each user’s computers.
In addition to the server, installation and
configuration of communication devices
such as switches, repeaters, cables and
connectors are required.
Moreover, network management, especially
for big organisations, requires a high degree
of specialist knowledge and this means that
a network manager will have to be employed
for this purpose.
Finally, networks are particularly vulnerable
to viruses. If a machine is infected the virus
may spread to the other computers more
easily than in a stand-alone environment.
Network or Stand-Alone?
In analysing the advantages we can see that
set-up and maintenance costs are significant
in comparison to a stand-alone environment,
but in most cases they exceed the savings
that result from efficient resource
management in a network environment.
122 8. Networking and Telecommunications
2
LAN and WAN
48
One way to classify computer networks is to focus on their geographical extension. According to
this criterion, we have Local Area Network (LAN) and Wide Area Network (WAN).
Local Area Network
A Local Area Network is a short-distance network and it is
enclosed within a small geographical area such as a room,
an apartment or a building. A closely connected group
of buildings, for example a university campus, can be
connected with a LAN.
The main mode of communication in this kind of
network is physical cabling, usually with copper
wires. When covering long distances and whenever
high performance is required, a combination of
optical fibre and copper cable is employed.
Due to the constant lowering of costs of wireless devices,
Wi-Fi connections are often included within LAN, thus allowing
cost-savings and avoiding buying and installing a considerable
amount of cabling. In some cases, wireless technology is an
obvious choice, for example in buildings of particular historical
and artistic interest where it is not possible to install cables
without damaging them.
Another defining feature of a LAN is that all the network
resources are managed by the local network area organisation
that uses them.
Sometimes we use the term Intranet instead of LAN, yet they
are not the same. Put simply, an Intranet is a private computer
network that employs Internet protocols and network
connectivity to allow users to access a pool of information or
operations. In other words, Intranet is a particular kind of LAN.
GLOSSARY
criterion: criterio
(dal greco – pl. criteria)
copper: rame
defining: caratteristico,
distintivo
connectivity: connettività
kind: tipo, genere
literally: letteralmente
owned: posseduto,
di proprietà di
branch: ramo, filiale
Wide Area Network
A Wide Area Network is a network spread
over a large geographical area and it is made by
connecting a group of LANs via a wide range
of communication media.
To build a wireless and satellite WAN,
technologies are used in addition to physical
cabling thus allowing the network to reach a
literally worldwide extension.
Unlike a LAN environment, working in a WAN
environment will involve using network resources owned and
managed by a wide range of local network areas.
WAN can be subdivided into public and private. A private WAN is a
secure network, with strict access control and authorisation, owned and
managed by a single organisation. For example, a company with several
branches around the world can benefit from using a private WAN. On
the other hand, a public WAN is owned and managed by more than one
network area and the best example of this kind of network is Internet.
123
2. LAN and WAN
READING COMPREHENSION
1. Read the passage and decide if the following sentences are true (T) or false (F).
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
In an office, it is more profitable to provide a printer for each computer.
Stand-alone environments are quite common as home solutions.
A computer network is useful in work environments only.
Computer networks allow data sharing.
Sharing resources implies less time to manage data and file changes.
Sharing printers within offices is not a convenient solution for big companies.
Computer networks and sharing resources have lots of advantages
and no disadvantages.
If using computer networks, you should pay greater attention
to the spread of viruses.
Stand-alone environments are generally less costly than setting up
computer networks.
In computer network environments, there is no need for skilled personnel.
LAN and WAN differ depending on the size of the area they cover.
Intranet and LAN are synonyms.
Setting up a WAN involves wireless and satellite technologies as well as
a traditional cabling system.
WANs can be either public or private.
Internet is an example of private WAN.
FCE
T






F
























Speaking
2. Look carefully at the photographs below, then describe them orally in appropriate
language, highlighting all the following aspects.
(4 minutes)
• Setting
• Appearance/Description
• Feelings
• What happened prior to taking the photograph
• What is likely to happen the day after
• Your opinion on the photograph
3
Telecommunications
FCE
Reading and Use of English – Part 3
1. Read the text below and use the word given in capitals at the end of
some of the lines to form a word that fits in the gap in the same line.
There is an example at the beginning (0).
The term telecommunications is obtained 0. combining the word tele,
which means ‘far’ in ancient Greek, with the word communications
and deals with 1. …………………… exchange between entities using
technology to reduce the distance between these two entities. This
technology is not necessarily electric; in fact, a long time ago people
began to communicate using smoke signals and drums in Africa, the
Americas and parts of Asia.
COMBINE
INFORM
Electric Communications
It was not until the 1830s that electrical telecommunication systems
started to appear with the first electrical telegraph to transmit and
receive information 2. …………………… with the Morse alphabet.
The first distance communication using human voice dates back to
the 1870s, but it was not before December 1901 that wireless
communication became reality thanks to Guglielmo Marconi. The
Italian 3. …………………… was able to establish wireless
communication between St John’s, Newfoundland, and Poldhu,
Cornwall, which earned him a Nobel Prize in Physics he shared with
Karl Braun. Guglielmo Marconi built the first complete, commercially
successful wireless telegraphy system based on airborne
electromagnetic waves, but his experience, which began seven years
before the 4. …………………… communication between
Newfoundland and Cornwall, allowed Reginald Fessenden to transmit
a human voice wirelessly.
CODE
SCIENCE
SUCCESS
Telecommunications and Computers
With the spread of 5. …………………… it has become necessary to
exchange information between them. Since computers are electronic
systems, it is natural that both wired and wireless communication
technology be electrical. The main 6. …………………… between
computer communication and the earliest technologies employed is
that computers exchange 7. …………………… information and not
analogic ones as in the first electric telephone. As a matter of fact, a
digital signal is a sequence of two pieces of elementary information:
zero and one. They can be coded with electric 8. ……………………:
for example one is the presence of an impulse in a given time interval
and zero is the absence of the impulse. For successful
communication, a transmitter and a 9. …………………… must share
the same rules, timing and information coding. In other words,
communication is established according to the same protocol
between 10. …………………… and receiver. In case of network
communication between computers, the most used protocol is called
TCP/IP and it is suitable for both small local networks (Local Area
Network or LAN) and Wide Area Network (WAN), which can reach a
huge 11. …………………… area around the world. Not only is TCP/IP
a standard for private networks owned by organisations or
12. …………………… in the home environment, it is also the protocol
that makes Internet communications.
COMPUTE
DIFFER
DIGIT
IMPULSE
RECEIVE
TRANSMIT
GEOGRAPHY
EMPLOY
126 8. Networking and Telecommunications
PET
Listening – Part 4
49
2A. For each question, choose the correct answer.
You will hear Steve Jobs speaking to Stanford University students.
1. Steve Jobs
 A. graduated cum laude at college.
 B. spent long years at college with
unsatisfactory results.
 C. never graduated from college.
2. In his speech, he tells the students about
 A. some events from his childhood.
 B. three stories about events in his life.
 C. meeting the right people at the right
time.
3. In the first story, Steve Jobs explains that
 A. his biological mother had abandoned
him in an orphanage.
 B. being religious, his biological mother
wanted him to be raised by people
attending the local Church.
 C. his biological mother wanted Steve’s
foster parents to be university
graduates.
4. Steve’s foster parents actually happened
to be
 A. different from what she had planned.
 B. consistent with Steve’s biological
mother’s desires.
 C. totally inadequate people in
child-raising.
5. Steve Jobs points out that
 A. dropping out of college was
the worst mistake of his whole life.
 B. spending his parents’ savings in
college was a burden to him.
 C. only college graduation could have
made his life meaningful in his
parents’ eyes.
6. After dropping out of college Steve Jobs
 A. spent about six months there,
attending courses for free.
 B. went back to his parents’ home and
began to work on the first Macintosh
computer.
 C. thought of joining the Hare Krishna
Temple and settling there.
7. Attending calligraphy classes
 A. proved to be useful from the early
stages of the development of the
Macintosh.
 B. was a complete waste of time, in
Job’s opinion.
 C. was very interesting but it never
had any practical application
whatsoever.
127
3. Telecommunications
2B. Now listen to the final part of the speech and decide if the following
sentences are true (T) or false (F).
50
The third story Steve Jobs tells the students is about illness and death.
He developed cancer when he was 17 years old.
Being aware of death was useful to his life and career.
When doctors diagnosed pancreas cancer, Steve Jobs was heartbroken
and in despair.
5. He had to undergo surgery to fight the disease.
6. Jobs thinks that people would be happier if they could follow
their heart’s desires.
7. He compares The Whole Earth of the late 1960s to Google.
8. Jobs didn’t like this publication at all, but his mum did.
9. The final statements of his speech ‘Stay hungry, stay foolish’ date back
to the last issue of that publication.
10. He encourages the graduated students to stay hungry and foolish
because he wants no further business competitors.
1.
2.
3.
4.
2C. Now watch the full video of the speech.
PET
6
Speaking
3. Ask and answer the following questions with a classmate, then switch roles.
• Is your home equipped with a Wi-Fi connection?
• What do you mainly use it for?
• Who else uses Wi-Fi connection in your family? What do they use it for?
• Make a list of five things in your everyday life that would be different if
you didn’t have a Wi-Fi connection.
• Explain to your partner how you would cope with this.
T



F

















128 8. Networking and Telecommunications
4
Wi-Fi and Cellular Data Technologies
It would be difficult to use a mobile device
(smartphone, tablet, laptop) by connecting it to a
network through copper wires or optical fibre, as
it would be impossible to have a huge number
of plugs to connect our device to wherever we go.
Moreover, using cables means that people can
access network resources from static locations,
so the device is no longer mobile – at any rate,
its mobility is restricted.
Different jobs may require network access and
mobile use, e.g. a doctor treating patients in a
large hospital. The data on these patients is held in
a networked database. It would be clearly advantageous for the doctor to access a
patient’s clinical records just prior to the examination and to be consequently able
to update the same database after the examination. The spread of mobile devices is
closely linked to the spread and constant improvement of efficient wireless connection
technologies like Wi-Fi and connectivity through the signals used by mobile phones
(GPRS, EDGE, 3G and HSDPA).
Wi-Fi
Wi-Fi (or WiFi) is a local area wireless computer networking technology that allows
electronic devices to connect to a network using high frequency radio signals (2.4
or 5 gigahertz). Many devices can use Wi-Fi, e.g. personal computers, video game
consoles, smartphones, digital cameras, tablet computers, printers and digital audio
players. They can connect to a network resource such as the Internet via a wireless
network device called an ‘access point’ (or hotspot), which has a range of about
20 metres indoors and a greater range outdoors. Hotspot coverage can be as small
as a single room with walls that limit high frequency radio waves, or as large as many
square kilometres achieved by using multiple overlapping access points.
Wi-Fi can be less secure than wired connections because an intruder does not need a
physical connection and can intercept data with a special radio receiver tuned
on the Wi-Fi signal frequency. This is the main reason why Wi-Fi has adopted
various encryption technologies: even if an intruder steals information,
data is coded with a password using
complex algorithms and can only be
decoded by knowing this
password and which algorithm is
employed (see ‘Encryption and
Cryptography’, Unit 10).
GLOSSARY
plug: spina
treat (v.): curare
record: elemento, dato
range: gamma, varietà
indoors: all’interno
intercept (v.): intercettare
encryption: criptaggio
steal (v.): rubare, sottrarre
decoded: decodificato,
decrittato
51
129
4. Wi-Fi and Cellular Data Technologies
Cellular Data Technologies
When no access point is available or it is
private and can’t be accessed, it is possible to
connect to a network, in most cases the
Internet, if your mobile device is equipped with
the technology to access a cellular network and
your provider allows you to connect to it.
Cellular data technology, as Wi-Fi bases on
high frequency radio waves and is constantly
evolving to improve performance in data
transfer speed.
Currently there are many standards for data
connection with smartphones. Here are some
of them, listed from the lowest to the highest
performance.
2G or GPRS (Second Generation)
GPRS is a system used to transmit data at
speeds of up to 60 kbits per second and is a
battery-friendly way to send and receive e-mails
and to browse the Internet, but with the current
broadband connectivity it may be rated as
slow by some.
EDGE
EDGE (Exchanged Data rates for GSM
Evolution) is a recent development based on
the GPRS system and has been classified as a
‘3G’ standard because it can run at up to
473.6 kbits per second. If a smartphone is
EDGE-compliant, it can be used for heavy
mobile data transmission such as receiving
large e-mail attachments and browsing
complex web pages at great speed.
3G (Third Generation)
3G was initially marketed as a way to make
video calls on the mobile network but is also a
highly efficient way of browsing the Internet
and communicating on your smartphone using
voice over IP and by e-mail and instant
messaging. Most UK and some European
networks now have 3G networks and with
speeds similar to EDGE it has become a
widely useful way to connect and communicate.
GLOSSARY
radio wave: onda radio
rate (v.): valutare
attachment: allegato
speed: velocità
optical fibre: fibra ottica
HSDPA
HSDPA (High Speed Downlink Packet Access)
is a technology based on the 3G network that
can support speeds of up to 7.2 Mbits per
second. Actually, you will most likely get a top
speed of around 3 Mbits, but this is useful for
mobile TV streaming and other high-end data
transmissions.
4G or LTE (Fourth Generation)
4G is an evolution of 3G technologies to
support advanced multimedia applications
thanks to high bandwidth connections.
The 4G network can support download speeds
of up to 326 Mbits per second.
5G (Fifth Generation)
5G is the new generation network with
speed up to 20 Gbits per second. This
high-connection speed allows to access
network services that are usually delivered using
optical fibre technology, such as cloud
computing and cloud gaming. This network is
as reliable as a wired network and can support
smart cities, automotive systems and much
more. Some people claim that it could have
negative effects and consider it a controversial
issue, though.
130 8. Networking and Telecommunications
READING COMPREHENSION
1. Read the passage and match the beginning of each sentence with the correct ending.
1.

As an advancement
of 3G technology,
2.

Nowadays, many networks
are employing
3.

HSDPA technology can
support very high speed
4.

The GPRS system has
provided further development
5.

Before the advent and spread
of broadband connections
6.

In order to prevent hacker
attacks
7.

5G allows to connect to a wide
range of network services
8.

Despite being a useful and
versatile technology
PET
A. that are usually supplied through
optical fibres.
B. resulting in EDGE technology.
C. 3G to support Internet browsing and
mobile device applications.
D. Wi-Fi technology employs protection
systems based on encryption
techniques.
E. 4G can support advanced
multimedia applications.
F. Wi-Fi is more liable to being violated
through radio devices which
intercept its signal.
G. yet the average user will get a lower
top speed.
H. people thought GPRS was the best
way to manage e-mail services and
to browse the Internet.
Writing – Part 3
2. You have recently joined a Drama Club in your school and your group is looking for
new ideas to perform on stage. Write down a report with some ideas for a school play
in about 100 words. Remember to include the following elements.
• Theme/Plot
• Special effects
• Number of characters
• Costumes
• Roles
• Rehearsals
• Music
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
131
4. Wi-Fi and Cellular Data Technologies
SPEAKING
– CLASS DEBATE
3. Here are some quotes on success and failure in life.
Divide the class into three groups. Each group has to
choose one of the quotations and give reasons for the
choice. Furthermore, each group has to comment on the
quote; the other two groups should ask questions as
well. The teacher will eventually choose the best debate.
[
• ‘Failure is the key to success; each mistake teaches
us something.’ (Morihei Ueshiba)
• ‘Success is the result of perfection, hard work,
learning from failure, loyalty and persistence.’
(Colin Powell)
• ‘I can accept failure, everyone fails at something.
But I can’t accept not trying.’ (Michael Jordan)
• ‘The starting point of all achievement is desire.’
(Napoleon Hill)
• ‘Success is not final, failure is not fatal: it is the
courage to continue that counts.’ (Winston Churchill)
Quotes from www.brainyquotes.com
PET
]
Writing – Part 2
4. You have been asked to write a book review for the school magazine. You may also
choose to write a review about a movie. Write your review in 140-190 words in an
appropriate style.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
MIND MAP
NETWORK
According to dimension
According to
communication technology
LAN
(Local Area Network)
Wired
enclosed within a small
geographical area
copper cable
optical fiber cable
subtopic
building or group of
buildings
MAN
(Metropolitan Area Network)
enclosed in a metropolitan
area
Wireless
Wi-Fi
cellular data technologies
wild urban area
group of cities
WAN
(Wide Area Network)
spread into a wide
geographical area
public
private
GAN
(Global Area Network)
Internet
GPRS
EDGE
3G
HSDPA
4G
5G
133
MOVIES AND MORE
Hidden Figures – Official Trailer
WARM UP
– BRAINSTORMING
1. Answer the following questions orally.
1. What do you know about NASA?
2. What does the acronym NASA stand for?
3. The word ‘figure’ may have different meanings according
to the context. Use a monolingual dictionary to explain
the meaning of the title Hidden Figures.
4. What can you infer about the themes of the movie?
FCE
Reading and Use of English – Part 3
2. Read the text below and use the word given in capitals at the end of some of the lines
to form a word that fits in the gap in the same line.
Hidden Figures is a 2016 movie about three African-American
1. ………………………: Katherine Johnson, Dorothy Vaughan and
Mary Jackson.
They start working for NASA in the early 1960s 2. ………………………
to the U.S. success in aerospace missions during the Space Race.
The movie 3. ……………………… how racial segregation strongly
affected the scientists’ 4. ……………………… work and how it made
difficult to carry out their tasks.
The movie is based on a non-5. ……………………… book and it
portrays the lives of true characters.
Katherine Johnson was awarded the 6. ……………………… Medal of
Freedom in 2015.
SCIENCE
CONTRIBUTE
SHOW
DAY
FICTION
PRESIDENT
SPEAKING
3. Discuss the following news. What is your opinion about it? Motivate your statements.
NASA will name its headquarters after Mary W. Jackson,
the agency’s first African American engineer.
The NASA headquarters will now bear the name of
Mary Winston Jackson (1921-2005).
CLIL
History
4. Find Information about the Space Race and the countries that took part in it.
Audio
9
THE INTERNET
• How the Internet Developed
• Internet Telephony
• The Internet and Its Core
• E-mails
• The WWW (World Wide Web)
• Search Engines
• Social Networks
WARM-UP
brainstorming
• How old do you think the Internet is?
• How do you think it began?
• What was it originally meant to be?
1
How the Internet Developed
The origins of the Internet date back to the Cold War in the
1960s when the US Army was concerned that a nuclear
attack could destroy vital communications. They began to
design a communications system based on computers that
could withstand damage by nuclear weapons.
ARPANET (Advanced Research Projects Agency Network)
was established in 1969. Dozens of military sites across the
USA were linked in a network, each of which had
computers programmed to relay a message. If one site
were destroyed, the network could re-route messages using
any other site still in operation.
The military realised that the larger the network was, the
stronger it would be in case of attack. They encouraged
other organisations, such as academic institutions and large
companies, to join ARPANET.
A more rapid expansion of the Internet was made possible
in 1974, when a common system of addresses and
communication procedures, called TCP/IP, was created.
This meant the Internet was able to incorporate other
networks which had developed in universities and other
institutions.
52
GLOSSARY
concerned: preoccupato
relay (v.): trasmettere, inoltrare
135
1. How the Internet Developed
During the late 1970s it became obvious that the new
network could be used for all sorts of communication,
especially for university research and business. An
increasing number of sites, including those in
institutions outside the USA, joined the network.
The idea of an Internet, an international network,
soon developed.
Until the early 1990s, the major users of the
Internet were academic and research organisations
and most information consisted only of text. The
introduction of a feature called the World Wide
Web in 1991 to the Internet made it possible to
include graphics, animation, video and sound. With the
arrival of these multimedia tools, large numbers of ordinary
people began to use the Internet.
During the 1990s, the incredible growth in the sales of personal
computers made the Internet accessible to more and more people. Commercial
organisations began to see business opportunities, specialist Internet companies
developed and the Web was increasingly used for advertising and sales.
Although at first the vast majority of Internet users were in the USA, by the year
2000 familiarity with the new medium had spread all around the world. Governments,
companies and ordinary people almost everywhere were using the Internet to
communicate, obtain information, and do business, as well as for entertainment.
GLOSSARY
during the late 1970s: verso la fine degli anni Settanta
until the early 1990s: fino ai primi anni Novanta
growth: crescita
entertainment: divertimento, svago
READING COMPREHENSION
1. After reading the passage, complete the timeline below.
HISTORY OF THE ‘NET’
1960s ………………………
1969
………………………
1974
………………………
………………………………
………………………………
………………………………
………………………………
………………………………
………………………………
………………………………
………………………………
………………………………
………………………………
………………………………
………………………………
Late 1970s
………………………
1991-Nowadays …………
………………………………
………………………………
………………………………
………………………………
………………………………
………………………………
………………………………
………………………………
………………………………
………………………………
………………………………
………………………………
………………
1991
136 9. The Internet
PET
Reading – Part 5
2. For each question, choose the correct answer.
THE MAN WHO INVENTED THE WEB
On 6 August 2016 the world 1. …………… the 25th anniversary of the World Wide
Web (aka www). Bright signs and colourful banners were displayed on our
Facebook wallpapers, our PCs and high-tech devices to remind us that ‘The
Web’ as we all know and use it had been with us for a quarter of a century
– and how helpful, useful and 2. ………… it has proved to be! Fair enough, those
banners and signs were 3. ………… thankful to Sir Tim Berners-Lee, the man
who invented the Web.
Berners-Lee, 4. …………… studied at the Queen’s College of Oxford and
received a first-class Bachelor of Arts degree in physics in 1976, was working
at CERN 5. …………… the mid-80s. He was deeply concerned about the issue
of sharing data and managing information for practical reasons: physicists
6. ………… in different places of the world needed a way to communicate,
exchange data and compare their studies quickly and reliably. This is how the
idea of the World Wide Web 7. …………… to grow in Berners-Lee’s mind.
As he 8. …………… explained, ‘Most of the technology involved in the Web,
like the hypertext, like the Internet, multi-font text objects, had all been
designed already. I just had to put them 9. …………… . It was a step of
generalising, going to a higher level of abstraction, thinking about all the
10. …………… systems out there as being possibly part of a
larger imaginary documentation system.’
Tim Berners-Lee has received many
awards and honours during his career.
One of the most important ones was
when Queen Elizabeth II 11. ……………
him in 2004. Back in 1999, he was
included among the 100 most important
people of the 20th century in a list
compiled 12. …………… the American
magazine Time.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
A. has celebrated
A. entertainment
A. rightly
A. that
A. of
A. works
A. start
A. later
A. united
A. documents
A. knights
A. by
B. celebrated
B. entertaining
B. well
B. –
B. on
B. worked
B. started
B. so
B. together
B. document
B. knighted
B. at
C. celebrates
C. entertain
C. good
C. which
C. in
C. work
C. starting
C. however
C. unite
C. documentary
C. has knighted
C. to
D. celebration
D. entertained
D. right
D. who
D. at
D. working
D. starts
D. before
D. separated
D. documentation
D. knight
D. from
137
2. Internet Telephony
2
Internet Telephony
Internet technology is revolutionising
telephone communications
transmission methods. At the heart
of the revolution is the Internet
Protocol (IP), a language PCs use
to talk to one another, resulting in
a faster and cheaper way to send
information. Data can be transmitted
by breaking it down into digital
packets, each of which can contain
anything – a video frame, a line of
text, or a split second of conversation.
Like letters at the Post Office, each
packet is individually addressed. The
IP tells the network how to read the
packets and where to send them.
Unlike a traditional call, which creates
a circuit between two phones, the IP
allows phone carriers to simply throw
the packets onto a network where
they will be sorted and delivered by
any of the thousands of machines
– routers – as if they were postcards.
GLOSSARY
resulting in: producendo, diventando
break down (v.): scomporre
sorted: organizzato
53
138 9. The Internet
PET
Speaking
1A. Answer the following questions orally.
Have you ever heard of Skype?
Have you ever used it?
Can you tell us how it works?
Can you think of any real life
situations where Skype could
be useful?
Have you ever used
Messenger or WhatsApp?
Do you think they have any
disadvantages? Can you
give any examples?
What do you normally use to
text your friends?
What are their advantages, in
your opinion? Give reasons
for your choice.
Can you tell us what a
WhatsApp group is for and
how to create one?
Do you use abbreviations when
texting? Why?/Why not?
How would you explain what an
emoji is to your grandmother?
Look at these text messages.
Do you understand them?
Why/Why not?
EOD! TGIF
EOBD? LOL
IMU. CAN I CALL U?
L8R, PWOS
CYT
1B. Look at the emojis below and explain in your own words: their meaning; who you
would use them with; what your favourite one is and why; what your least favourite
one is and why.
139
2. Internet Telephony
CROSSWORD
2. Complete the following crossword.
Across
2. A computer network in the form of a circle.
3. A device which modulates digital signals
so that they can travel over phone lines.
4. A system of interconnected lines.
8. To put data onto a computer network so
that other people can see or use it.
9. Software that protects a computer network
from being entered without permission.
Down
1. A linking point between
two LANs which use the
same protocol.
4. A device connected to a
LAN.
5. A net of interlinking
threads made by a spider.
6. A computer that directs
the traffic of data around a
network.
7. The focal point of a
system.
1
2
3
4
7
5
6
8
9
READING COMPREHENSION
3. Read the passage and decide if the following sentences are true (T) or false (F).
T
1. The IP telephony system does not set up a circuit between two telephones.

2. IP telephony splits up a telephone message into a series of separate segments. 
3. Sending data in packets is only done for telephone conversations.

SPEAKING
F



– GROUP WORK
4. Being able to send messages and talk to other people on the Internet is an important
part of modern life. The Internet has opened up lots of new ways for us to
communicate.
Find out about five different ways to communicate using the Internet (e.g. phone calls,
video sharing etc.) and report orally to the class on the following topics.
• Which type of communication is best for each occasion?
• How does each way to communicate work? (e.g. to share a video it’s necessary to
connect to the Web with another computer and upload the file on a common directory)
• At the touch of a button we have the ability to instantly get in touch with almost anyone,
anywhere on the planet: pros and cons.
140 9. The Internet
3
The Internet and Its Core
54
Do you know how the Internet works?
Every time you chat to somebody using the Internet or send an e-mail, can you think how
many different computers you are using while doing this? Two are the computers involved,
yours and the other person’s. Moreover, it is likely there are more computers bridging the
gap. All things considered, it is true that all the computers linked up worldwide are called
the Internet. How do they communicate with one another?
What Is the Internet?
Communicating globally is easier now thanks to a tangled worldwide computer
network we call the Internet. Over the last 25 years the Internet has expanded to
link up hundreds of different nations. Even some of the world’s poorest
developing nations are now connected.
Most people use the word ‘Internet’ to mean going online.
Actually, the ‘Internet’ is nothing more than the basic
computer network. We can think of it as the
network of highways that criss-cross the
world. The Internet is a network just
like highways are. The traffic that
travels down roads runs on ‘top’
of the basic network. Similarly,
the World Wide Web (for
instance, the information pages
we can browse online, instant
messaging chat programs, video
and music downloading, and file
sharing) are all things that run on
top of the basic computer network
we call the Internet.
The Internet is a collection of computers
– both stand-alone and linked up in networks –
mainly interconnected using the telephone network.
The connections between the computers are a mixture
of old-fashioned copper cables, fibre-optic cables (which
send messages in pulses of light), wireless radio connections
(which transmit information by radio waves), and satellite links.
Adapted from explainthatstuff.com
GLOSSARY
tangled: intricato
criss-cross (v.): incrociare
browse (v.): navigare (in Internet)
pulse of light: impulso luminoso
What most of us think of as the Internet – Google,
eBay, Instagram, TripAdvisor – is actually the
World Wide Web. The Internet is the underlying
telecommunication network that makes the Web
possible. If you use broadband or Wi-Fi, your
computer will probably be connected to the
Internet all the time it is on.
141
3. The Internet and Its Core
The Core of the Internet
READING COMPREHENSION
1. The paragraphs of the passage have been jumbled. Read them and reorder them from
A to D. There is an extra paragraph.
(……) Internet bandwidth is an indication of
the speed of the connection, the amount of data
that can be sent per second. Faster connections
have become possible with better physical
infrastructure (such as fibre-optic cables that can
send information close to the speed of light), as
well as better ways to encode the information
even when using an older medium like copper
wires.
(……) This system of transmission is called
packet switching. Each packet is digitally
labelled with its destination address. A
succession of routers sends each packet by the
quickest available path until it reaches its
destination. Once there, the packets are put
back together in the right order to recreate the
original file. As Internet traffic is constantly
flowing, and there are many separate paths
among routers, each packet may have made a
completely different journey. But, since the
splitting up and the reassembling happen in a
split second, the process is not noticeable.
A
(……) The core of the Internet consists of
powerful computers known as routers
connected by high-speed links using optical
fibres and other cables as well as satellites. The
routers are connected, in turn, to thousands of
smaller networks and, through them, millions
of individual computers or other devices. Large
institutions always have direct Internet access
through their own Internet servers. Other users
get access through an Internet Service Provider
(ISP).
(……) Parents and teachers should always pay
great attention to cyberbullying and be able to
detect the early signs and symptoms of a
cyberbullied teenager, e.g. apathy, lack of sleep,
weight loss and isolation. Cyberbullying is not
always easy to perceive as it may take many
different forms – very often subtle ones – such
as gossip, harassment, cyberstalking and
exclusion.
(……) The creators of the Internet discovered
that data could be sent more efficiently when
broken into smaller pieces, sent separately, and
reassembled. These pieces are called packets.
So, for example, when you send an e-mail
across the Internet, your full e-mail message
is broken down into packets, sent to your
recipient, and reassembled. The same thing
happens with photographs, videos, voice
communications and any other form of data.
GLOSSARY
bandwidth: ampiezza di banda, larghezza
di banda
journey: tragitto, percorso, viaggio
pay attention (v.): prestare attenzione
subtle: acuto, sottile (non in modo evidente)
full: pieno, intero, completo
142 9. The Internet
READING COMPREHENSION
2. Read the passage and match the beginning of each sentence with the correct ending.
1.
2.
3.
4.
 The heart of the Internet is
 Routers are interconnected
 Routers are also linked to
 Many institutions have direct
A. are broken down into pieces called
packets.
B. a network of computers called routers.
C. by different routes across the network.
Internet access
5.
D. by very fast cable and microwave links.
 Most ordinary users obtain
Internet access
6.
7.
 Data files sent over the Internet
 The packet-switching system
sends individual packets
8.
F. improvements in infrastructure and
encoding.
 When they arrive at their
G. smaller networks made up of individual
computers.
 The quantity of data sent per
H. the packets are reassembled in the
correct order.
destination
9.
E. depends on the bandwidth of the
connection.
second
10.  Faster transmission is possible
because of
I. through an Internet Service Provider.
J. through Internet servers.
SPEAKING
3. Using your own words, explain how packet switching works.
55
LISTENING
4. Listen to and repeat the following words, underline the syllables which are stressed
and think of their Italian equivalent.
1.
2.
3.
4.
Electricity
Conductivity
Similarity
Radioactivity
SPEAKING
5.
6.
7.
8.
Transmitter
Conductor
Inventor
Resistor
9. Communication
10. Organisation
11. Information
12. Transmission
– CLASS DEBATE
5. Divide the class into three groups and debate the following quotations by Tim
Berners-Lee. Each group has to choose one. Remember to give reasons for your
statements. Let your voice be heard!
[
• ‘There was a time when people felt the Internet was another world, but now
people realise it’s a tool that we use in this world.’
• ‘Imagine that everything you are typing is being read by the person you are
applying to for your first job. Imagine that it’s all going to be seen by your
parents and your grandparents and your grandchildren as well.’
• ‘Celebrity damages private life.’
• ‘The Google algorithm was a significant development. I’ve had thank-you
e-mails from people whose lives have been saved by information on a medical
website or who have found the love of their life on a dating website.’
• ‘Innovation is serendipity, so you don’t know what people will make.’
(Serendipity: the faculty of making fortunate discoveries by accident)
Quotes from www.brainyquote.com
]
143
3. The Internet and Its Core
What Does the Internet Do?
56
The aim of the Internet is very simple: it moves
computerised information (data) from one
place to another. The machines that make up
the Internet treat all the information they handle
in exactly the same way. So, the Internet works
a bit like the postal service. The job of the mail
service is to move letters from one place to
another, no matter why people are writing
letters, no matter who they are from or what
messages they contain. The same applies to the
Internet.
The Internet helps people to do many different
jobs thanks to its simplicity in handling many
different kinds of information. It’s not
specialised to handle e-mails, web pages, chat
messages, or anything else: all information is
handled equally and passed on in exactly the
same way. Moreover, because of its simplicity,
people can easily use Internet to run new
‘applications’ – new things that run on top of
the basic computer network. That’s why, when
two European inventors developed Skype, a
way of making telephone calls over the Net,
they just had to write a program that could turn
speech into Internet data and back again.
No-one had to rebuild the entire Internet to
make Skype possible.
GLOSSARY
aim: scopo
move (v.): trasferire, spostare
speech: discorso, produzione orale
Households with Internet access – 2015
100
90
82.1 81.3
This chart compares the estimated percentage
of households with Internet access for different
world regions and economic groupings.
Although there have been dramatic
improvements in all regions, there are still
great disparities between the ‘richer’ nations
and the ‘poorer’ ones. The world average,
shown by the black-outlined orange center
bar, is still only 46.4% (less than half). Not
surprisingly, richer nations are to the left
of the average and poorer ones to the right.
80
70
60.1 60
60
46.4
50
40.3 39
34.1
40
30
20
10.7
10
0
S
CI
6.7
)
s
pe ped ion icas orld ates cific ing frica
p A
DC st
ro
r
t
n
o
a
l
o
L
u
W
e
l
S
P
E
ea d
t U Am
ve
b
ve
ia
(L pe )
ra
De ovie
De
As
A
lo s
S
ve ntrie
e
er
D ou
rm
C
(fo
CHECK YOUR KNOWLEDGE
6. These are some ways you might communicate using technology in just one day.
One of these ways does NOT involve using the Internet. Can you work out which one?
HIGH-TECH WAYS TO COMMUNICATE
 A. Video call
 C. Texting
During breakfast, you receive a video
call from your granny in Australia.
You send a text message to your mum
telling her you are going to your
friend’s house after school.
 B. Blogging
At school you publish some poems
that you have written on the class
blog.
 D. E-mail
You finish your homework and send
an e-mail to your teacher.
144 9. The Internet
g the
Ways to Communicate Usin
Inter net
57
BLOG
This is a website which
works like an online
diary where you can
publish your thoughts
and interests.
Other people can go and
read your posts and take
a look at your pictures and
videos.
This is a good form of
communication if you want
to share your ideas with a
wide audience. It allows you
to connect with anyone else
who has access to the Web.
• Have you ever read a blog?
• What kind of blogs are you
interested in? Why?
• Would you like to write a
blog? What would it be
about?
E-MAIL
NEWSLETTER
This is a cross
between an e-mail
and a newspaper. It
is e-mailed to everyone
on a list rather than
to an individual. Like
e-mails, newsletters
travel almost instantly.
• Have you ever
subscribed to a
newsletter?
• Would your parents be
interested in receiving
a newsletter? What
kind of topics would
they be interested in
reading?
• List some possible
e-mail newsletter
topics.
145
3. The Internet and Its Core
INSTANT MESSAGING
This is a way to send text-based
messages to other people
connected to the Internet.
They will be able to reply in
real time.
This is a good form of communication
if you want to speak quickly to your
friends or family.
• How many text messages do you
send on average every day?
• Who do you usually text?
• Would you have a problem with
texting a teacher? Why/Why not?
VIDEO CALLING
This is a phone call where you use
the Internet to transmit the signal.
It lets you talk to someone in real
time. You can use a webcam to
send a live video of yourself.
This is a good form of communication if
you need to see someone’s face and it’s a
fun way of speaking with friends and family.
• Have you ever made a video call?
• List three situations where a video call is
preferable to a standard phone call.
• In your opinion, what are the pros and
cons of video calling?
E-MAILS
This is a digital version of
sending letters. You can send
text-based messages to anyone
with an e-mail account.
They travel almost instantly. You can also
attach other files to the e-mail such as
documents and images.
This is a good form of communication if
you want to send some project work or
homework to your friends or teacher.
• How many e-mails do you send and
receive in an average month?
• Do you think that e-mails can be useful in
the work environment? Why/Why not?
• What can you attach to an e-mail?
GLOSSARY
take a look at (v.): dare un’occhiata
rather than: piuttosto che
text-based messages: messaggi
di testo
let (v.): lasciare, permettere
attach (v.): allegare
4
E-Mails
FCE
‘How to write a good e-mail:
1. Write your e-mail.
2. Delete most of it.
3. Send.’
(Dan Munz)
Reading and Use of English – Part 3
1. Read the text below and use the word given in capitals at the end of some of the lines to
form a word that fits the gap in the same line. There is an example at the beginning (0).
Advantages
As 0. previously stated (see above), sending an e-mail is basically
the same operation as 1. …………………… a paper letter: the sender
transmits a message to the receiver. Similarly, whenever we
2. …………………… our mailbox, we can find letters or notes sent
to us by other people.
Needless to say, time is one of the main advantages of e-mails over a
3. …………………… mail service: a letter may take days or even
weeks to reach its destination, whereas an e-mail will take just a few
minutes – or seconds, depending on how powerful your Internet
4. …………………… is.
Moreover, unlike a traditional mail service, it is possible to send a
single e-mail to different 5. …………………… – no matter where they
are and at what distance they are from the 6. …………………… –
very cheaply, as e-mails do not need stamps to be delivered!
Besides, the possibility of using 7. …………………… such as text
files, images and photographs in e-mails has made it possible to
substitute the traditional fax-sending way of 8. ……………………
information. Not only does the advantage lie on 9. ……………………
terms – dialling costs may be high for long-distance calls –, but also on
the high quality of the attachments forwarded by e-mails.
PREVIOUS
DISPATCH
CHECK
TRADITION
CONNECT
RECEIVE
SEND
ATTACH
FORWARD
ECONOMY
E-Mail Address and Mailbox
As in a traditional mail service, in order to exchange e-mails we need an
address to write to and one to receive. An inbox – that is, an electronic
10. …………………… for incoming e-mails – is associated with the e-mail
address. The inbox stores the messages we receive. It also keeps track of the
messages we have already sent. 11. …………………… e-mails are normally
in bold font: in this way they are easily 12. …………………… .
We can get an e-mail address and inbox from our Internet Service
13. …………………… (ISP) that provides our Internet connection and the
service annexed to it. Further free e-mail addresses can be obtained through
web services such as Gmail, Hotmail, Yahoo and others with a user-friendly
online 14. …………………… . An e-mail address is made up of two text
elements divided by the symbol @ (at). After @ there is the domain, that is, an
address identifying the ISP. Before @ there is the name or ‘nick’ we have
chosen to identify ourselves. This 15. …………………… has to be unique
and unlike the domain cannot be shared.
In other words, given the address mariorossi@ispmailserver.com,
‘ispmailserver.com’ is the domain, while ‘mariorossi’ is the identifier. It is not
possible to configure a 16. …………………… ‘mariorossi’ identifier on the
same domain, even though we can create a new inbox using the address
mariorossi@anotherispmailserver.com.
FOLD
READ
RECOGNISE
PROVIDE
APPLY
IDENTIFY
FAR
What Do You Need to Use an E-Mail Service?
In addition to an Internet connection and a mailbox with its address, to use
an e-mail service we need a program, 17. …………………… e-mail
client, such as Outlook or Mozilla Thunderbird. These programs need to be
set up to manage each mailbox by shifting new messages on the mail server
of our personal 18. ……………………, thus making room for new messages
to arrive.
What is more, e-mail clients provide 19. …………………… for storing the
messages that have been received as well as for the setting and sending
options of new ones. Finally, they can be set to efficiently organise and
manage our e-mail address book.
NAME
COMPUTE
FEATURE
148 9. The Internet
5
The WWW (World Wide Web)
Back in the 1970s, writing a school assignment was
often a taxing experience for the average student. If they
had no encyclopedia at home, they had to go to a public
library, open up a heavy reference book and find
information on almost any subject. Things are much easier
now: all we have to do is sit down at any computer,
or browse a smartphone, even while walking down the
road, almost anywhere on the planet, and access an online
information library far more powerful than any public
library on Earth: the World Wide Web.
Twenty-first century life is so dependent on the Web that it
seems awkward to think we ever lived without it. Yet, the
WWW has been in our daily life for just twenty-five years!
PET
Listening – Part 3
58
GLOSSARY
assignment: compito
(scolastico), incarico
taxing: gravoso
reference book: enciclopedia,
manuale
awkward: difficile, bizzarro
59
1. For each question, write the correct answer in the gap. Write one or two words or a
number or a date or a time.
You will hear a speaker talking about the history of the World Wide Web.
In 1. ………………… researchers for DARPA sent the first data from Los
Angeles to Stanford.
The technology of ARPANET later developed into the Internet.
By 1971 there were 2. ………………… different nodes across the USA
connected to the ARPANET.
3. ………………… were introduced in 1972.
The first international connections were established in 1973 in England
and 4. ………………… .
The number of networks increased significantly in the 5. …………………. .
The WWW was invented by Tim Berners-Lee in 1989 at the 6. …………………
laboratories in Switzerland.
The Internet went public in 7. ………………… and the first search engines came
into being into 1993.
By 2012 there were about 1 8. ………………… users on Facebook.
149
5. The WWW (World Wide Web)
What’s the Difference Between the Web and the Net?
60
The Internet is a worldwide network of
computers, linked mostly by telephone
lines; the Web is just one of many things
(called applications) that can run on the
Internet. When you send an e-mail, you’re
using the Internet: the Net sends the
words you write over telephone lines to
your friends. When you chat to someone
online, you’re most likely using the
Internet too – because it’s the Net that
swaps your messages back and forth.
But when you update a blog or Google
for information to help you write a report,
you’re using the Web over the Net.
The Web is the worldwide collection of
text pages, digital photographs, music files, videos, and
animation you can access over the Internet. What makes the
Web so special (and, indeed, gives it its name) is the way all
this information is connected together. The basic building
blocks of the Web are pages of text, web pages as we call
them. A collection of web pages on the same computer is
called a website. Every web page has highlighted
phrases called links (or hypertext links) all over it.
Clicking one of these takes you to another page on the same
website or another website entirely. So far, so simple.
From explainthatstuff.com
SPEAKING
Imagine this little computer network
scaled up several hundred million
times… and you’ll have a picture of
the Internet.
GLOSSARY
swap (v.): scambiare
back and forth: avanti e indietro
highlighted: evidenziato
- CLASS DEBATE
2. Internet and the World Wide Web have inspired a great deal of opinions, each
reflecting a different attitude towards them. Read the following quotes and divide the
class into three groups. Each group has to choose one of the quotations, give
reasons and provide examples for the choice. Then each group has to comment on
the assumption; the other two groups should ask questions as well. The teacher will
eventually choose the best debate.
[
• ‘The Internet could be a very positive step towards education, organisation
and participation in a meaningful society.’ (Noam Chomsky)
• ‘There’s a danger in the Internet and social media. The notion that
information is enough, that more and more information is enough, that you
don’t have to think, that you just have to get more information – gets very
dangerous.’ (Edward de Bono)
• ‘The Internet is becoming the town square for the global village for tomorrow.’
(Bill Gates)
• ‘We are now connected by the Internet, like neurons in a giant brain.’
(Stephen Hawking)
• ‘Turn off your e-mail; turn off your phone; disconnect from the Internet; figure
out a way to set limits so you can concentrate when you need to, and
disengage when you need to. Technology is a good servant but a bad master.’
(Gretchen Rubin)
]
150 9. The Internet
6
Search Engines
61
A. Search engines such as
Google, Bing, Yahoo and others
have become tools net surfers
simply cannot live without. Back
in the mid- and late 1980s there
were no search tips at all,
which meant that you needed to
know the whole web address (e.g.
http://www.somewebsite.com)
and type it in the address bar
with no spelling mistakes.
Needless to say, this access
mode was not intuitive, nor did it
guarantee finding the right
information at the web address.
Nowadays, we can access the
information we are looking for by
simply typing some letters or key
words on a page.
B. The search engine replies to our query showing lists of links (SERP – standing for
‘Search Engine Result Pages’) related to the key words we have chosen. From a physical
point of view, search engines are websites able to execute highly sophisticated algorithms
(that is, programs).
Therefore, in their digital archives they can rapidly search the web pages matching the
criteria we have chosen. Search results are shown as lists of links in order to allow a userfriendly reference.
C. The fame and popularity of a search engine over its competitors lies in the width
of its digital archive and the speed of its search algorithm. Accuracy is essential as well,
meaning that the results must be consistent with the query. The growing success of
Google, for instance, is due to these reasons. Specifically, this search engine is able to
adapt search results to the popularity and quality of the pages within its archive. In a
nutshell, if a website is valued by users, Google is likely to hold it in regard as well!
On the other hand, the growing success of this search engine has even affected the English
language: a new verb – ‘to google’ – has sprung up due to its extensive use in everyday
language. In addition
to this, the term ‘doodle’
(Literally in Italian
‘scarabocchio’) has
extended its meaning
thanks to the creativity
of Google staff.
Well-known doodles
have been designed for
the Olympic Games, to
celebrate anniversaries
and famous people, as
in the Google Doodle
tribute to Freddie
Mercury.
151
6. Search Engines
D. Web contents are continuously evolving, so data needs to be constantly
updated in order to keep the reliability and quality of search engines as high
as possible. In the earliest steps of their development, webmasters provided
search engines with information and key words to direct users to their site.
This procedure has gradually been left behind as it often caused spam. In
addition, some webmasters could display incorrect behaviour, giving key words
that were not consistent and coherent with the website contents.
In order to prevent possible mischief, all search engines use
special programs called Spiders or Crawlers. They can
detect the Web autonomously, analyse web pages and
sort the most useful contents to update their own
archive. It is therefore essential for web developers
to master the most useful web page management
techniques (optimisation) so that spiders may
acquire information and key words that will be
shown in the query.
E. So far, we have focused on search engines
from the users’ point of view – that is, as necessary
tools for information and data search. What
happens when this information is linked to product
placement and merchandising? Let us suppose, for
instance, we want to buy an accounting software online.
Hence, we type the words ‘accounting software’ to look for
the websites of suitable sellers. This type of search generates
thousands of results lined up in hundreds of web pages which obviously the
user will be unable to read one by one.
Let us now suppose we own a company selling accounting software: which
position would we like our site to be among search engine results? The answer
is obvious: as visible as possible, and in no way beyond the limit of the first
three pages of the search engine results with the highest possible number of
key words and/or statemtents.
Such a plea from companies on the web market has led to the development
of techniques focused on setting websites at the top of the search result list.
These techniques analyse data in order to monitor customers’ behaviour to
take action on site contents whenever they are ignored or not frequently
searched. All these techniques and strategies belong to the Web Marketing
field, that is, the branch of company marketing activities that use the Web to
analyse the market and develop commercial partnerships.
GLOSSARY
search tip: suggerimento di ricerca
needless to say: inutile a dirsi, com’è facile intuire
width: ampiezza, estensione
in a nutshell: in breve
reliability: affidabilità
mischief: uso improprio, danno, atto criminale
o vandalico
accounting: contabilità
hence: dunque, perciò
such a plea: una tale richiesta, una simile richiesta
READING COMPREHENSION
1. Match the headings (1-7) to the paragraphs (A-E). There are two extra headings.
1.
2.
3.
4.
Hazards in search engine results ……
Web Marketing ……
Commercials ……
Competitive features ……
5. How search engines work ……
6. Updating search engines ……
7. The success of search engines ……
152 9. The Internet
FCE
Writing – Part 2
AGONY AUNTS 2.0
2. Have you ever dreamt of being an agony aunt for a day? Here’s your chance! You will
be Aunt Sally for a little while. Choose one of the e-mails below and write a reply in
140-190 words in an appropriate style to give advice in order to help solve the problem.
1. Untidy roommate
I’m a 19-year-old student and I live in a
house-share with three other girls. One of
the roommates is particularly bad to live
with. She’s 24 and always wakes us up
when she comes home late at night. She
slams doors, throws her clothes all over
the floor, even on the breakfast table,
and she’s got disgusting habits like never
flushing the toilet. She even takes food
from my cupboard and leaves the
kitchen dirty. I’m exhausted and my
studies are suffering. What should I do?
ruth@tidiness.dot.com
3. FB love pains
I’m 15 and I’ve got a crush on a girl
who is a friend of mine on
Facebook, but I’m very shy. I’d like
to get to know her better, but I’m not
sure about what to say or how to
say it. I met this girl during a school
trip – we aren’t in the same class,
though – but we’ve never actually
spoken. I’ve never had a girlfriend.
All I do is ‘like’ all the pics and
posts on her wall but my friend says
I shouldn’t, because if I do I’ll be
friend-zoned. What should I do?
jim@lovelove.dot.com
To:
From:
subject:
2. Worried mother
I’m the mother of a 17-year-old boy and I’m
really worried about him. He spends his
days locked in his room, chatting and
playing videogames. His friends seem to
have deserted him. He leaves home every
morning to go to school but after lunch he
goes to his bedroom until dinner time. I’m a
housewife, so I spend a lot of time at home
cleaning and watching TV. I’ve tried to talk
to him but he says he’s fine and that I must
stop worrying. But you know, I just can’t.
I regularly check his room but there’s
nothing unusual in it, only passwords on
his PC and smartphone. What should I do?
claire@mumseye.dot.com
4. Chatting or cheating?
My wife and I have been married for 5 years and
have no kids. On her last birthday, I gave her a
tablet as a present, but now I see that was a
terrible idea. She seems to be always
connected to it, she’s holding it all the time, we
don’t talk any more after dinner as we used to.
What’s more, I think she’s dating someone, as
she goes to bed very late at night and seems to
be chatting all the time. She says it’s a cooking
chat, but I actually think she’s cheating on me
– I’m going out of my mind and getting terribly
jealous! What should I do?
ron@sorrow.dot.com
Aunt sally 2.0
A wise piece of advice for ……………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
153
7. Social Networks
62
LISTENING
3. Listen to the recording and fill in the blanks.
HOW E-MAIL WORKS
When did you last send an e-mail? 1. …………………… of e-mails are sent every minute
of the 2. …………………… . But what happens when you 3. …………………… on
‘Send’? Believe it or not, your e-mail makes a 4. …………………… amazing journey.
First, the e-mail 5. …………………… you are using communicates with an
6. …………………… mail server. This is a special computer that manages e-mail.
Then the outgoing server looks up the address of the 7. …………………… mail server
and sends the 8. …………………… there over the Internet. The address of the inbound
server is the bit after 9. ………………… in an e-mail address.
At the inbound server the mail is sent into the person’s 10. …………………… .
The inbound mail server checks the bit 11. …………………… @ to see whose mailbox to
send it to. When that person next 12. …………………… to the server their e-mail will be
forwarded to them.
7
Social Networks
CHECK YOUR KNOWLEDGE
1. Match the definitions to the suitable social networking site.
1.  Snapchat
2.  Instagram
3.  Linkedin
4.  Facebook
5.  Twitter
A. This is a business social network where users can upload
and upgrade their CV, read and share articles regarding their
field of study or interests, confirm other users’ skills and
widen their net for professional purposes. According to a
recent survey, it has reached about 9 million users within Italy.
B. This is not a proper social network, even if it allows
interaction. You can upload pictures and videos on it as
well as links or text messages. They disappear within 10
seconds after having been read by the receiver. If unread,
they will be automatically deleted after 24 hours. This app
is widely used among teenagers.
C. This is an online news and social networking site. Users
can write, read and share messages no more than 140
characters long. Its logo is a small blue bird and the name
of the short text messages is a reference to the sound birds
make.
D. This well-known social networking site allows mobile photo
and video sharing either publicly or privately. Pictures and
videos can be shown on the app or shared through other
networking platforms. Users can ‘like’ a photo by tapping
twice on it.
E. Perhaps the most famous social network worldwide with
nearly 1.65 billion users. It allows users to post and share
texts, videos, photographs as well as chat in a private area,
express likes and dislikes and even play online games.
MIND MAP
WORLD WIDE
WEB
made of
Hypertext
and other media
organized
in
contained
in
A collection
of websites
connected
with
made of
Web pages
written in
HTML
accessed
using
Web browser
connected
with
each resource
is identified by
Hypertext links
URL (Uniform
Resource
Locator)
connected
with
provided to
155
MOVIES AND MORE
Nineteen Eighty-Four – Official Trailer
See Unit 10 to know more about 1984.
WARM UP
– PAIRWORK
1. Watch the trailer and discuss the following
questions with a classmate.
1. What does Nineteen Eighty-Four refer to?
2. Focus on the colours and shades you can see in the
trailer. Are they bright colours? Why? What is the idea
these colours convey?
3. What can you infer about the kind of life the characters
live every day? Can you make any examples?
SPEAKING
2. Read the following statements and explain in your words the meaning of the
underlined sentence.
The speaker says: ‘In 1949 George Orwell had a vision of the future.
Today, that vision is still a best-selling novel, and its prophecy remains
as terrifying as ever.’
(O’Brian speaking to Winston Smith)
‘If you want a picture of the future, Winston, imagine a boot stamping
on a human face – forever. A future where freedom becomes slavery,
where privacy is forbidden, the past forgotten and where living people
simply “vanish”. Yet one man and one woman dare to love.’
CLIL
History
3. Answer the following questions.
1. What is the connection between 1949 and Nineteen Eighty-Four?
2. What was going on in 1949?
3. Which similarities can you find between the scenes in the trailer and the historical period
you have studied in History?
Audio
SYSTEM
ADMINISTRATION
AND SECURITY
• Computers and Network Accounts
• Encryption and Cryptography
10
• Viruses and Antiviruses
• Firewalls
WARM-UP
brainstorming
• Do you know the difference between safety and security?
Browse the Net to find the meaning of these two similar
yet not identical words.
– Safety: ……………………………………………………………
– Security: …………………………………………………………
1
Computers and Network Accounts
READING COMPREHENSION
1. Read the first part of the article and complete the paragraph with the words in the box.
There are two extra words.
prevent  file  authorised  access  provide  login  both 
password  network  start-up  peripheral  storing
Using a computer in a 1. ……………………… environment requires the adoption
of solutions to 2. ………………………… unauthorised 3. ………………………
to shared resources (databases, files, folders, peripherals…).
Also, the use of stand-alone computers 4. ……………………… confidential data
must be restricted only to 5. ……………………… users.
The method to protect 6. ……………………… the network and a single
workstation is to 7. ……………………… each user with a username and
8. ………………………, that are entered in a specific form called a
9. ……………………… form during the system 10. ……………………… .
157
1. Computers and Network Accounts
FCE
Reading and Use of English – Part 3
2. Now read the second part of the article and use the word given in capitals at the end
of some of the lines to form a word that fits the gap in the same line.
Passwords are 1. ……………………… and secret information. On
their first access, users have to change the password provided by
the network 2. ……………………… or need to choose a password
when configuring a stand-alone PC.
A username and password are the credentials to identify
3. ……………………… .
Assigning different access levels to users is a way to enhance
4. ………………………: for example, a group of users is authorised
only to read files in a 5. ……………………… while other users may
be allowed to create, modify and delete files in the same folder.
The account data and the set of privileges assigned to each user
is known as a profile. A PC with 6. ……………………… user
profiles will show a different desktop, document folders and e-mail
7. ……………………… according to the preferences configured by
each user.
PET
PERSON
ADMINISTRATE
USE
SAFE
FOLD
DIFFER
ACCOUNT
Reading – Part 5
3. Now read the third and last part of the article. For each question, choose the correct
answer.
Access 1. ……… is based on two pieces of data (username and password) identifying
the user account, to 2. ……… in the login form during the system start-up. Most security
against unwanted access to your computer relies on the password, which 3. ……… be chosen
according to specific criteria and 4. ……… secret. Actually, there are many applications that
can be used 5. ……… attackers to break the password protecting a system. The easier
the password, the 6. ……… it is. To create a strong password it is important to keep in mind
that its length has to be more than seven 7. ………, made up of 8. ……… and lowercase
letters, as well as numbers and special characters. It is also important to 9. ……… the use
of predictable passwords like birthdays, family names etc.
Remember that even the strongest passwords can be improved. Moreover, it is important that
users change their passwords 10. ……… to avoid data theft or malware.
In Italy, the Privacy Law requires a password change 11. ……… three or six months depending
on the type of data to protect. If the data contains information concerning 12. ………, or
equally sensitive data, passwords must be changed at least every three months.
1. A. protects
2. A. type
3. A. doesn’t have to
4. A. done
5. A. by
6. A. stronger
7. A. fonts
8. A. consonants
9. A. prevent
10. A. orderly
11. A. each
12. A. health
B. protecting
B. join
B. must
B. held
B. from
B. weakest
B. symbols
B. numbers
B. avoid
B. always
B. everyday
B. sickness
C. protect
C. text
C. would
C. kept
C. for
C. strongest
C. characters
C. symbol
C. cancel
C. regularly
C. each other
C. healthy
D. protection
D. send
D. should
D. made
D. on
D. weaker
D. vowels
D. uppercase
D. promote
D. never
D. every
D. ill
158 10. System Administration and Security
CHECK YOUR ABILITY
4. Have a look at the amazing Google doodle to celebrate Alan Turing’s 100th birthday on
23 June 2012 (https://www.google.com/doodles/alan-turings-100th-birthday). Can you
break the encryption code?
If you didn’t manage to break the code in spite of your hard work, here’s something
which could help you work out the riddle…
Do you want to know how to solve Alan Turing’s Google doodle?
Look at the Video!
2
Encryption and Cryptography
Encryption involves taking a piece of data
(cleartext) and translating it into a coded
version of itself (ciphertext). It may be used to
make stored data safer. Nobody can make
sense of the data in its encrypted form: it will
just appear as a collection of unintelligible
characters.
In order to make sense of it, the user must
decrypt the ciphertext using a copy of the
encryption key, i.e. a piece of software that
translates cleartext into ciphertext and back
again. If an unauthorised person manages to
gain access to the data, it will be useless
without access to the key.
Cryptography (from the Greek kryptos =
hidden and graphia = writing) is the coding of
information used to foreclose the attempt of
unauthorised access. Encryption has been used
since the 5th century BC in the exchange of
messages related to particularly delicate issues,
usually the day before or during military conflicts.
At the beginning of 750 AD cryptanalysis
– the study of systems capable of revealing the
contents of a secret message without knowing
in advance the procedure used to code
(encrypt) it – was developed. Since 750 AD
the history of secret information has developed
through trials, successes and failures of
cryptographers attempting to create inviolable
messages, and cryptanalysts finding the weak
points in the encryption of those messages.
Historical ciphers help us understand how
encryption has evolved over time and how some
common basic principles were defined. At the
same time, the advent of computers means that
they now have no practical significance for us.
63
The use of computers in cryptography dates
back to World War II, thanks largely to the
work of Alan Turing who, at the age of just
28, directed a group of researchers involved
in the decryption of German army machines,
including Enigma. The big deciphering
computers, the ‘bombs’, which were designed
and created by the Polish cryptologist
M.A. Rejewski, were later perfected by Turing
who tuned them to be particularly fast.
The computer brought about by his studies was
called Colossus, and could try, in parallel, all
possible combinations used to encrypt
messages. Nine other Colossus machines were
built after the first one.
In the last year of the war, German telephone
lines were systematically bombed and
damaged, forcing the Germans to make
increased use of radio communications.
Almost all messages were encrypted and their
decryption resulted in a great advantage on the
Allies’ part. At the end of the war as many as
63 million German encrypted characters had
been decrypted by the Colossus machine. The
ten computers were later destroyed, and only
in 1996 one of them was rebuilt and exhibited
in the Bletchley Park Museum.
These days the widespread use of
computers has introduced new encryption
requirements, not for military purposes, but to
protect users’ privacy. Every day most of us
unknowingly use daily encryption to buy
something using a debit card, watch pay TV,
simply enter the access password on a
computer, and many other apparently very
ordinary procedures.
GLOSSARY
unintelligible: indecifrabile, incomprensibile
foreclose (v.): impedire, precludere
trial: prova
7
researcher: ricercatore
widespread: diffuso
debit card: bancomat
159
2. Encryption and Cryptography
READING COMPREHENSION
1. Read the passage and match the beginning of each sentence with the correct ending.
1.

Data written in encrypted
form
A. proved to be particularly challenging
during World War II.
2.
Only authorised users
Encrypted data
B. such as entering one’s password on a
PC, making payments with debit or
credit cards and so on.
4.



The use of encryption to
keep information secret
C. looks like random, meaningless
symbols.
5.

Decrypting secret messages
from the German army
D. are able to decrypt the ciphertext using
a copy of the encryption key.
6.

These days, encryption lies
beneath many ordinary
routines
E. has been a well-known technique since
ancient times.
3.
LISTENING COMPREHENSION
F. is unintelligible unless the code is known.
64
2A. Listen to the speaker and fill in the blanks.
The speaker recalls the episode of the San
Bernardino 1. ………………………
and introduces an interview with Apple
2. ……………………… Tim Cook about the FBI
request for help in 3. ……………………… the
phone used by the San Bernardino shooter.
The 4. ………………… also mentions that
Donald Trump’s opinion on the issue is in favour
of a 5. ……………………… of Apple products.
PET
Listening – Part 3
65
2B. For each question, write the correct answer in the gap. Write one or two words or a
number or a date or a time.
You will hear the interview with Tim Cook about the San Bernardino case.
Some families of the victims in San Bernardino were in favour of the judges’
decision that Apple helped FBI to 1. ………………… the shooter’s iPhone.
One family reportedly said to be ‘angry and 2. …………………’ at Apple’s
decision.
Cook is deeply sympathetic towards these families and he claims that his
company cooperated with 3. ………………… investigators as much as it could.
The main concern is about creating a software which could be misused by
hackers and terrorists: he compares this software to a 4. ………………… .
The Apple CEO points out that an unlocking software would make hundreds of
5. ………………… of devices vulnerable.
As to Trump’s call for a boycott, Cook’s opinion is that America can get stronger
if people all come 6. ………………… in spite of different points of view.
160 10. System Administration and Security
3
Viruses and Antiviruses
A virus is a piece of software – belonging to
the category of malware – which is able, once
executed, to infect files so as to make them
replicate, that is, create copies of the virus itself,
usually without being discovered by the user.
Viruses may or may not be directly harmful to
the operating system that hosts them, but even
in the luckiest case, their existence involves a
significant waste of resources in terms of RAM,
CPU and hard disk space.
In common usage the term virus is often used
interchangeably with malware, thus including
categories of different ‘weeds’ such as worms,
trojans or dialers. A virus is made up of a set of
instructions, like any other computer program,
and usually consists of a very small number of
instructions (from a few bytes to a few kilobytes).
Moreover, it is specified to run only a few simple
operations and optimised to employ few
resources to be as invisible as possible.
The term ‘virus’ in a computing context was
first used by Fred Cohen (1984) in his paper
Experiments with Computer Viruses.
In the mid-1970s, David Gerrold wrote a
science fiction novel, When HARLIE Was
One, where the reader can go through the
description of a computer program called
‘VIRUS’ that does exactly the same things as a
virus. Later on in 1975 John Brunner wrote
the novel The Shockwave Rider, which
describes programs called ‘tapeworms’ which
infiltrate the network in order to erase all data.
The comic Uncanny X-Men n. 158, published
in 1982, also used the term ‘computer virus’.
66
The expression ‘computer virus’ was also used
in the film Westworld back in 1973, so we can
say that Cohen coined the word ‘virus’ only in
the academic field, since it was already present
in the spoken language.
A program called ‘Elk Cloner’ is credited as the
first computer virus which appeared in the
world. It was created in 1982 by Rich Skrenta
in Apple DOS 3.3 and the infection spread by
floppy disk exchange.
Nowadays, the ways for a possible viral infection
have greatly multiplied, especially through
attachments in e-mail messages. This is why
it is essential to install an antivirus software on
our PC. An antivirus is a software designed
to identify – even though in a probabilistic
way – new types of viruses scanning the files
stored on the hard disk.
The first fundamental requirement of a
modern antivirus is the presence of a
heuristic scanning engine to search for the
presence of particular sequences of bytes that
can be a typical symptom of malicious code
within files. After the detection of a virus,
an antivirus can try to remove it or, if
unsuccessful, block the infected files in a
status called quarantine to prevent the action
of the virus itself.
Since increasingly sophisticated viruses are
created and spread every day in the world,
antiviruses must be frequently updated by
applying patches and a new virus definition
provided by the software manufacturer to
ensure protection against those new viruses.
GLOSSARY
harmful: dannoso
interchangeably: in modo
intercambiabile
PET
optimised: ottimizzato
novel: romanzo
even though: anche se
heuristic: euristico
ensure (v.): assicurare,
garantire
Speaking
1. Answer the following questions orally.
1. What is a computer virus?
2. How can you detect a virus on your device?
3. Can you think of possible ways for a virus
or malware to infect our PCs, tablets and
smartphones?
4. What is the purpose of antivirus software?
5. Can you list some of the best-known
antivirus programs?
6. What does the word ‘worm’ mean? Look it
up in your dictionary!
7. Do you know the meaning of the words
‘phishing’ and ‘spam’? How would you
explain them to your grandmother?
8. Do you know why some of the most
mischievous PC viruses are called
‘trojans’?
161
3. Viruses and Antiviruses
READING COMPREHENSION
2. After reading the passage, choose the correct option.
1. The main feature of a virus is
 A. to replicate software to spread malware.
 B. its ability to replicate itself thus infecting the
operating system.
 C. to make copies of itself in order to destroy
malware.
 D. its ability to protect the operating system from
malware attacks.
2. A virus, or malware
 A. is always disruptive for the operating system,
as it destroys it completely.
 B. can be harmful only in case of reduced hard
disk space.
 C. tends to spread without being detected by the user.
 D. can be termed dangerous only in the case it is
a ‘weed’ type.
3. According to the text, the word ‘virus’
 A. only applies to the medical field.
 B. has been used in literature only since the
1970s.
 C. is a synonym of ‘tapeworm’ in medical literature.
 D. was used in comics in the early 1980s.
4. Malware can infect the operating
system and spread
 A. in different ways, including
attachments and e-mails.
 B. in a limited range of ways,
which is why it is not
important to install antivirus
software.
 C. only through e-mails and
attachments.
 D. whenever we turn the
operating system on.
5. In order to ensure maximum
protection,
 A. malware should be
constantly upgraded.
 B. protection software needs
to be frequently upgraded.
 C. upgrading antivirus
software is not necessary.
 D. it is important not to use an
e-mail service.
WARM-UP
brainstorming
• What does the word ransom mean?
 A. A legal act used when buying or selling a house.
 B. Feeling dizzy and upset as a consequence of long computer sessions.
 C. The money demanded for releasing a kidnapped person or property.
 D. An acting technique similar to the well-known Stanislavski method.
Ransomware
Not only is cryptography used for protecting
data, it is also commonly employed by viruses
called ‘ransomware’. These viruses are activated
via e-mail attachments: when the user clicks on
the attachment, the ransomware executes a
programme that cyphers all the files – including
text and images – on the hard disk and on all
memory output storage devices connected to it.
Once all files have been encrypted, they can no
longer be read by the user. Whenever the
computer is restarted, a message shows up asking
the user to pay money – that is to say, a ransom –
in order to grant access to the files again.
One of the most famous ransomwares is the
so-called Cryptolocker. It uses extremely
complex cipher codes and keys which make it
impossible not to pay a ransom to get access to
one’s encrypted files.
How can users protect themselves against these
hazards? Here are some tips to prevent
mischievous attacks:
• never open dubious attachments;
• keep back-ups updated regularly;
• remember to connect back-up devices only
during file savings.
Once the virus has been removed, the system
recovery of the back-up data will allow the user
to recover the damaged files.
162 10. System Administration and Security
Reading and Use of English – Part 3
FCE
3. Read the text below and use the word given in capitals at the end of some of the lines
to form a word that fits the gap in the same line.
The world is not sliding, but galloping into a new transnational
dystopia. This development has not been 1. ………………………
recognised outside of 2. ……………………… security circles. It has
been 3. ……………………… by secrecy, complexity and scale. The
Internet, our greatest tool of 4. ………………………, has been
transformed into the most 5. ……………………… facilitator of
6. ……………………… we have ever seen. The Internet is a threat to
human civilisation. These 7. ……………………… have come about
silently, because those who know what is going on, work in the global
surveillance industry and have no incentives to speak out. Left to its
own trajectory, within a few years 8. ……………………… civilisation will
be a postmodern surveillance dystopia, from which escape for all but
the most skilled 9. ……………………… will be impossible. In fact, we
may already be there. While many 10. ……………………… have
considered what the Internet means for global 11. ……………………,
they are wrong. They are wrong because they do not have the sense of
perspective that direct experience brings. They are wrong because
they have never met the enemy.
PROPER
NATION
HIDE
EMANCIPATE
DANGER
TOTALITY
TRANSFORM
GLOBE
INDIVIDUAL
WRITE
CIVIL
From Cypherpunks: Freedom and the Future of the Internet by Julian Assange
VOCABULARY
4. Do you know what the term ‘dystopia’ means? Look it up in a dictionary. What is the
antonym of this word? Complete the grid below.
DYSTOPIA
…………………………………………………………………………………………
……………
…………………………………………………………………………………………
DID YOU KNOW THAT …?
The term ‘dystopia’ is frequently associated with George Orwell’s fictional society depicted in his most
famous work Animal Farm and, above all, in the dystopian novel 1984.
It was written in 1948, though it was first published in 1949. In 1984 Orwell
portrays a high-tech, dehumanised society where feelings and individual
thought are forbidden and controlled by the Thought Police. Every single
moment of the inhabitants of Oceania is thoroughly controlled by a supreme
entity called ‘The Big Brother’, head of the Party. Signs remind the
unhappy citizens of Oceania of their condition: ‘Big Brother is watching
you!’
Opposing the system seems impossible, under the threat of being suspected
and reported to the Thought Police that uses torture and ‘vaporization’ to
annihilate any possible act of rebellion. Orwell was totally against
totalitarian systems and this novel is thought-provoking even today.
Orwell’s works have a peculiar style of their own and are now classics,
just like Aldous Huxley’s Brave New World (1932). Huxley was Orwell’s
teacher and he undoubtedly shared critical thought on the evils of society
with his former student.
163
4. Firewalls
4
Firewalls
67
Firewalls are software or hardware devices
installed to protect the interconnection points
that may be between an internal private
network (e.g. an Intranet) and a public external
network, which, in most cases, is Internet.
Firewalls can also be positioned between two
different networks to allow safe data
interchange between them.
In a way, we can compare these devices to a
Customs house. Their main function is to
act as filters controlling all the network traffic
that originates from the outside, as well as what
is generated from the inside, allowing only
traffic which is actually authorised.
Thanks to their network traffic control
capabilities, firewalls are used to prevent
unauthorised access to a private network or a
stand-alone computer from a public external
network.
When a PC accesses Internet, it becomes, to all
effects and for the duration of the connection,
a network node. The connected system, as
indeed any other node, can expose applications
that have specific functions to communicate
with other nodes and in some cases may hide
some vulnerability that can be exploited to gain
unauthorised access to a system.
Firewalls are not ‘autonomous devices’. They
must be configured by inserting the specific
rules as defined by the user to take decisions
about the eligibility of traffic in transit. The
preparation of this set of rules may require
a long and laborious phase of study and
implementation, depending on the defence
needs required in each specific situation.
However, the fulcrum of the entire operation
of these devices lies precisely in their correct
configuration.
Even the most advanced product available
on the market is useless if you can’t take
advantage of the full set of its own
functionalities due to bad configuration. In
these cases, it would paradoxically be wiser to
not use a firewall because it could give its users
a false sense of security. As seen at the
beginning of this unit, firewalls are hardware
devices or software applications.
Hardware firewalls are a convenient
solution to protect a network for both cost and
maintenance reasons: a single device is often
less expensive than a software licence for each
computer and configuration and updates
involve only one node of the network.
Software firewalls are applications installed
to protect computers and are suitable for
stand-alone computers or small network
protection. The only difference with traditional
applications is that this kind of firewall is the last
bulwark of defence so if an attacker manages
to overcome this barrier by exploiting a specific
vulnerability of the product, they can have full
access to the protected system.
Both hardware and software firewalls always
need to apply all patches released by the
product manufacturer, even those that are not
intended to solve a specific security problem.
This is because it not only improves the
longevity of the product, but it is also
intrinsically resistant to forms of well- or
lesser-known attacks.
GLOSSARY
customs house: dogana
prevent (v.): evitare, impedire
hide (v.): nascondere
fulcrum: fulcro
bulwark: baluardo
patch: aggiornamento rilasciato per correggere
uno o più bug
164 10. System Administration and Security
PET
Speaking
1. Work with a partner and answer the following questions.
Student A. Your task is to describe
how a firewall works. Mind the trap
– not a computing one! Think of
something like the picture on the
right.
Student B. Your task is to explain to
your desk-mate what a computing
firewall is and how it works. You can
use drawings if you need to.
Students A and B. You have to
make an oral comparison between
a firewall and a computing firewall.
What do they have in common?
What are the differences between
the two?
READING COMPREHENSION
2. Read the passage and decide if the following sentences are true (T) or false (F).
1.
2.
3.
4.
5.
6.
7.
Firewalls protect the interconnection points of private networks only.
Firewalls do not provide protection for Internet connections.
The author compares firewalls to filters.
Firewalls are useful to protect computers from unauthorised access.
They are useless with stand-alone computers.
Accessing the Internet makes computers vulnerable.
To ensure protection, firewalls need to be configured according
to pre-defined sets of rules.
8. Hardware firewalls are convenient for network protection.
9. You need a software firewall licence for each computer.
10. It is better not to apply all the patches when configuring firewall,
as some of them may not be useful.
SPEAKING
T






F














– CLASS DEBATE
3. Try this challenging debate by splitting the class in two groups. You’ll need a
moderator as well. One group will support the idea expressed in the quotation, while
the other group will find issues opposing it. The moderator will do their best to stir the
debate. Let your voice be heard!
[
‘Under the cover of encryption, terror masterminds provide recruits with the
tactics and tools necessary to carry out attacks using small arms and explosives.
None of this requires any overseas travel.’ (Tom Cotton)
]
165
4. Firewalls
Secret Codes and Ghost Stories: M.R. James and ‘The Treasure of Abbot Thomas’
An antiquarian, a stained glass window in a chapel, a puzzling inscription, a
hidden treasure, and a mysterious guardian are the ingredients of ‘The
Treasure of Abbot Thomas’ by M.R. James. The story is set in Steinfeld and
it begins with an old Latin book telling of the treasure which Abbot Thomas
hid in 1529, and the quest for it by Mr Somerton, an English antiquarian.
This short story, as the whole literary production by M.R. James
(Goodnestone, 1862 – Eton, 1936) who was the provost of Eton College, is
involving and chilling at the same time. The zealous antiquarian, eager to
solve the mystery, does not take in due consideration the warning of the
old abbot: ‘(I)… have set a guardian (…) Gare à qui la touche’ and will have a
very hard time because of this. In fact, the creepy guardian is highly
determined to protect the treasure, and the only way for Mr Somerton to save his wits – and
probably his life as well – is to ask a friend to put it back.
M.R. James was a learned man and loved writing ghost stories for his friends on Christmas Eve:
‘The Treasure of Abbot Thomas’ is one of his most famous ones and it is interesting as the
mysterious treasure is revealed thanks to the deciphering of a cryptogram. The old stained glass
window portrays the three figures of Job, John and Zacharias holding three scrolls: under their
clothes there are hidden painted letters, but as they are jumbled, it is impossible to understand
the meaning of the statements. The antiquarian broods over the way to solve the cypher and
realises that the key lies in the position of the fingers: one extended finger for Job, two for John,
three for Zacharias. In this way, he knows how many letters to skip in order to decipher the
mysterious writings on the stained glass window.
READING COMPREHENSION
4. Answer the following questions.
1. When and where was M.R. James born? …………………………………………………………
…………………………………………………………………………………………………………
2. What was his job? …………………………………………………………………………………
…………………………………………………………………………………………………………
3. What was his hobby? ………………………………………………………………………………
…………………………………………………………………………………………………………
4. Who is the protagonist of ‘The Treasure of Abbot Thomas’? What does he do for a living?
…………………………………………………………………………………………………………
5. What is the key to solving the cryptogram? ………………………………………………………
…………………………………………………………………………………………………………
PET
Writing – Part 2
5. Your English teacher has asked you to write a story.
Your story must begin with the paragraph written in italics.
Write your story in about 100 words.
You are spending a summer holiday in the countryside at your best friend’s house.
One day, while walking under a tree, you find an old box peeking out among the roots
of the tree. Inside the box there’s an old note, scribbled in blue ink.
‘Watch out! I have set a guardian over the treasure!’
MIND MAP
CRYPTOGRAPHY
used to
used to
involves
Foreclose the attempt
of unauthorized access
to information
Make stored
data safer
Coding
of information
called
Encryption
Decryption
producing
Plaintext
A collection
of unintelligible
charactersding
of information
to make
sens of it
user must
perform
performing
appears as
ENCRYPTION /
DECRYPTION
ALGORITHM
input
input
Encryption key
Ciphertext
input
performing
producing
Encryption
167
MOVIES AND MORE
The Imitation Game – Official Trailer
WARM UP
1. Watch the trailer and discuss
the following questions.
1. Where and when is the story set?
2. Who is the main character?
3. What is the name of the German secret
code machine?
4. Which adjective does the speaker use to
describe the German code in the trailer?
SPEAKING
2. Discuss the following heading (by The Guardian site). What is your opinion about it?
Motivate your statements.
Alan Turing to feature on
new £50 banknote
Mathematician who cracked Enigma
code was persecuted for his
homosexuality in 1950s
The father of modern computing: Alan Turing’s
legacy
£50 note character revealed
CLIL
History
3. WW2 was a turning point in History. Take notes in English about its beginning,
countries involved, main steps and end, drawing a mind map or a PPT to orally
report in class.
CLIL
IT Systems and Computer Networks
4. Alan Turing was a mathematician and cryptographer. He also devised the Turing
Test, that has become a relevant concept for the development of Artificial
Intelligence.
Which connections can you find between such information and the topics you have
studied in IT Systems and Computer Networks?
Audio
11
DATABASES
• Using Databases to Manage Large
Amounts of Data
• Relational Models
1
• Database Management Systems
(DBMSs)
• Data Warehouses and Data Mining
Using Databases to Manage Large
Amounts of Data
68
A database is a systematically organised store of data. The term ‘database’
refers to computerised systems, but databases can also be manual. Before the
era of computers, manual systems such as card index files, filing cabinets
and libraries were used to organise data, so we might as well define them as
databases.
Computers have the ability to store large amounts of data in a compact space
and to process it speedily. These two facilities make them ideal for database
work and organisations of all sizes now use computers to sort, interrogate and
manage their data.
Do I Need Specific Technology?
With application programs such as spreadsheets, it is possible to store data
organised in tables, but this kind of application is not suitable for large
amounts of data. A table in a spreadsheet has a limited maximum memory size
and the functions to search and retrieve information based on user-defined
criteria are not efficient enough. When there is the need to store and manage
data users can quickly access, the best choice is to use database technology.
In a spreadsheet all the data must be loaded in memory before performing any
kind of search, so only relatively small files can be managed effectively.
Whereas with database technology, memory is loaded with
references to the disk location (pages) where information is
stored. In other words, a database knows where data is stored and
GLOSSARY
there is no need to load the entire set of data before searching, but
filing cabinet: schedario
only the pages involved according to search criteria given by the
facility: funzione
user. These features, in conjunction with an efficient data structure
retrieve (v.): recuperare
design, dramatically reduce the number of disk accesses thereby
thereby: in modo tale da
allowing the retrieval of data which is faster than other technologies.
169
1. Using Databases to Manage Large Amounts of Data
Database Features
Databases vary enormously, in terms both of scale and architecture, but
there are certain features that are common to almost all database systems.
• Most databases organise data – according to the relational model – in
tabular structures where each row constitutes a record and contains a
set of values called fields. Fields constitute the columns of the tables.
• Users are able to add, update and delete records in tables.
• Users are able to interrogate (query) the database, asking it to show the
records that fulfil certain criteria.
• Users can output the result of queries as reports. These can be either
viewed on the screen or printed out as a hard copy.
GLOSSARY
tabular: tabellare, sotto
forma di tabella
fulfil (v.): soddisfare
READING COMPREHENSION
1. Read the passage and decide if the following sentences are true (T) or false (F).
1. Databases are computer-stored information.
2. We may consider card index files and libraries as databases.
3. Computers allow fast information processing.
4. Spreadsheets can organise huge amounts of data.
5. Database technology easily manages and retrieves large quantities of data.
6. In database technology, all data must be loaded in memory prior to a query.
7. Spreadsheets are useful to manage a limited amount of information.
8. There are basically two kinds of databases.
9. Users can neither add nor edit information when using spreadsheets.
10. Users may select criteria to find results when making a query.
11. Users can only view query results.
12. The results of queries are output as reports.
T












F












PET
Reading – Part 5
2. For each question, choose the correct answer.
DATABASES AND DAILY LIFE
We all know what a database is and what we can 1. ………… with it. But do we know how
databases are used in our everyday lives? 2. ………… are some examples showing us that
databases lie behind many of 3. ………… daily routines. Can you add any more to the list?
A. Watching online television or video streaming 4. …………, for example Netflix or YouTube.
B. 5. ………… online games.
C. Withdrawing money from ATMs (Automatic 6. ………… Machines).
D. Using credit and 7. ………… cards for payments.
E. Storing files, 8. …………, photos and videos using a Cloud service.
F. Logging 9. ………… to social platforms and media such 10. ………… Instagram, Twitter,
Facebook and others.
G. Purchasing 11. ………… from e-commerce sites such as, for
12. …………, Amazon, E-Bay, Yoox.
H. ……………………………………………………………………
I. ……………………………………………………………………
Adapted from liquidweb.com
1. A. make
2. A. There
3. A. theirs
4. A. facility
5. A. Playing
6. A. Telling
7. A. difficult
8. A. datum
9. A. up
10. A. for
11. A. well
12. A. instant
B. play
B. Under
B. yours
B. convenience
B. Making
B. Teller
B. debit
B. things
B. on
B. by
B. good
B. instance
C. use
C. Below
C. our
C. ability
C. Doing
C. Total
C. debt
C. news
C. at
C. of
C. goods
C. moment
D. do
D. Above
D. us
D. services
D. Losing
D. Told
D. dating
D. data
D. for
D. as
D. outputs
D. instantly
171
2. Relational Models
2
Relational Models
VOCABULARY
1. Read the following paragraphs and complete them with the words in the box.
Slight changes may be necessary. There are two extra words.
idea  group  result  spreadsheet  directory  user  solution  table 
pattern  column  structure  RAM  mobile  system  field
Relational models arrange data in tabular 1. …………………… where each row
constitutes a record and each 2. …………………… defines a field.
No matter how data is physically stored in the memory of a computer,
3. ………………… can refer to data as values contained in a field of a table.
A relational database is made up of a collection of related 4. ……………………
managed by a software called DBMS (Database Management System), which
allows users to store, organise and retrieve data.
A Simple Example
For example, a simple phone
5. …………………… can be organised in
a single table with a 6. ……………………
for name, a field for surname and a field
for each phone number (home, office,
7. ……………………). Each row of this
table contains data related to a single
person.
Such a simple database can be built using
a table in a 8. ……………………, but if
we added some more information to our
phone directory, a database would
become the most convenient
9. …………………… .
For instance, let’s assume we decide to
add a category field (Friends, Work etc.) to
10. …………………… each contact in a
specific area of interest. Adding a textual
field in the table we created before would not
prove to be a good 11. …………………… because this solution may
introduce a lot of duplicated values. Moreover, ‘Work’ is different from
‘WORK’ and ‘work’ for the 12. ……………………; therefore, we
must pay attention on how this new information is written in the table
to avoid incomplete 13. …………………… when we ask the DBMS
to list our work contacts.
172 11. Databases
FCE
Reading and Use of English – Part 3
2. Now read the second part of the article and use the word given in capitals at the end
of some of the lines to form a word that fits the gap in the same line. There is an
example at the beginning (0).
A. Primary and Foreign Key
The best solution in a 0. relational model is to build another table to
store each category with two fields: a description (Friends, Work etc.)
and a code that 1. ……………………… identifies each record.
This code can be a 2. ……………………… number and is called a
primary key.
Then, in the phone directory table, we have to add a new field
containing the category code instead of the 3. ……………………… .
This technique allows us to relate the two tables of our database
4. ……………………… to the value of the category code, which has the
role of a foreign key in the phone directory table.To complete this
simple database project, it is worth 5. ……………………… a primary
key, using a progressive number, to the phone directory table as well.
In tables containing 6. ……………………… data in
7. ……………………… databases, the primary key is often denoted by
the tax code.
B. 1. ………………………
Tables are not the only structures in a database. In order to improve
2. ……………………… in retrieving data, it is advisable to create one
or more indexes. An index is a list of 3. ……………………… ordered
according to the value of a single or a group of fields. Each entry has
a 4. ……………………… to access the record that contains the value
5. ……………………… in the index. A table index works like the index
of a book where the pointer is no more than the page number. When an
index is included in a field in a search criteria, the search is performed
accessing index instead of table because, 6. ……………………… a
7. ……………………… and ordered structure, it can be analysed
8. ……………………… .
When a field is assigned the role of key, it 9. ………………………
creates an index in that field, facilitating not only search, but also
10. ……………………… tables.
RELATION
UNIQUE
PROGRESS
DESCRIBE
ACCORD
ADD
PERSON
GOVERN
INDEX
PERFORM
RECORD
POINT
INCLUDE
BE
SMALL
FAST
AUTOMATIC
RELATE
173
2. Relational Models
MOVIE TIME
• The Internet’s Own Boy - Official Trailer
SPEAKING
– CLASS DEBATE
3. Before starting this debate, watch the trailer taken from the movie The Internet’s Own
Boy, then divide the class into two groups and discuss the following quotations by
Aaron Swartz. One group will support Swartz’s opinions, while the other will disagree.
After that, change roles. Let your voice be heard!
[
• ‘Information is power. But like all power, there are those who want to keep it for
themselves.’
• ‘With enough of us, around the world, we’ll not just send a strong message
opposing the privatization of knowledge – we’ll make it a thing of the past.’
• ‘But all of this action goes on into the dark, hidden underground. It’s called
stealing or piracy, as if sharing a wealth of knowledge were the moral equivalent of
plundering a ship and murdering its crew. But sharing isn’t immoral – it’s a moral
imperative. Only those blinded by greed would refuse to let a friend make a copy.’
Quotes from www.azquotes.com
FCE
]
Writing – Part 2
4. Browse the Net and find information about Aaron Swartz. Then write an article, in an
appropriate style, about his life, ideas, achievements and the issue of freedom. You
may refer to the following articles to learn about Swartz, or read different sites, or both.
Write your article in about 140-190 words.
• Wikipedia Contributors, ‘Aaron Swartz’ (www.wikipedia.org)
• Wikipedia Contributors, ‘Aaron Swartz’ (www.simple.wikipedia.org)
• Casey Newton, ‘The Internet’s Own Boy’ fights for reform after Aaron Swartz’s death
(www.theverge.com)
• Reddit Contributors, ‘Aaron Swartz’ (www.reddit.com)
The Internet’s Own Boy,
Aaron Swartz.
174 11. Databases
PET
Speaking
5. Look at the pictures below and describe one to a classmate. Use as many details as
you can to describe it thoroughly. Then swap roles.
1
2
3
4
175
3. Database Management Systems (DBMSs)
3
Database Management Systems (DBMSs)
69
The software used in databases to design, store,
organise and retrieve data is called a Database
Management System or DBMS. This
software allows users to manage any type of data,
including text, numbers, images, sound, video
and links to websites (hyperlinks).
Many DBMSs are available to users to manage
their databases: the most famous ones are Oracle
and SQL Server for professional use and an open
source DBMS called MySQL.
All of this software works with a universal
database language known as SQL (Standard
Query Language or Structured Query Language).
SQL Language
SQL became a standard of the
American National Standard Institute
(ANSI) in 1986. It was also accepted
by the International Organization for
Standardization (ISO) in 1987.
SQL is a powerful programming
language whose syntax is based on
everyday English and which is
independent of different software products. The
power of this language is that you make your demands through the
instructions without worrying about the strategy the results are to
be retrieved with. DBMSs choose the most efficient way to query
the database and deliver the results in the shortest possible time.
Performance depends on the design and organisation of databases
and not on instructions written by users. If the designer provides the
database with particular structures called indexes (see Relational
Models), retrieval data instructions can be performed very quickly.
SQL instructions are not only provided interactively by users, but
can be embedded in high level language (Basic, C etc.) programs
written to manage an organisation’s information system or in a web
page that dynamically shows its content when querying a database
according to a user’s request. In both of these cases, programmers
don’t need to develop an algorithm to access data efficiently
because this task is left to a DBMS, so they can better concentrate
on writing user interface.
GLOSSARY
worry (v.): preoccuparsi
deliver (v.): consegnare
interactively: in modo
interattivo
176 11. Databases
Can I Query a Database Without
Knowing SQL?
Many DBMSs provide a way for users to query
databases without knowing SQL syntax by
providing a user-friendly graphic interface.
Through this interface and the use of their
mouse, users can tell the system what
information they want to search, the search
criteria, the order criteria and how these are
to be displayed on the screen or in a print-out.
This feature of database querying is called
Query By Example (QBE).
READING COMPREHENSION
1. After reading the passage, choose the correct option.
1. A DBMS is a software which
 A. helps users manage hyperlinks only.
 B. is useful to manage any sort of data.
 C. users may use for online
presentations.
 D. is suitable for large companies.
4. With the use of indexes,
 A. performance can be optimised.
 B. data is retrieved more slowly.
 C. designers save time.
 D. users can retrieve data faster than
designers can.
2. Standard Query Language
 A. is mainly used on Oracle
databases.
 B. is used for online presentations.
 C. works with any DBMS.
 D. is a universal language
for MySQL.
5. Instructions written using SQL
 A. are static and slow.
 B. are complex and embedded.
 C. are dynamic and interactive.
 D. are high performing but static.
3. Standard Query Language
 A. is based on complex algorithms.
 B. comes from Latin syntax.
 C. has a syntax based on trivialities.
 D. is based on everyday English.
DID YOU KNOW THAT …?
The word ‘query’, meaning ‘a
question’, is an ancient one and
derives from the Latin quaere.
Quaere is the imperative of the
verb quaerere, whose meaning is
‘to look for, to seek, to ask’.
The famous term ‘database’ hides
some Latin origins as well. ‘Data’
is the plural form of datum, the
past participle of the verb dare,
meaning ‘to give’.
The word ‘database’ dates back
to 1962. It has come a long way
indeed!
6. QBE, which stands for Query By Example,
 A. is a way of querying for skilled
programmers.
 B. is a subtype of SQL normally used in
small companies.
 C. uses interface to show how to query.
 D. is useful for programming more easily.
177
4. Data Warehouses and Data Mining
4
Data Warehouses
and Data Mining
70
Thanks to databases and the expansion of computer
networks, a huge amount of information is available
for sophisticated analysis techniques.
Data Warehouses
Faster and faster advances in data capture, processing power, data
transmission, and storage capabilities are enabling organisations to
integrate their various databases into data warehouses.
Data warehousing is defined as a process of centralised data
management and retrieval. Data warehousing, like data mining, is a
relatively new term although the concept itself has been around for
years. Data warehousing represents an ideal vision of maintaining a
central repository of all organisational data. Centralisation of
data is needed to maximise user access and analysis. Impressive
technological advances are making this vision a reality for many
companies. In addition, equally dramatic advances in data analysis
software are allowing users to access this data freely. The data
analysis software is what supports data mining.
Data Mining
Data mining is the computational process of exploring and uncovering patterns
and relationships in large data sets. It is a subfield of computer science which blends
many techniques from statistics, data science, mathematical algorithms, database
theory and machine learning.
Data mining is more than a matter of just collecting and managing data since it also
encompasses analysis and prediction. Data mining applications employ different
parameters to analyse data, the most important of them are:
• Association, where an event is connected to another;
• Sequence, where an event leads to another;
• Classification, to identify new patterns;
• Clustering, to find and document groups or clusters of previously unknown facts.
Forecasting means finding new patterns starting from any reasonable prediction
whatsoever that can be made using a discovery approach rather than a deductive
approach.
Data mining applications implement algorithms to simultaneously examine a number
of multidimensional data relationships to find those that are unique or which occur
frequently.
Successful data mining calls for two important prerequisites: a clear formulation of
the problem and access to relevant data.
Data mining is used for many purposes in both the private and public sector.
Insurance companies, for example, use data mining to detect fraud and assess risk,
while retailers collect information to market their products and increase sales.
GLOSSARY
warehouse: magazzino, deposito
repository: deposito, magazzino
data mining: estrazione dei dati
pattern: schema
encompass (v.): includere, comprendere
forecast (v.): prevedere
occur (v.): accadere, verificarsi
assess (v.): valutare
178 11. Databases
READING COMPREHENSION
– WRITING
1. After reading the passage, answer
the following questions. Then use
your answers to write a summary
of the text you have just read.
1. What is a data warehouse? ………………………………………………………………………
………………………………………………………………………………………………………
2. What software supports data mining? …………………………………………………………
………………………………………………………………………………………………………
3. Who can profit from data warehousing and data mining and why?
………………………
………………………………………………………………………………………………………
4. What subjects and branches of science does data mining consist of? ……………………
………………………………………………………………………………………………………
5. Why is data mining more versatile than ‘basic’ data collection and management?
………………………………………………………………………………………………………
6. List the most significant parameters data mining applications employ to analyse data.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
7. What kind of approach does forecasting apply?
……………………………………………
………………………………………………………………………………………………………
8. What are the main prerequisites for successful data mining? ………………………………
………………………………………………………………………………………………………
9. What are the practical applications for data mining? …………………………………………
………………………………………………………………………………………………………
A Simple Case Study
What do nappies and beer have in common?
Read the article below and find out!
A grocery chain used the data mining capacity of its
DBMS software to analyse local buying patterns. They
discovered that when men bought nappies on
Thursdays and Saturdays, they also tended to buy
beer. Further analysis showed that these shoppers
typically did their weekly grocery shopping on
Saturdays. On Thursdays, however, they only bought a
few items. The retailer concluded that they purchased
the beer to have it available for the upcoming
weekend. The grocery chain could use this newly
discovered information in various ways to increase its
revenue. For example, they could move the beer
display closer to the nappy display. Moreover, they
could make sure beer and nappies were sold at full
price on Thursdays.
Nappies
Beer
179
4. Data Warehouses and Data Mining
READING COMPREHENSION
2. Complete the following sentences.
1. Men bought ……………………… and beer on Thursdays and ……………………… .
2. They did a large, ……………………… grocery shopping on Saturdays.
3. They ……………………… only a few items on ……………………… .
4. They bought ……………………… for the upcoming ……………………… .
5. To increase ………………………, the grocery chain could place nappy
and beer ……………………… at a short distance and sell ………………………
at full price on Thursdays.
PET
Listening – Part 3
71
3A. For each question, write the correct answer in the gap. Write one or two words or a
number or a date or a time.
You will hear a speaker talking about cookies.
When cookies were invented, they were documents containing information about you and
1. ………………… .
A cookie can contain all kinds of information, such as the time of your visit to a website or
the 2. ………………… in a shopping basket.
But there are limits to who can read your cookies: only the same website that saves
information to a cookie can 3. ………………… it.
Since their beginning, their popularity exploded and they gradually evolved into a more
4. ………………… yet essential part of the Internet.
The quantity of data these clever little helpers contained started to grow: at first, they
contained just 5. ………………… preferences, but then developers realised that the more
information cookies contained, the better they could 6. ………………… users’ needs.
LISTENING
3B. Listen again and decide if the following statements are true (T) or false (F).
1.
2.
3.
4.
5.
6.
7.
8.
9.
You find cookies browsing the Web.
A cookie can remember the user’s language preferences.
Cookies have stored the same kind of information since their introduction.
Cookie size and kind of stored information depend on the creator of the website.
The amount of information a cookie can store is limited.
Once the user’s information is stored in a cookie, anyone can access it.
Cookies have evolved over the years.
Cookies can be used for profiling.
Cookies have developed only to suit users’ needs.
T









F









Would you like a cookie?
MIND MAP
RELATIONAL
DATABASES
data are logically
stored in
Tables
each row within
a table is a
each column within
a table is a
Record
Field
composed of
each field
A grouping
of fields that
references one
particular object
Contains a single
piece of data
for an object in
a record
data are accessed
using
SQL language
syntax based on
can be used
can be
embedded in a
Everyday English
Interactively
by users
High level language
program
181
MOVIES AND MORE
The Bucket List – Official Trailer
WARM UP
– PAIRWORK
1. Watch the trailer and discuss the following
questions with a classmate. Role-play one
question each.
1. Where does the story start?
2. What is the story about?
3. The two characters have different professions.
What do they do for a living?
4. What is a bucket list?
5. What is the first activity on the bucket list they
carry out?
WRITING
2. Bucket lists are quite popular and anyone can write them at different times in life.
Write at least 10 things you would like to do before you turn 30 years old.
1. ………………………………………………………………………………………
2. ………………………………………………………………………………………
3. ………………………………………………………………………………………
4. ………………………………………………………………………………………
5. ………………………………………………………………………………………
6. ………………………………………………………………………………………
7. ………………………………………………………………………………………
8. ………………………………………………………………………………………
9. ………………………………………………………………………………………
10. ………………………………………………………………………………………
CLIL
ICT
3. Your ICT teacher asked you to collect all the bucket lists of your class into
a database able to make different kind of queries.
• How would you organize this database?
• Which queries would you include and why?
• Can you show your database and tell about its organization and layout to your classmates
and teachers?
Audio
12
JOBS IN ICT
• How ICT Has Led to Changing Work
Patterns
• Software and Web Designer
• Software and Web Developer
• Network Administrator
1
• SEO and SEM Specialist
• Curriculum Vitae
• Covering Letter
• Job Interview: Dos and Don’ts
How ICT Has Led to Changing Work Patterns
FCE
Reading and Use of English – Part 3
1. Read the text below and use the word given in capitals at the end of some of the lines
to form a word that fits in the gap in the same line. There is an example at the
beginning (0).
Information technology has led to many 0. changes in how we
work, where we work and even when we work. It has had a
dramatic effect on our 1. ……………………… lives.
• Until the mid-1990s, it was not possible to shop online.
The 2. ……………………… alternative was
3. ……………………… by phone.
• The same was true for 4. ……………………… and all the host
of Government and other services that now exist online.
• E-mail was not 5. ……………………… used and instant
messenger did not exist.
• Instead of mobile phones, there was a trend for CB (Citizen’s
Band) radio.
• Documents could not be sent as e-mail 6. ………………………
and were faxed instead (meaning that a paper document is
7. ………………………, sent down a phone line, and then
8. ……………………… at the other end).
• The need to travel for essential services, e.g. banking, was far
9. ……………………… for those who lived outside town.
Adapted from www.bbc.co.uk
CHANGE
WORK
CLOSE
SHOP
BANK
WIDE
ATTACH
DIGIT
PRINT
GREAT
183
1. How ICT Has Led to Changing Work Patterns
READING COMPREHENSION
2. Read the following paragraphs and complete them with the words in the boxes.
Some words may have to be slightly changed. In each box there is an extra word.
number  informative  common  skill  development 
disadvantage  address  communication
Recent 1. ……………………
Today, customers expect even the smallest of businesses to have a
professional, 2. …………………… website. Businesses that have failed to
embrace the advancement of 3. …………………… and ICT have put
themselves at a 4. …………………… .
It is now 5. …………………… for adverts to include a web 6. ……………………
in addition to, or even instead of, a phone 7. …………………… .
computer  job  web  technology  system 
warehouse  technician  manage  line
Impact on employment
The introduction of information 8. …………………… has caused some
unemployment, for example:
• computer-controlled 9. …………………… need only a handful of staff to
operate them;
• 10. ……………………-controlled robots are now common on production
11. ……………………, replacing human workers;
• the old skill of workers in the printing industry are now out-of-date;
• some 12. …………………… have disappeared as they can now be done
automatically, e.g. marking multiple choice exam papers.
However, it is fair to say that the development of information technology has
led to many new jobs such as computer 13. ……………………, programmers,
14. …………………… designers and 15. …………………… analysts.
184 12. Jobs in ICT
place  school  likely  telephone  counter  processor  phone 
job  CAD  level  pencil  letter  today  profession
Learning on the 16. ……………………
It is more 17. …………………… to have changed someone’s work rather than led to them
losing their job. People in certain 18. …………………… have had to be retrained to make
use of modern technology:
• Secretaries now use word 19. …………………… and not typewriters.
• Travel agents book holidays by computer, not by phone or 20. …………………… .
• 21. …………………… and home banking have meant that many bank staff now work by
22. …………………… in front of a computer, instead of being in a branch, behind a
23. …………………… .
• De-skilling has taken 24. …………………… . Some jobs which needed a high
25. …………………… of skill in the past can now be done more easily. For example, print
workers 26. …………………… can use DTP software to lay out their work.
• Designers now use 27. …………………… software rather than 28. …………………… and
paper on a drawing board.
many  tired  online  quality  robot  find  development  much 
should  offline  machine  commerce  reliable  business
Better 29. …………………… products
• Products made with computers 30. …………………… be of a better quality than before.
For example, car bodies are welded
more accurately by 31. …………………… than by humans.
• Robots don’t get 32. …………………… so the quality of work is consistent.
33. …………………… controlled by computer are more 34. …………………… than those
controlled by humans.
• Miniaturisation of 35. …………………… electrical items, such as mobile phones and
video cameras, have become 36. …………………… smaller due to 37. ……………………
in technology.
Effects of e-38. …………………… on businesses
High street stores now 39. …………………… themselves competing with each other for
40. …………………… both on the high street and 41. ………………… .
185
1. How ICT Has Led to Changing Work Patterns
PET
Speaking
3. Role-play a complete dialogue using the information provided.
A – Customer
B – Online shop assistant
‘A’ bought a pair of trainers online and paid by a pre-paid credit card on
www.bestdeal4ever.com
His reference number is ZAX667900Q
‘A’ dials the Customer Care phone number
and starts the conversation.
‘B’ greets and asks how he can help ‘A’.
‘A’ says that the trainers are not the right size
for him. They are too small.
‘B’ apologises and asks for the reference
number.
‘A’ spells the reference number.
‘B’ thanks ‘A’ and checks the order.
‘B’ asks ‘A’ what the right size should be.
‘A’ replies and tells ‘B’ the right size.
‘B’ apologises but tells ‘A’ that there are no
available trainers in ‘A’s size.
‘A’ asks for a refund.
‘B’ says that it is OK but ‘A’ will need to send
back the trainers before the refund is granted.
‘A’ is a bit annoyed but accepts.
‘A’ asks ‘B’ what address he has to send the
trainers to.
‘B’ tells ‘A’ the address: 78 Melborough Rd,
RD4455 Dover, Kent, UK.
‘A’ asks how long it will take to have the refund on his credit card.
‘B’ informs ‘A’ that it will take just a couple of
working days after the parcel is delivered.
‘A’ thanks ‘B’.
‘B’ replies and ends the conversation.
READING COMPREHENSION
4. The following statements are about selling goods online; decide whether they are
an advantage (A) or a disadvantage (D) of this form of retailing.
SELLING GOODS ONLINE
1. Staff reductions: with increased competition, local companies may have to reduce their
work force. (……)
2. It reduces staffing and/or high street stores thereby reducing costs. (……)
3. Customer concerns: if high street stores are closed in an effort to save money, customers
who prefer to shop on the high street may not be comfortable buying online so may go
elsewhere. (……)
4. It provides the option to offer 24 hour shopping at a minimum additional cost. (……)
5. It opens the market to customers nationally and internationally. (……)
6. Stiffer competition: businesses once competing with the shop in the next town now find
themselves competing on a global scale. (……)
7. Cost of restructuring: the move to e-commerce may not be a smooth one and will certainly
require a degree of investment. (……)
8. It enables smaller companies to compete with larger companies. (……)
186 12. Jobs in ICT
Increased Dependency on the Internet
72
For companies and individuals there is now pressure to have
Internet access to do everyday things such as submit orders or
look up details in a catalogue. There are initiatives to make as
many services available on the Internet as possible, including
e-government, where government departments can be dealt
with using secure websites.
Teleworking
73
Teleworking, sometimes called telecommuting, means working
from home using modern technology to keep in touch with your
business. Jobs can be relocated to places where it is more
attractive, more convenient or cheaper to live.
Technology Required for Teleworking
To work effectively, teleworkers require the following:
• a computer with Internet access;
• an e-mail account.
Some teleworkers may also use:
• a fax machine;
• a mobile phone;
• video conferencing equipment.
Advantages for the employer
• Office running costs and overheads (rates, electricity, heating etc.)
can be reduced, which in turn may reduce the need for office space.
• Travel-related problems may be reduced, e.g. staff being unable to
get into work due to rail or road delays.
• It may tempt better staff to come and work for the company.
Disadvantages for the employer
• Employers need to be able to trust their staff and be prepared to have less direct
control over them.
Advantages for the employee
• Work in a comfortable environment – his/her home.
• No commute and no travel costs.
• Work around his/her family’s needs.
Disadvantages for the employee
• Less human interaction – fewer opportunities to meet people, share ideas etc.
• More difficult to work as part of a team, especially if they are all office based.
• Greater temptation to spend time on non-work-related activities.
• Difficult to separate personal life from work.
Video conferencing
Video conferencing means using computers to provide a video-link between
two or more people. Instead of just talking to someone by telephone, you are able
to see them as well.
GLOSSARY
telecommuting: telelavoro
overhead: costo/spesa generale di esercizio
tempt (v.): tentare, indurre
commute: tragitto casa-lavoro, pendolarismo
Equipment
The following is needed to take part in a video conference call:
• a computer;
• a webcam;
• a microphone (most webcams have a built-in microphone);
• speakers;
• broadband Internet access;
• video conferencing software.
It is possible to buy a special video conferencing machine just for this purpose.
Advantages of video conferencing
• Meetings can take place without leaving the office.
• Travel costs and times can be reduced significantly.
• Meetings can be called instantly worldwide with little notice.
• Delegates can still attend meetings even if they are physically unable to.
Disadvantages of video conferencing
• May not be as productive as a discussion around a table.
• Confidential documents may need to be viewed and signed in person.
• There will always be times when you need to be able to meet face-to-face.
GLOSSARY
broadband: a banda larga
with little notice: con breve preavviso
confidential: riservato,
da non divulgare
– SPEAKING
5. After reading the passages above, give an oral summary of the advantages and
disadvantages of teleworking and video conferencing.
READING COMPREHENSION
2
Software and Web Designer
74
Software designers specify the structure of information to be used as input
and output of an application, the nature of the user interface and the sequence
of processing. The designers also dictate the order in which the system will be
constructed, the timescale for each section and the format for the on-screen
and hard-copy outputs. Web designers also define the graphical layout and
navigation structure of a website to comply with the client’s requirements.
The key skills of a designer are:
• strong written and verbal skills;
• analytical mind;
• logical approach to problem solving;
• interpersonal skills;
• an understanding of the interaction between business operations and
technology;
• meticulous attention to detail;
• adaptability, ability to respond to changing circumstances;
• being a web designer requires technical knowledge of the Internet.
GLOSSARY
timescale: arco di tempo, lasso
di tempo
3
key skills: competenze chiave
changing: mutevole
Software and Web Developer
75
Software and web developers, also known as ‘programmers’, write the
code that tells the computer how and when to perform the functions specified
in the system design. They need an understanding of general programming
structures and principles and a specialist knowledge of one or more
programming languages, e.g. Visual Basic, C++ etc. (see Unit 7 for more
information on structures and programming languages). Their work involves
writing step-by-step instructions in the appropriate language to build the
applications required by the user. Web developers also need to know the HTML
language which is used to create the pages of an Internet site. The rules,
instructions and structures are completely different from other programming
languages. Graphics, communications and networking skills are important for
a web developer to build attractive web pages.
Both software and web developers must perform not only coding tasks, but also
debugging and maintenance tasks. Debugging means testing the program or
the website, finding errors and correcting them before
releasing the application to users. Maintenance is an
activity performed after implementation, to amend the
original code if errors occur, to improve performance or
to add new functionalities.
The key skills of a programmer are:
• logical approach to problem solving;
• ability to concentrate on one task;
• ability to learn effectively;
• attention to detail;
• ability to communicate with users and designers;
• ability to work in a team.
189
4. Network Administrator
4
Network
Administrator
76
Network administrators are responsible
for the security and administration of
networks. Their work may involve
overseeing the installation and
configuration of new hardware and software
and ensuring their compatibility with the
other nodes of the network.
Network administrators must also keep
network hardware efficient and update
software to ensure that problems are fixed.
The administrative tasks involve setting up
user accounts and passwords, ensuring that
the network is secure and that users are using
it legitimately and ensuring that there is an
effective back-up system (see Unit 10 for
more information on network accounts).
The key skills of a network administrator are:
• strong technical knowledge;
• practical problem-solving skills;
• understanding of the overall technology
needs of the organisation;
• good interpersonal skills.
GLOSSARY
oversee (v.): supervisionare
legitimately: legittimamente
READING COMPREHENSION
1. Match the beginning of each sentence with the correct ending.
1.

2.

3.

4.

5.

6.

7.

8.

Great attention to detail,
logical approach to problem
solving,
The management of accounts,
passwords and back-ups,
Coding, debugging and
maintenance tasks are
activities belonging
In order to create the pages
of an Internet site
Network administrators
deal with the efficiency
and security
Programmers need different
kinds of skills,
The tasks of a software
designer are different
Programmers, who are IT high
specialists and technicians,
A. ranging from technical to
communicative ones, to perform their
job at their best.
B. and include the choice of an
application structure, layout, input
and output, according to the client’s
needs.
C. are also known as software and web
developers.
D. of all the hardware and software of a
specific network.
E. as well as preventing illicit use by
unauthorised users, are some skills
of a network administrator.
F. web developers use HTML language.
G. interpersonal skills and resilience are
typical features of a web designer.
H. to both software and web developers.
190 12. Jobs in ICT
5
SEO and SEM Specialist
77
‘In the last 25 years a technological revolution focused on information has
changed the way we think, produce, trade, manage, communicate, live, die, make
wars, make love.’ (M. Castells, Volgere di millennio, Università Bocconi, 2008)
Internet is undoubtedly the protagonist of this huge ongoing revolution, the key
word of these new global dynamics based on information being visibility.
• What does visibility mean?
Let us suppose we own a company with an e-commerce site. Whenever a user
makes a search on a search engine (e.g. Google, Bing, Mozilla), we want our site
to appear near the top of the results, preferably before our competitors.
• How can we make our site visible?
There are optimisation techniques for web pages. Through the correct use of key
words, a search engine will show your website high up among the results. Such
techniques require knowledge of search engine algorithms in order to set key
words and statements appropriately within the HTML code of a web page.
Search engine algorithms are continually evolving and have now become quite
complex. Specifically, they tend to mimic an average user’s behaviour, where
inserting key words within a page is not enough: contents ought to be engaging and
easy to read. To sum up, if users like a web page, search engines will like it too.
In order to deal with such requirements, a new professional figure has sprung up:
the SEO Specialist (SEO stands for Search Engine Optimisation). SEO
Specialists put into practice techniques to improve visibility as discussed above;
furthermore, they optimise sites for web search engines.
However relevant, SEO techniques are not the only ones we can rely on to
acquire visibility for our website. It is also possible to appear among search results
through ‘pay per click’ marketing campaigns.
The picture on the right shows the Google results of a
pre-paid search. Paying does not automatically grant
visibility, as other competitors can do the same, but it
certainly increases the chances of a site being seen.
In order to perform a successful ‘pay per click’
campaign a daily budget has to be set. Once the daily
budget runs out, the sponsored ad will not show up for
the rest of the day. The budget decreases every time a
Sponsored links in a search engine page.
user clicks on the ad; moreover, the more we are
willing to pay for every single click, the more likely it is to
appear before, or instead of, one belonging to our
competitors.
As we can see from this brief explanation, managing a ‘pay per click’ campaign
is not a piece of cake. You need to select the key words according to preceding
surveys on competitors, create an effective ad, and constantly monitor the
campaign results.
In addition, remedial actions could be necessary, and it is
GLOSSARY
also important to evaluate the Return of Investment (ROI).
ROI tells us about the campaign’s profitability based on
ongoing: continuo
fixed goals.
search engine: motore di ricerca
mimic (v.): imitare, riprodurre
Such requirements need a professional skilled both in Web
grant (v.): assicurare, garantire
management and Marketing, in short an SEM Specialist
survey: sondaggio
(SEM stands for ‘Search Engine Marketing’).
SPEAKING
– PAIR WORK
AN INTERVIEW
1. Referring back to the text, work with a classmate. ‘A’ is a journalist, while ‘B’ is a
SEO/SEM. You have to prepare an interview for the local radio. The programme is
called Meet New Jobs!
Write down five short questions and answers on this topic and role-play the interview.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
6
Curriculum Vitae
Writing a CV is an important step when applying for a job. Have a look at the passage
on the next page and do the exercise to learn some useful tips for writing a successful CV!
VOCABULARY
1. Find synonyms for the following words.
1.
2.
3.
4.
5.
6.
7.
Résumé
Extensive
Fake
Get
Occupation
Emphasise
Described
………………………
………………………
………………………
………………………
………………………
………………………
………………………
8. Moreover
9. Brief
10. Expert
11. Abilities
12. Concentrate (on)
13. Term
………………………
………………………
………………………
………………………
………………………
………………………
CV stands for Curriculum Vitae. It can be defined as ‘a short written
account of one’s education and past employment, used especially when
looking for a new job’ (Longman Active Study Dictionary of English).
Curriculum Vitae is a Latin expression; in the USA, the French word
résumé which means ‘summary’ is used as well. For further details, have a
look at the Wikipedia page en.wikipedia.org/wiki/Curriculum_vitae.
When writing a CV, remember to:
• be concise (the CV should not be too long);
• tell the truth (don’t pretend to be what you are not);
• highlight your skills and work experience;
• include your address, e-mail address and phone number.
When writing a CV you should always remember that it will be read by
people you have never met. In addition, they will probably be trained to
select among the many letters they receive every day.
Therefore, you should pay attention to:
• capital letters;
• spelling and punctuation;
• contracted forms (never use them when writing a CV!);
• correct grammar.
193
6. Curriculum Vitae
LISTENING
Listen to the speaker talking about Europass and do the following exercises.
78
2A. Fill in the blanks.
‘Europe: 50 ………………………, ……… ……………… people, but above all, 700 million
different ……………………… beings, each one ………………………. .’
2B. The speaker lists some jobs and activities. Underline the ones you hear.
79
Chimney
sweeper
Dog sitter
Hairdresser
Chemist
Midwife
Basketball
player
Student in
Communications
Baby sitter
Fire Brigade
Volunteer
Freelance
journalist
Coach
Soccer player
F1 driver
Guitar player
Choir singer
PET
Listening – Part 3
80
2C. For each question, write the correct answer in the gap. Write one or two words or a
number or a date or a time.
You will hear a speaker explaining the basic principles and aims of the Europass.
The main aim of Europass is to compare competences, educational levels and
1. ………………… all across Europe.
Europass has a standardised structure and thus makes qualifications more
2. ………………… .
Europass helps you to apply for jobs 3. ………………… and internationally.
Europass is made up of 4. ………………… different documents.
The Curriculum Vitae is the most 5. ………………… document of the Europass.
The Europass CV template is available in 6. ………………… different languages.
Apart from biographical details, the Europass CV also gives you the opportunity to
highlight your social, organisational, and 7. ………………… skills and competences.
Language skills are detailed according to the 8. ………………… European
Framework of Reference for Languages.
The use of standardised levels of competences allows you to not only to assess
yourself better, but also gives your future employer a better 9. ………………… of
your skills.
194 12. Jobs in ICT
An Example of a Curriculum Vitae
Here’s an example of a CV of a post-diploma ICT student. You may use it to help you in the next activity.
WORK EXPERIENCE
Filippo
Rebecchi
DATE OF BIRTH:
30/07/2003
01/03/2021 – 31/03/2021 – Bologna, Italy
Computer programmer
IIS Aldini-Valeriani Sirani
INTERNSHIP
- 6 hrs/day - Arduino Project (building an automatic irrigation system)
Programming languages: C
- Business or sector: Information and communications
CONTACT
Nationality: Italian
Gender: Male
Via degli Ulivi, 57,
40050 Argelato (BO), Italy
filipporebecchi@server.it
(+39) 3370000000
(+39) 0510000000
http://www.iav.it/home / Via Sario Bassanelli, 40129, Bologna, Italy
01/02/2021 – 28/02/2021 – Bologna, Italy
Computer programmer
MYOWNITLAB S.r.L
INTERNSHIP
-Web developer
- 8 hrs/day
-Technologies: HTML / CSS / JAVASCRIPT / JAVA / MYSQL
-Business or sector: Information and communications
http://Myownitlab.com / Via dei Pini Marittimi, 5, 40138, Bologna, Italy
www.filipporebecchi.com
Facebook: www.facebook.com
/filipporebecchi/
EDUCATION AND TRAINING
10/01/2021 – 15/01/2021 – Via Sario Bassanelli, Bologna, Italy
Health and Safety Awareness Training for Workers
IIS Aldini-Valeriani Sirani
Related Documents: Work Safety Course.pdf
LANGUAGE SKILLS
MOTHER TONGUE(S): Italian
OTHER LANGUAGE(S):
English
Listening
C2
Reading
C1
Spoken
production
C1
Spoken
interaction
C1
Writing
C2
Reading
B2
Spoken
production
B1
Spoken
interaction
B1
Writing
B2
Spanish
Listening
B2
195
6. Curriculum Vitae
COMMUNICATION AND INTERPERSONAL SKILLS
Teamwork skills
Good listener
Good interpersonal communication skills
ORGANISATIONAL SKILLS
Enjoy working as a team member as well as independently
Organised
Goal-oriented and results-driven
Able to coordinate several tasks simultaneously
Well developed skills in organisation, prioritising, time
management and decision making
DIGITAL SKILLS
C / C++ / Photoshop / CSS / HTML / Java / Javascript / MySQL / PHP
/ Word, Excel, Pow
erPoint / Access
CERTIFICATES
Intermediate Video Creator
Excellent PowerPoint creator
creator
Excellent
at
Excellent
at Photoshop
Good at Access
Photoshop
Good at Access
WRITING
3. Now it’s your turn to write your own CV! Go to the Europass website and fill the CV
template in English (https://europa.eu/europass/it/create-europass-cv). Then print it
and bring the CV to your teacher.
196 12. Jobs in ICT
7
Covering Letter
81
You would never attend a first date without your best shoes on, would you?
So why should you send your precious CV without a covering letter?
A covering letter (or cover letter) is a sort of introduction to the résumé and it is
as important as a good CV. It is usually attached to the CV and basically highlights
your motivation, the reason why you are applying for that specific position and, last
but not least, relevant qualifications suited to the kind of job you are looking for.
For example, stressing your ability to work in a team may prove relevant when
applying for a front-line job. Remember that education and technical skills
certainly matter a lot, but sometimes your life skills can make the
difference between your CV and somebody else’s.
This is why you should avoid writing generic covering
letters which are unlikely to grab the reader’s
attention. Always customise your covering letter,
and possibly address it to the person in charge
of recruitment.
Finally, don’t forget to read it carefully
BEFORE sending it – spelling
and grammar mistakes, as
well as a missing ‘object’ if
sent via e-mail – will
probably mean your
covering letter and
CV will end up in
the nearest bin!
GLOSSARY
highlight (v.): evidenziare,
sottolineare, mettere in risalto
qualification: specializzazione
grab (v.): cogliere, afferrare
customise (v.): personalizzare
bin: cestino
197
7. Covering Letter
– CLASS DEBATE
NERDS & GEEKS
SPEAKING
1. What do the words ‘nerd’ and ‘geek’ mean? Do these words have a positive or a
negative connotation? Look them up in a dictionary to find out.
– Nerd: ………………………………………………………………………………………………
– Geek: ………………………………………………………………………………………………
Now have a look at the quotes below and divide the class into three groups. Each
group has to prepare a short speech on the issue, highlighting the different shades of
being considered a nerd and/or a geek. You may use examples taken from personal
experience as well as movies, books, magazine articles or even songs. Let your voice
be heard!
[
• ‘When I was a kid, it was a huge insult to be a geek. Now it’s a point of pride
in a weird way.’ (J.J. Abrams)
• ‘In grade school, I was a complete geek. You know, there’s always the kid
who’s too short, the kid who wears glasses, the kid who’s not athletic. Well,
I was all three.’ (Julianne Moore)
• ‘When the AIDS epidemic broke, because I happened to be a science nerd
and knew a lot about viruses and a lot about that virus at the time, I felt a
moral obligation to go out and try to stem the fear and get out and explain
to people what the disease was and how it worked.’ (Morgan Fairchild)
• ‘In Europe they call geeks ‘smart people,’ and frankly I think we live in a
culture that doesn’t value intelligence enough; so I am very proud in saying
that I am a geek.’ (James Marsters)
Quotes from www.brainyquote.com
]
198 12. Jobs in ICT
7
Job Interview: Dos and Don’ts
Job interviews are not always easy, but there are some golden rules you should always
keep in mind when applying for a job.
VOCABULARY
1. Rearrange the statements below in the right column – that is, what to do and what not
to do in a job interview.
Feel free to add some more!
Wear open-toe shoes
Pretend you have skills you do not actually have
Look natural
Be on time
Talk about your
hobbies and interests
Take a selfie while
waiting for your turn
Wear uncomfortable
clothes and shoes
Wear heavy make-up
Silence your phone
Look interested
and focused
Make nasty remarks on
previous job experiences
Be late
Never ask questions
Wear shorts
Inquire mostly about
holidays and weekends
Ask about the company and the
kind of job you are applying for
Talk about how flawless you are
Talk about your
education and skills
Look anxious and worried
Look bored
199
7. Job Interview: Dos and Don’ts
DOS
DON’TS
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
………………………………………………
PET
Writing – Part 1
2. Your friend Josh has just passed his A-level
exams. He writes you this text message on a
Friday afternoon in late June at about 6 p.m.
Write a reply to your friend giving him advice to
have a successful job interview and get the job!
Write your answer in about 100 words.
Hi sam, i know it
sounds
crazy, but the com
pany i
sent my CV to ha
s just
called me for a JO
B
iNTERViEW on M
onday at
8.00. i’m so happ
y but i
don’t know what
to do – i
mean, what to we
ar, what
to say… – it’s my
FiRsT
job interview in m
y dream
company and i do
n’t want
to fail. i need your
help!
Josh
……………………………………………………………
……………………………………………………………
……………………………………………………………
……………………………………………………………
……………………………………………………………
……………………………………………………………
……………………………………………………………
……………………………………………………………
10:07 AM
……………………………………………………………
……………………………………………………………
……………………………………………………………
……………………………………………………………
……………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
✓✓
MIND MAP
Software and
web designer
Skills
• Strong written and verbal skills
• Analytical mind
• Logical approach to problem
solving
• Good interpersonal skills
• An understanding of the interaction
between business operations and
technology
• Meticulous attention to details
• Adaptability and ability to respond
to changing circumstances
• Being a web designer requires
technical knowledge of Internet
Software and
web developer
Skills
• Logical approach to problem
solving
• Ability to concentrate on one task
• Ability to learn effectively
• Attention to details
• Ability to communicate with users
and designers
• Ability to work in a team
Network
administrator
Skills
• Strong technical knowledge
• Practical problem-solving skills
• Understanding of the overall
technology needs of the
organization
• Good interpersonal skills
SEO and
SEM specialist
Skills
• Knowledge of main search engine
algorithms
• Technical knowledge of Internet
• Technical knowledge of web
design and web developing
• Technical knowledge of web
marketing
• Ability to communicate with users
• Interpersonal skills
• Communication (web copywriting)
skills
JOBS
IN ICT
201
TASK: A PPT ABOUT YOUR
SCHOOL-WORK EXPERIENCE
In Italy, PCTO (formerly known as ASL) have been compulsory since 2015, even
though Technical and Vocational schools had already been carrying out such activities
for some years. In fact, the first Act concerning school-work experience dates back to
2003. (For further reading about this topic, see Alternanza Scuola-Lavoro, Trinity
Whitebridge).
In this task, students will create a PPT about their school-work experience. They can
use WH-questions to talk about the different aspects of their experience, as in the
examples listed below.
WHAT
WHERE
What is the name of the company? What is its core
business/specialization? What kind of tasks did you carry out
in your experience?
Where is the company? Is it far to your school or home?
How did you reach the workplace (by bus, car…)?
WHEN
When did you spend your internship? How long did it last?
WHICH
Which skills have you improved during your internship?
Which ones do you think were the most important or
relevant for the tasks you carried out?
WHO
Who was your supervisor? What was he/she like?
WHY
Did you enjoy your school-work experience? Why? Why not?
Tips for students
You are welcome to customise your PPT
with pictures and music. Please remember
that you may have to ask the Company for
permission to use images, photographs
and information before writing your report.
Privacy policies have to be complied with
at all times!
Finally, do not forget to write a short
paragraph as a conclusion of your report
in the last slide of your PPT. To do this, you
could think of a statement summarizing
your opinion on the internship.
Remember that your teacher will read it
and may also assess your writing and
speaking, so do your best to write a great
report!
Audio
13
SAFETY
• Safety Signs
• Work Safety: 10 Useful Tips
• Body Parts
‘Safety isn’t expensive, it’s priceless.’
(Author unknown)
BRAINSTORMING
1. Draw a spidergram on your notebook with the word ‘safety’ in the middle, then add as
many words related to safety as you can. Now compare your spidergram with your
partner.
• Why is safety important, in your opinion?
• Can you make examples of how to keep safe
at the workplace and at home?
• What do you know about the Italian Health
and Safety Law?
PET
SAFETY
Speaking
2. Look at the pictures below and describe them to your partner with as many details as
you can from the point of view of safety. Then swap roles.
1
Safety Signs
82
Safety signs give us important information and protect
people from possible dangers.
It is important that they are clearly visible, which means
that they must not be hidden or covered by any obstacles.
It is also important to remember that everyone has to
comply with safety signs to ensure safety and prevent
accidents and injury.
Safety signs are everywhere: at school, on the road, at the
cinema, at the workplace, on buses and other means of
transport. Sometimes there are words or short sentences to
clarify the meaning of the sign.
There are different kinds of signs, each giving a different
piece of information. Below are the main types of signs
you can find in the workplace or when working with
machine tools.
GLOSSARY
comply with (v.): osservare, rispettare
• Warning signs: they warn us from possible dangers and threats. These signs have
a triangular shape and a yellow background.
RADIOACTIVITY
(X-RAYS)
ELECTROCUTION
SLIPPING
FIRE AND EXPLOSION
BIOHAZARDS
204 13. Safety
• Prohibition signs: they tell us what we must not do or what is forbidden.
They have a round shape with a round, red frame on white background.
NO SMOKING
NO DOGS ALLOWED
NO ADMISSION
NO MOBILE PHONES
NO PHOTOGRAPHS
• Mandatory signs: they tell us what we must do or wear, for example PPE (Personal Protective
Equipment) as in the following signs. They have a round shape and a blue background. Mind the
difference between ‘mandatory’, which means ‘compulsory’, and ‘optional’ (which is not
compulsory!).
WASH HANDS
WEAR SAFETY BOOTS
WEAR GLOVES
WEAR GOGGLES
TURN RIGHT
• Emergency and rescue signs: they tell us the way out of a danger or an emergency.
They can also give information about first aid. They have a square or rectangular shape
and a green background.
EMERGENCY EXIT
ASSEMBLY POINT
FIRST AID KIT
LIFE JACKET
EMERGENCY STAIRS
• An important sign everybody ought to know is the
following one. It tells us where a fire extinguisher is.
As well as other fire safety signs, it has a red background
so as to catch immediate attention even at a distance.
GLOSSARY
ought to: dovrebbe
FIRE EXTINGUISHER
205
1. Safety Signs
• Finally, talking about signs it is important to mention information signs.
Unlike safety signs, information signs may display different shapes, colours and information,
yet it is important to read them carefully as they give us important information we may need.
GLOSSARY
display (v.): esibire, esporre
MATCHING
1. Match the two halves of the sentences to make complete statements.
1.
 Unlike safety signs, information
2.

3.

4.

5.

6.
7.


8.
9.


10. 
signs
Fire safety signs normally have a
red background
Most emergency and rescue
signs
Safety signs must be clearly
displayed
Signs telling you about possible
danger and threats
Prohibition signs
Mandatory signs have round
shape and blue background
Warning signs
‘Turn right’ and ‘Wear safety
boots’
A ‘No smoking sign’
A. is a prohibition sign.
B. are called warning signs.
C. and tell about what is
compulsory to do or wear
to ensure safety.
D. tell you what is forbidden to do
or use.
E. are examples of mandatory
signs.
F. show the way out of a danger.
G. may vary in shape, colour and
information.
H. to catch for immediate attention,
as the fire extinguisher sign.
I. wherever there is a risky or
hazardous situation.
J. have triangular shape and
yellow background.
206 13. Safety
2
Work Safety: 10 Useful Tips
PET
Reading – Part 4
1. Five sentences have been removed from the text below. For each question, choose
the correct answer. There are three extra sentences which you do not need to use.
We all know how much it is important to stay healthy and safe at the workplace. Reducing
risks of injury and illnesses at work is a goal that both employers and employees ought to
share. Here are some tips that may help you to ensure your safety in the work environment.
1. ………………………
If you know the specific hazards of your job or workplace, you will be able to take steps to
reduce your risk of work-related injury or illness.
2. Reduce workplace stress.
Common causes include long hours,
heavy workload, job insecurity and
conflicts within the workplace. Stress can
lead to depression, sleeping difficulties
and problems with concentration.
3. ………………………
Staying fresh and alert will help you avoid injury
or burnout. Schedule the most difficult tasks of
each day for times when your concentration is
best, such as first thing in the morning.
4. No twisting, please.
Use ergonomically designed furniture and
equipment, and rearrange your work area so
that everything you need is within easy reach.
5. ………………………
Instead of trying to lift or carry a heavy object,
use a conveyor belt or a forklift.
6. Protect your back!
Should you need to pick up and carry heavy
loads, keep the load close to your body and lift
with your thigh muscles.
207
2. Work Safety: 10 Useful Tips
7. ………………………
Earplugs, earmuffs, hard hat, safety goggles, gloves
or full-face mask can reduce your risk of injury.
8. Stay sober.
Alcohol and drugs are a contributing
factor in workplace fatalities, as they can
reduce concentration and affect reflexes.
9. Talk over any distress.
It is important to inform your employer or
manager about possible hazards and risks.
Your employer is legally obliged to ensure a safe
working environment.
10. ………………………
Organisations such as unions can offer information
and advice on workplace safety issues.
Adapted from www.betterhealth.vic.gov.au/
A. Use mechanical aids.
B. Know your rights.
C. Don’t talk to your colleagues during
working hours.
D. Bring Feng-Shui to your office.
E. Know the risks.
F. Wear protective equipment when
needed.
G. Keep everything in order.
H. Take regular breaks.
208 13. Safety
PET
Reading – Part 1
2. For each question, choose the correct answer.
1
 A. It is forbidden to use your mobile while
driving.
 B. You can text only very short messages
while driving.
 C. If you’re driving, you’re not allowed to text
NO TEXTING
WHILE DRIV
ING
2
Hi Joe, the concert starts
at 8 p.m. Let’s meet at 6
at Gate 5. Tube stop is
Circo Massimo. CU there!
 A. Joe is meeting his friend at the tube
stop at 6 p.m.
 B. Joe and his friend are meeting two
hours before the concert.
 C. Joe and his friend are meeting at Gate
5 just before the concert starts.
3
Oak Tree County Library
Opening times
9-14 Mon-Wed-Fri
8:30-17 Tue-Thu
 A. You can’t borrow or return books at
7:45 on Thursday mornings.
 B. You can’t borrow or return books on
Mondays after 9 a.m.
 C. You can borrow books on Saturday
mornings.
4
ELEVATOR
OUT OF ORDER
Please use
staircase
We apologise for
the inconvenience
5
Corgi Museum
Adults: £12
Visitors under 18: Free
(school groups excluded)
Groups (min. 9): £9
Reduction card holders:
£10
Tickets are only available
online.
 A. The elevator is broken, so it is
forbidden to go upstairs.
 B. People can choose to use either
elevator or stairs to go upstairs.
 C. As soon as the problem gets fixed,
the elevator will be used again.
 A. Two adults and a child will pay £34.
 B. A group of 9 people will pay £80.
 C. You cannot buy tickets using cash.
209
3. Body parts
3
Body parts
Head
Shoulder
Neck
Arm
Chest
Elbow
Wrist
Forearm
Thumb
Finger
Back
Hand
Stomach
Hip
Thigh
Knee
Leg
Calf
Ankle
Foot
Toe
Hair
Forehead
Eyebrow
Eye
Ear
Temple
Nose
Nostril
Teeth
Tongue
Lip
Cheek
Mouth
210 13. Safety
MATCHING
– IDIOMS
1. There are many idioms in the English language that refer to body parts. Let’s take a
closer look! Match each idiom with its definition.
1.

Cross your fingers
A. Something is very expensive.
2.

My lips are sealed
B. To cry very hard about
something or someone.
3.

Bite your tongue
C. To ignore someone.
4.

Play it by ear
5.

Cost an arm and a leg
6.

Cry your heart out
7.

A sight for sore eyes
8.

Break a leg
9.

Cold feet
D. To be happy to see someone.
E. To wish someone good luck.
F. To have second thoughts
about something.
G. You are keeping a secret.
H. To hope for a positive result
or outcome.
I.
To do something without
preparing for it.
J. To force yourself not to say
something.
10.  Give the cold shoulder
Adapted from examples.yourdictionary.com
PET
Listening – Part 1
83
2. For each question, choose the correct answer.
1.



You will hear a man and a woman talking. Where are they?
A. In a pharmacy.
B. To the doctor’s.
C. In a shopping centre.
2. You will two friends talking about a house move. What’s the trouble with one of them?
 A. The house doesn’t have any lift.
 B. His back hurts.
 C. He has a lot of new boxes and furniture.
3. You will hear a woman and her daughter talking. The mother is afraid that
 A. her daughter might be ill.
 B. her daughter won’t finish her work at the PC on time.
 C. her daughter won’t have a break to take eye drops.
4. You will hear two friends talking. Are they OK?
 A. No, they are both shivering and with headache.
 B. No, they are going to be checked by the doctor.
 C. No, one of them may have a temperature.
5. You will hear two friends talking about Tom. What does Tom have to do?
 A. He has to go on holiday with a broken foot.
 B. He has to keep a plaster cast for more than a month.
 C. He has to pay attention to his left foot.
211
3. Body parts
SPEAKING
– CLASS DEBATE
3. Read the following quotes dealing with safety and discuss them with your classmates
(in pairs or small groups). Do you agree with them? Why/Why not? Do you think they
are effective? Why/Why not? Which is the best one in your opinion and why?
[
PET
1. ‘You don’t need to know the whole alphabet of Safety. The A, B, C
of it will save you if you follow it: Always Be Careful.’
(Colorado School of Mines Magazine)
2. ‘Carefulness costs you nothing. Carelessness may cost you your life.’
(Safety saying, early 1900s)
3. ‘Prepare and prevent, don’t repair and repent.’ (Author Unknown)
4. ‘Working safely may get old, but so do those who practice it.’
(Author Unknown)
5. ‘Safety is something that happens between your ears, not something
you hold in your hands.’ (Jeff Cooper)
6. ‘Better a thousand times careful than once dead.’ (Proverb)
7. ‘Safety doesn’t happen by accident.’ (Author Unknown)
8. ‘Work injuries and illnesses can affect every aspect of life for
workers and their families.’ (Maine Department of Labor)
9. ‘You are your last line of defence in safety. It boils down to you.’
(Kina Repp)
]
Writing – Part 2
4. Write an article for the school magazine about the following subject.
Write your answer in about 100 words.
HOW IMPORTANT IS SAFETY AT SCHOOL AND AT HOME?
Make examples from your own experience and motivate your ideas.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
MIND MAP
Safety
signs
They give
information
and protect
from possible
dangers
Work
safety tips
Reducing risks
of injury and
illnesses at
work is a goal
for everyone
• Warning signs
• Prohibition signs
• Mandatory signs
• Emergency and
rescue signs
• Information signs
SAFETY
• Know the risks
• Reduce workplace
stress
• Take regular breaks
• No twisting
• Use mechanical aids
• Protect your back
• Wear protective
equipment
• Stay sober
• Talk over any distress
• Know your rights
213
MOVIES AND MORE
Safety with a Smile: Napo’s Movies
As you can read on its site (www.napofilm.net) ‘Napo is an original idea conceived
by a small group of OSH (Occupational Safety and Health) communications
professionals in response to the need for high quality information products to break
down national boundaries and address the diverse cultures, languages and practical
needs of people at work.’
Napo’s movies are short, humorous and speechless. We can hear only sounds as
we watch the story develop. This does not mean that Napo’s movies are meant for
a children’s audience, though. On the contrary, they deal with many important
issues of safety at the workplace.
Napo Is… Teleworking to Stop the Pandemic
In this movie, Napo is working from home in order to prevent the spread of Covid19. Watch it and note down all the bad habits he shows and explain how he should
behave to ensure safety at work… even while smart working!
CLIL
ICT / History
1. Each Napo film is co-produced by a number of European Institutions. Browse the
Net to look for information about the European Union. Prepare a brief account or a
PPT about the origins and development of EU.
CLIL
Citizenship / Law / History
2. In June 2016, UK citizens voted in a referendum to choose whether to leave or
remain in the European Union. What happened next?
What is a referendum? Can you recall a famous referendum that was held in Italy
after the end of WW2?
APPENDIX
Inquadra il QR Code
per altri
approfondimenti!
1. Marina Vriz
84
I was born, blind, in a small town in the North-East of Italy. My family, and
in particular my father, helped me to have a ‘completely normal’ life. I
attended nursery school like all the children of my age, and I could play
with them, run, and draw with pencils… Some of these people are still my
friends! I can define that period as one of the most beautiful in my life.
I spent elementary and lower secondary school in an institute for the
blind, in Trieste. I learned to write and read (in Braille) very quickly,
because I always asked my aunt to read everything to me as I’ve
always been hugely curious about everything around me.
Those years were very difficult because I always missed my family
and the freedom I had at home. On the other hand, my teachers
taught me a lot, in particular the ability to live like everyone else.
Later on, I attended a classical lyceum in Bologna. I studied in a
public school, but I lived in an institute for blind people where I did
my homework. I was very novel in my way of studying: I used a
typewriter to write up my documents and a tape recorder to record
the material my assistants had given me.
At university (I studied Philosophy in Bologna), I didn’t change my way of
studying, even if I often prepared for my exams with some friends who
studied the same subjects.
This was a wonderful period in my life as I met a lot of people and I was
able to steer my life in the direction that I am still involved in today. The
first step was agreeing to attend an experimental course for blind system
programming. It seemed a very strange thing to me, because my dream
had always been to be a teacher, and this course didn’t give me this
option. However, I decided to take part in it because having a job was very
important to me, and teaching didn’t look too easy. Another fundamental
step was the use of OpTaCon, a device that allows blind people to read
any kind of material – which is not hand-written – as well as a computer
screen. It is not a scanner, nor is it a Braille converter, and I’d love to
insert an image of it to give you an idea of what it is. Anyway, it changed
my life completely, even if it is difficult to learn how to use it. In fact,
for the first time in my life I was able to go to a bookshop, buy
a book and read it immediately, without help or mediation. I
had added another piece to my autonomy puzzle!
The course I attended during my last year at
university had been organised by a trade union in
Florence. A blind man, Antonio Quatraro, had
seen blind system programmers during a trip out
of Italy, and wanted to give the same opportunity
to blind people in Italy. There were 20 people
when it started and only 5 when it finished. We
learned two programming languages, COBOL and
FORTRAN, plus programming logic and structure.
Marina Vriz (1953)
Vocational training &
Assistive Technology
at Fondazione ASPHI
Fondazione ASPHI
Bologna, Italia
215
1. Marina Vriz
During the course, we tried to get in
touch with the most important
companies in Bologna and Florence
working in information technology to
ask them for help in preparing the
exercises that our teachers gave us.
IBM invited us to learn to punch cards
in order to allow us to write our
programs.
During the days of IBM meetings, we
had the opportunity to speak with Giovanni Zanichelli, an IBM
manager. He had faith in our project and, after the normal tests and interviews, two of
us (Pierino Bianco and I) were hired by this big company.
I cannot describe what I felt at that time. I had a job, a good job; OK, not as a teacher,
but a high quality job, and in addition, I could show other people that a blind person
could do that job and, perhaps, give them the same opportunity I had had!
After some months, when our experience was regarded as a very positive one,
Giovanni Zanichelli created ASPHI, an association of companies that believed in
giving blind people new employment opportunities.
For 12 years I had a standard job, there were no differences with my colleagues, and
we experienced ups and downs, like everybody. I always used my wonderful
OpTaCon, which allowed me to read the dumps of the programs, the punched cards,
and, later, terminal and PC screens.
After that, IBM assigned me to ASPHI. The job I had was related to the aids available
in Italy for all kinds of disabilities, which in that period were starting to pop up.
It is impossible to describe all the aids I encountered. What I can say, however, is that
I had the opportunity to see all the changes in this field, and understand the huge
importance that technology had and has for me and for all people with disabilities.
At the beginning of my life, I dreamed of being a teacher; now, I can say that my
dream has been realised: I teach assistive technology to blind people.
Finally, I want to tell you a sentence which is an abstract of my thoughts, written by an
IBM development centre.
‘Technology makes things easier for all people, for some it makes them possible.’
For detailed information, please look for the evolution of screen readers, Braille
displays and voice synthesizers. OpTaCon is not for sale yet.
216 Appendix
READING COMPREHENSION
1. After reading the passage, find a suitable title, as if it were the headline for a newspaper
article.
………………………………………………………………………………………………………
READING COMPREHENSION
2. Read the passage and answer the following questions.
1. What is this passage about? ……………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
2. What kind of education did Marina Vriz have? …………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
3. What was her ‘dream job’ as a young girl? ……………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
4. Which device did she find very useful to gain autonomy and why?
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
5. What was the turning point in her career within IBM and why?
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
PET
Writing – Part 3
3. In the conclusion of the passage you have just read, Marina Vriz writes that
‘Technology makes things easier for all people, for some it makes them possible’.
Write a short paragraph about this statement (about 100 words), expressing your
opinion and give reasons for your ideas.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
………………………………………………………………………………………………………
217
2. MUSA
2. MUSA
85
Due to the thriving tourist industry along the
coast of Emilia-Romagna, people generally
associate Romagna with summer holidays.
This well-known tourist hub offers an
impressive variety of tourist attractions, ranging
from basic seaside experiences to exciting
nightlife.
Moreover, the proximity to famous historical
and art towns makes Romagna the perfect
holiday destination for tourists wishing to visit
the beautiful Byzantine mosaics of Ravenna.
Technology plays an important role as well.
The town of Alfonsine, in the province of
Ravenna, is where MUSA is located. This
company embodies the passion for technology
– ranging from engines to electronics – shared
by the inhabitants of this region.
MUSA was founded at the end of 1997 by a
team of highly specialised engineers with the
mission of creating customised automation
systems. The company holds various patents
relating to automation machinery.
In 1998 MUSA developed further and began
specialising in vision systems that use cameras
and lasers for defect detection. All the solutions
are based on technologies that avoid contact with
the products that are being tested or measured.
The company is currently developing vision and
measurement systems for quality testing aimed
at various industrial sectors.
Vision System for Quality of Wood Processing
This is strategic research aimed at measuring the
dimensions of processed wooden panels. The
development of this vision system started some
years ago and it is currently being worked on.
The detection of flaws in the manufacturing lines
of wood processing is in high demand by
customers, which are mainly specialised in the
furniture sector. In order to ensure quality after
wood boring or edging, these companies rely on
skilled operators to carry out quality checks that
can prove stressful; the workers’ personal
evaluation is also considered.
Measuring Systems
These systems, which are ideal for real-time control as pieces exit working centres, use lasers
and video cameras for the measurement of pieces as they move along the production line
without the need for an operator or machines to be in contact with the pieces themselves.
It is possible to immediately signal all the pieces that are non-standard, or the breakage
of tools.
It offers excellent results in terms of precision to velocity ratios.
WOOD SCAN - Industrial Scanner for the Control of Drilling and Linear Milling
Operations
Wood Scan is an innovative industrial measuring scanner that can certify drilling quality
(in samples) during production and verify the measures listed below:
• dimensions and coordinates of drilling holes and linear millings;
• out of square;
• straightness of the sides;
• depth of the holes and millings.
Video and printed data is equipped with a series of graphical indicators that help the
operator’s job. It is possible to save the tests done and make them available in the office
through the network. It can receive the drilling program from the Factory ERP software
(Enterprise Resource Planning) or directly from the driller’s CNC to check the plan against
the actual work.
DRILL SCAN - Panel Drilling Verification
The system is connected to a roller at the exit of the drilling area. In its simplest form it can
find the holes on both surfaces of the panel while checking for accuracy with the selected
drilling program.
In case of missing holes, caused for example by a broken drill bit, the piece can be marked as
defective and signalled out by the PLC to be discarded if required or marked for recognition.
In its most advanced form, Drill Scan can measure the panel and find the coordinates and the
diameters of the holes.
The precision varies according to the speed of the process (5-10 m/min.).
It has a built-in statistics program that provides the situation of all drilling operations in real
time, with measurement data, date, hour and other information that can be entered by the
operator.
Automated Packaging Systems
The food sector has been the core business of this company for many years, which is why
automated packaging systems originate from the needs of clients working in the food sector
to integrate their machinery range with the production of packaging and weighing machines.
Over the last few years, MUSA has reached enormous heights in terms of performance and
international recognition in the field of food sizers. Therefore, it was necessary to develop
integrated, high-performance packaging systems to ensure maximum precision in fruit
weighing and a fast operating time. In short, a high-level automated system that ensures
recurring and accurate operating time. It is also equipped with a CCTV camera, metal
detector or X-Ray for a thorough control of both packaging and products.
219
2. MUSA
Some of the practical applications of such vision systems are:
• Vision system for
fruit quality tests.
The new image-scan
techniques that are
available nowadays allow a
thorough control of
different types of fruit and
therefore the detection of
defects and discarding of
unfit products.
• Vision system for egg packaging lines.
This application works on egg packaging lines, regardless
of production rates. Thanks to smart video cameras, the
system checks that the packaging date is printed on each
egg. Furthermore, it ensures packaging quality and the
compliance of the data printed on each set of packaged
eggs. A line supervisor who is in charge of reporting any
faults or malfunction monitors the whole process.
• System for in-line and off-line
quality checks for mechanical
manufacturing.
This system consists of a machine being
integrated with the production line and
performing quality tests on the processing
of different materials (mainly metals but it
can apply to different materials as well,
such as wood, plastics etc.). It employs
sets of sensors (e.g. lasers, vision systems
etc.) whose information is processed to
maximise the system’s diagnostic abilities.
This system is extremely flexible, both as
regards the different kinds of materials it
works with and as to the geometric shape
of the pieces to analyse. It also shows
great flexibility as it can be used during
the line manufacturing process at the
same speed as the manufacturing process
itself. Should the latter be too fast, it is
possible to work off-line on samples of
the processed materials in a completely
automated way.
220 Appendix
READING COMPREHENSION
1. Read the passage and answer the following questions.
1. When and where was MUSA founded? …………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
2. What kind of systems does this company develop? ……………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
3. Is its core business in the food industry only?……………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
4. List some of the systems this company develops. ………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
5. What are the practical applications of automated packaging systems mentioned in the
passage?
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
READING COMPREHENSION
2. Match the beginning of each sentence with the correct ending.
1.
 In Ravenna, tourists may
visit
2.
3.
 Measuring systems use
 Drill Scan checks
manufactured wooden
pieces and if there are
flaws
4.
 Most companies working
in the food sector needed
to integrate
5.
 In vision systems for egg
packaging lines,
A. the piece can be marked as
defective and signalled out by the
PLC to be discarded if required or
marked for recognition.
B. a line supervisor monitors the whole
process and is in charge of
reporting any faults or malfunction.
C. laser and video cameras for the
measurement of pieces.
D. their machinery range with the
production of packaging and
weighing machines.
E. the beautiful Byzantine mosaics.
VOCABULARY
3. Scan the passage and look for the English translation of the following words and
sentences.
1. Fiorente ……………………………………
7. Profondità …………………………………
2. Ad alta specializzazione …………………
8. Difettoso ……………………………………
………………………………………………
9. Nucleo fondante …………………………
3. Sistemi di misura …………………………
10. Tempo di esecuzione ……………………
4. Difetti ………………………………………
11. Malfunzionamento ………………………
5. Controlli di qualità…………………………
12. Le capacità diagnostiche del sistema
6. Rottura ……………………………………
………………………………………………
221
3. ‘Doctor, Doctor, I’ve got Backache.’
3. ‘Doctor, Doctor, I’ve got Backache.’
Dr. Alessandro Gasbarrini
WARM-UP
1. Before you read, work with a partner and answer the following questions.
• Look at the title and say what you think the article is about.
• What would you say to someone who has backache? What advice would you give?
• What other aches and pains can you list in English?
• What do you know about 3D-printing and its current uses?
Anyone who works in back surgery hears these words
hundreds of times a day. ‘Backache’, or to use the more
specific medical terms – ‘lumbago’ if the pain is situated
around the lower spine and ‘dorsalgia’ if the pain affects the
upper back – is in fact a very common condition which is
thought to affect 80% of the population at least once in
a lifetime.
Nonetheless, for a small proportion of patients
backache is the symptom of a serious medical
condition, such as an infection or tumour;
this needs to be taken into
consideration when combined with
unusual symptoms or in high-risk
patients.
There’s no reason to panic
though; primitive tumours, that is,
cancer in the vertebra – the
backbone – are very rare: they
only make up about 10% of all
bone cancers, which in turn
constitute just 0.2% of all types of cancer.
In those rare cases, however, medical experts need to
assess the patient’s symptoms, the X-rays and the result
of pathology tests; making a diagnosis can be difficult. A
biopsy is usually necessary, a medical procedure where
sample tissue is removed from the patient and then examined by pathologists
under a microscope.
Treatment of some vertebral cancers includes a delicate surgical operation in
which the whole tumour is removed together with the vertebra where it
originated. Not only is this a demanding operation for the surgeon, who has
to deal with complex anatomical structures such as bone marrow, nerves and
crucial blood vessels such as the aorta or venae cavae, but it is also a lengthy
procedure lasting up to 12 hours.
After removing the tumour, the surgeon needs to reconstruct the vertebral
sequence so as to restore its function as the foundation for the erect thoracic
posture of the patient. Unfortunately, unlike operations on limbs and joints
– which prostheses can replace – the spine cannot regain its full movement,
which is lost along with the vertebra removed during the operation.
Currently several different materials are used in prosthetics to reconstruct the
human backbone; they are bone, either from the patients themselves or from
a donor, medical cement, titanium, and carbon. 3D-printing is one innovative
technique used to produce vertebral prosthetics. Models are designed on the
computer and can then be created in titanium.
86
222 Appendix
In this line of medicine, the design of the prosthetic
spine is decided by looking at the tests from before
the operation, after which surgeons decide which
vertebra will be removed and thus which part of the
backbone will need to be reconstructed. Engineers
work alongside medical staff to create a prosthetic
spine which will fit the patient perfectly, made to
measure, just like a tailored suit.
What makes 3D-printing special is that the final
product is not made from a block of titanium that is
gradually moulded into shape, but it is created from
powder whereby the titanium granules are fused
together layer by layer. This particular type of
moulding, called additive manufacturing, creates
much finer detail than traditional methods. This
means that the prosthetic spine, once it has been
implanted into the patient, can be colonized by
mesenchymal stem cells in a more suitable
environment and so differentiate into cells which can
grow new bone.
In this way the reconstruction is complete: new,
‘healthy’ bone is formed where ‘diseased’ bone has
been removed. So far this technique has been used
in just 14 cases; they are being closely monitored,
but for the moment the results look very promising.
Until there are more solid statistics to support this
innovative technique, the widespread use of
3D-printing in orthopaedic surgery is perhaps a few
years off. However, engineering and medicine have
recently made great leaps forward in this area, so
soon we will surely be astounded by the rapid
advances in reconstructive surgery. No longer will it
be the patient who has to adapt to mass-produced
implants, each prosthesis will instead be tailor-made
for the individual.
Alessandro Gasbarrini MD
Spine Surgery Oncologic and Degenerative
Rizzoli Orthopaedic Institute – Bologna – Italy
President of Probone Italia Onlus
No Profit Foundation
http://www.ior.it/en/curarsi-al-rizzoli/
alessandro-gasbarrini-md
223
3. ‘Doctor, Doctor, I’ve got Backache.’
VOCABULARY
2. Match each word or expression with the correct definition.
1.
2.
3.
4.
5.
6.




Backbone


Prosthetics (mass noun)
E. A soft fatty substance in the cavities of bones.
Tailor-made (adj.)
F. An artificial body part.
Bone marrow
Demanding (adj.)
Prosthesis
(pl. prostheses)
PET
A. Made, adapted, or suited for a particular
purpose or person.
B. The spinal column.
C. The branch of surgery concerned with
the making and fitting of artificial body parts.
D. Requiring much skill or effort.
Reading – Part 3
3. Read the passage and decide if the following statements are true (T) or false (F).
1. 3D-printing has been used in more than 14 cases.
2. Backache is not a very common condition.
3. In the treatment of spinal cancer, the surgeon has to remove
the affected vertebra along with the tumour.
4. Bone cancer represents 10% of all types of cancer.
5. Backache is not normally a symptom of a serious conditon.
6. It is usually straightforward for doctors to diagnose vertebral cancer.
T


F










READING COMPREHENSION
4. Answer the following questions.
1. What makes 3D-printing special? …………………………………………………………………
…………………………………………………………………………………………………………
2. How is orthopaedic spinal surgery different from operating on limbs and joints?
…………………………………………………………………………………………………………
3. What different materials are currently used in orthopaedic prosthetics?
…………………………………………………………………………………………………………
4. Why will it take several years for 3D-printing to be used more widely in orthopaedic
surgery?
…………………………………………………………………………………………………………
5. Which complex anatomical structures does the surgeon have to deal with in vertebral
surgery?
…………………………………………………………………………………………………………
6. What is the specific term for the kind of moulding produced with 3D-printing?
…………………………………………………………………………………………………………
SPEAKING
- PAIR WORK
5. Work with a partner and answer the following questions.
• What further applications can you think of for 3D-printing?
• Would you buy a 3D-printer and what would you use it for?
• How would you feel if you needed back surgery?
• What would you say to a friend who is about to undergo back surgery?
224 Appendix
WARM-UP
1. Before reading, discuss the following questions.
1. Can technology be helpful to solve practical, everyday problems? Give examples from your
own personal experience.
2. Have you ever helped an older member of your family to use an app or solve a technology
problem? Tell your classmates about it.
3. Do you think that the ability to operate in digital environments is different for people who are
older than you? How about the elderly? Give reasons for your answers.
4. In your opinion, is teaching adults and elderly people easier or more difficult than teaching
people of your age and why?
5. Have a look at the headline of the following article. Can you infer what the article will be about?
4. CNA Pensionati with the
Aldini Valeriani Institute
Is Focusing on Digital, Narrowing
the Gap, Transmitting Knowledge,
and Encouraging the
Generation-to-Generation Handover
87
Digital education on-line school: 24 over-70-year-old
virtual ‘students’ enrolled in a course organised by CNA
Pensionati Bologna, with 24 boys and girls from the
third, fourth and fifth year students of the Computer
Science Course at the Aldini Valeriani Institute in the
classroom.
Young people teaching seniors is a generational swap
that has now become a good practice for CNA
Pensionati, particularly since the beginning of the
pandemic which forced us to keep our distance and
which required a great deal of practical knowledge in
the use of digital tools, from smartphones to tablets to
personal computers.
The CNA Pensionati Bologna online digital education
course was organised from March to May 2021 with
actual individual lessons in which each student from
Aldini ‘adopted’ his or her pensioner, showing them all
the online secrets of digital technology, from websites
to social networks to apps. The lessons focused on the
uses that have become fundamental, even for
pensioners: how to do video calls with friends and relatives who can no longer be
contacted in person, how to order goods and services online, how to connect using
Spid to the entire universe of the digital public administration starting with the
Electronic Health File.
In addition to the one-to-one lessons, two thematic webinars were also held, again
on digital topics: one on ‘Online scams’, on the dangers and traps when surfing the
Internet and social networks, and one on ‘Online banking’, with the contribution of
Bcc Felsinea bank, as online actions between customer and credit institutions are
becoming a necessity and a habit for pensioners and their banks too.
The CNA Pensionati course quickly ‘sold out’, with dozens of other people
contacting the pensioners’ association to enquire to take part in the two courses,
which ended with over 45 pensioners participating.
The course, before its online versions, had
been held in the pre-Covid years in the
classrooms of the Aldini Valeriani Institute, but
with the same philosophy: the young digital
expert passing on his or her knowledge to
seniors not wanting to be excluded from an
increasingly digital-oriented society.
‘The objective is the same as the one which
our association has been committed to’,
explains Marisa Raffa, CNA Pensionati
Bologna Secretary. ‘To encourage the
inclusion of pensioners, to avoid them
becoming isolated. Even in recent years it has
been a prominent topic, but with the
pandemic it has become crucial for the elderly:
forced to distance themselves, CNA
Pensionati instead wants to shorten distances.
And a distance which today is very difficult for
the not so young, may be the digital one.
These people are cut off from
communications and digital opportunities,
which are numerous for pensioners too’.
The issue of the generation-to-generation
handover is also a prominent one at CNA: if
the one with the Aldini students has a ‘digital’
flavour, the one that takes place in the families
of entrepreneurs is decidedly more
organisational. A representative case is that of
entrepreneur Sandro Vanelli, a long-time
CNA Bologna executive and president of CNA
Pensionati Bologna for eight years. His auto
body shop in Casalecchio, which he founded,
was ‘passed on’ to his daughter Elisa and his
former employees, who all became partners in
the new company. The same story applies to
the current President of CNA Pensionati
Mauro Taddia, a long-time hairdresser in
Castel Maggiore, who, after retiring from the
business, passed it on to his son Thomas.
Digital, inclusion, generation-to-generation
handover. These are the issues at the heart of
CNA Pensionati Bologna activities, shared
with the Aldini Valeriani Institute students and
teachers. Central issues for the future of all
pensioners and entrepreneurs, and not only in
Bologna.
READING COMPREHENSION
2. Answer the following questions.
1.
2.
3.
4.
5.
6.
7.
How many students took part in each digital course and how old were they on average?
Who organised the online course and who were the ‘teachers’?
What was the online course about and when did it take place?
Give examples of some skills the students had gained by the end of the course.
How many webinars were organised and what were they about?
What was the purpose of the course, according to the CNA Pensionati Bologna Secretary?
‘Digital, inclusion, generation-to-generation handover’ are the core issues of this
organisation. Do you think they are important to you? Would you like to take part in a
similar activity as the one you have read about? Give reasons for your answers.
226 Appendix
5. QubicaAMF
88
WARM-UP
1. Before reading, discuss the following questions.
1.
2.
3.
4.
Have you ever played ten-pin bowling? Tell about this experience in a few words.
Can you list some of the rules of this game?
How would you describe a bowling centre to a friend who has never been there? Give details.
In your opinion, does this game require cutting-edge technological equipment and
appliances? If so, what for? Make examples.
Everybody knows what ten-pin bowling is – it’s when you throw
a ball down a long wooden lane and try to knock over ten
bowling pins. Maybe you have played and tried to score a
‘strike’ or a ‘spare’ by either hitting all ten pins with your
first throw or doing it in two throws.
However, not everybody knows how much technology
there is behind a simple game of bowling, and how much
more is needed to attract and satisfy the customers of a
modern bowling centre, especially in continuously evolving
and demanding markets.
Bowling has been steadily transforming itself from a
competitive sport into a recreational pastime over the last decade.
Bowling centres, which were once a bit gloomy and too focused on
competitions, have now been redefined in many different ways to meet the
expectations of new customers that choose bowling to spend a couple of
hours of fun with friends and family.
The traditional bowling centre has now become a focal point for leisure
activities. In various countries this revolution has led to bowling lanes being
placed side by side with other games like laser tag, escape rooms and virtual
reality stations. Many modern bowling centres now include restaurants and
lounge bars. The overall atmosphere is also enhanced by using video
projectors and the light effects and music coming from the lanes.
The evolution of bowling has clearly been supported by a series of
technological advances and the companies that have developed the solutions
needed by this particular sector.
Electronic hardware and computer software were initially used in bowling to
automate the game in the lanes and support the management of
competitions. The first automatic pin-counting systems used a camera
between the lanes to count the fallen pins, while the computerised
management system was dedicated to automatically generating tournament
and league standings.
Nowadays, bowling games involve sophisticated computer animations and an
integrated management of sound, light and video effects in the lane. Other
lighting systems track the path of the bowling ball and enrich the atmosphere
in the centre with dynamic light effects that are synchronised with the action
in the lanes. New rules have also been introduced that simplify the game and
make it easier for beginners to play and enjoy the bowling experience.
Strategic reasoning and the ability to throw the ball in time with the light
effects in the lanes now replace the importance of the players’
GLOSSARY
bowling technique.
There has also been a revolution with the pinspotters that are
pin: birillo
steadily: costantemente,
responsible for managing the bowling pins and returning the balls
regolarmente
back to the bowler.
227
5. QubicaAMF
They have gone from complicated, essentially
mechanical, machines with motors and gears,
into complex devices where the software,
electronic and mechanical parts are fully
integrated, complete with self-diagnosing
systems capable of warning the bowling
centres’ operators when there are problems
and supporting the maintenance staff through
a smartphone app equipped with audio-visual
tutorials.
The management system used by bowling
centres has also been improved and extended
in order to provide all the features required by
the centres’ operators, allowing them to
provide a wide range of services to their final
customers.
For instance, in some countries it is now very
common for customers to book games of
bowling directly via the Web or a dedicated
smartphone app, as it lets the customer reserve
a block of adjacent lanes on which they can
organise a bowling night with friends, a family
birthday party and even an informal
tournament with work colleagues.
This description of the modern world of
bowling may seem strange to most Italians.
For this reason, you will certainly be amazed to
learn that the company which develops the
software and hardware that is used by the
majority of bowling centres around the world is
actually based in Italy! In fact, it is the largest
and most sophisticated company in bowling
with a strong attention to detail for the most
ambitious bowling centres that focus on
technology and customer experience.
The company was founded in 1993 by three
young and motivated engineers who decided to
realise bowling products with a focus on
delivering the most enjoyable experience for
the players and providing the best product
value, in terms of quality and reliability, to the
bowling centre proprietors. What began as a
startup has rapidly grown into a multinational
company with over 600 employees, R&D and
manufacturing sites in both Italy and the USA;
the undisputed market leader worldwide due to
its ability to develop innovative technological
and bowling entertainment solutions for its
customers.
The Bologna headquarters is the operating
holding company of the QubicaAMF group.
The management team in Bologna is
responsible for the overall business direction of
the group, including managing its subsidiaries
and operating functions worldwide.
QubicaAMF’s products have been installed
in thousands of bowling centres across
120 countries and 5 continents.
The innovation of QubicaAMF’s very broad
product line, which extends from mechanical
products to cloud-based services, is managed by
the Research and Development group located
in Italy and the US. The Italian team, in
collaboration with its American colleagues,
ideates and designs all the electronic and
electromechanical components and all the
software running the various products and
services.
GLOSSARY
tournament: torneo, gara
R&D (Research &
Development): ricerca
e sviluppo
The Italian R&D team has around 40 team members that are experts in various
areas of Software and Electronic Engineering, and it is actively engaged in
long-term collaborations with external partners. The team designs and develops
electronic boards, firmware for embedded systems; drivers and graphics libraries
for Linux-based systems on ARM and Intel-based architectures; 3D animations,
games and light shows to entertain the bowlers; client-server applications on
Windows networks to manage the entire activity of the bowling centre; web and
mobile applications dedicated to bowlers and bowling centre managers; and
cloud-based systems to monitor, upgrade and configure remotely their systems
installed around the world and provide value-added services to our customers
and our internal teams.
Managing this complexity requires the mastery of a broad range of competencies
such as electronic, firmware, software, networks, IT systems, project
management, agile development methods, UI/UX design, automated testing and
deployment, documentation and translations.
Technical skills are also needed outside of R&D: the IT team, focused on the
internal information system and enterprise applications, is made up of system
administrators, help-desk experts, ERP experts and BI experts, and so on;
employees in the production, installation, training, repair and technical support
teams typically need a strong technical background and a passion for technology.
Some roles often require a specialist degree in Engineering or Computer Science,
while for other roles in R&D and the other technical departments, a high-school
diploma from a technical institute is the usual minimum requirement.
READING COMPREHENSION
2. After reading, answer the questions below.
1. To what extent has the game of bowling been changing over the last few years?
2. In what way were electronic hardware and computer software initially employed
in bowling centres?
3. How has the role of computer software and electronic hardware evolved in
modern-day bowling centres?
4. How many members are there in the Italian R&D team of QubicaAMF and what
are they specialised into?
5. List some of the competences and skills required by the team. Which ones are
the most relevant, in your opinion? Give reasons for your choice.
229
6. A Squiseat APPetite!
WARM-UP
1. Before reading, discuss the following questions.
1. How many apps can you think of in one minute?
2. Give examples of three apps you normally use and explain what they are for.
3. What do you know about the Sustainable Development Goals (SDG) 2030 Agenda? Can
you remember at least two goals?
4. Can technology help reduce food waste, in your opinion? Give reasons for your answers.
5. Have a look at the headline of the article. Can you infer what the article will be about?
6. A Squiseat APPetite!
89
E
1. ………………
My name is Luca Morosini and I am one of the
co-founders of Squiseat. I was born in 1996 in
Bologna and I had a very peaceful childhood in
the nearby town of Castel Maggiore. Every day
after school I used to spend time with my
grandmother, who introduced me first to the
art of fine cuisine. I have always been
interested in the pasta-making process and
thanks to my grandmother I slowly started to
fall in love with the culinary world.
2. ………………
I attended Aldini Valeriani High School in Bologna
studying ICT (Information Communication
Technology) because since I was a child, I have always
loved computer games and technology in general. I thought
this was the right choice for me.
After graduating high school in 2015, I attended the Faculty of Computer
Science at the University of Bologna. There, I met some incredible people,
who really taught me a lot about digital programming. I knew I was
enriching my knowledge, though I truly wanted to put theory into practice.
3. ………………
During my university years I met the other co-founders of Squiseat:
Alberto Drusiani, who was working at that time as a waiter for a living;
Ossama Gana, who was trying to match his passion for finance with the
one for technology; and Gabriele Calarota, who really wanted to show
that technology can be used for good as well. We became friends and
started studying together.
4. ………………
Once we all graduated University in March 2019, we decided that it was
finally time to put theory into practice and start a project. We really
wanted to get out there and give our best. One night sitting in a pub,
Alberto told us that waiters have the sad duty to throw away clients’
leftovers, and you will never guess how much food is wasted on a daily
basis. That was it. Since we all share a huge passion for food and we are
deeply sensitive to the issue of food waste, we thought that was the right
moment to act.
230 Appendix
5. ………………
The United Nations General Assembly set
up in 2015 a list of 17 interlinked global
goals under the acronym SDGs, that
were drawn up to be a ‘blueprint to
achieve a better and more sustainable
future for all’. These goals are intended to
be achieved by the year 2030. Squiseat
fits into the second goal (Zero Hunger)
and the twelfth one (Responsible Consumption and Production).
6. ………………
We took part in Start-up Day 2019, a one-day event held every year by the
University of Bologna that brings together thousands of people involved in the
world of innovation and start-ups. We got selected by the jury!
We first created a chat group on WhatsApp with very few people and a
restaurant: the owner of the restaurant told us how many food portions he had
left and we communicated it to our clients, writing down the orders on a sheet
of paper. We then personally provided the delivery service, driving our scooters
through the streets of Bologna.
7. ………………
Our popularity grew very quickly and we realised it was time to switch platform
and start using Telegram. This IM software allowed us to have an unlimited
chat group and to create a bot, which basically worked as a digital waiter.
When checking the availability, the client interacted directly with our personal
bot, allowing us to concentrate on the organisation and software developing.
(Left to right) Alberto Drusiani, Ossama Gana, Gabriele Calarota and Luca Morosini
231
6. A Squiseat APPetite!
We split our tasks so that we could enhance the start-up from any
point of view. Gabriele and I started working on the software and we
eventually ended up outlining a full-fledged app. Ossama was in
charge of the financial aspect and Alberto worked as our
spokesperson, dealing with interviews and new contacts with potential
restaurants and spaces.
We developed a hybrid app so that we could use JavaScript and its
third-party libraries without the need of native languages, required by
both Android and iOS. In our specific case we ended up using React
since it is the most commonly used JavaScript library. In late 2020
our logo was finally ready. The smiling red apple became Squiseat’s
facet and appeared on the website I personally created and designed.
8. ………………
Covid-19 was a real blow for us and for the food segment in general.
A lot of restaurants closed, we had to stop the delivery service and our
trend decreased significantly. We then decided to let the restaurant use
our Telegram bot for free. In doing so, we tried to help the local
businesses facing this hard economic crisis and we received a very big
support in exchange.
On March 22, 2021, we released our app on Google Store and
Apple Store and increased the number of affiliated restaurants. Our
app got downloaded by more than 2,000 people in two months, our
followers exponentially increased on social media and we expanded
our team. We were lucky enough to find a well organised group of
people who are truly committed to this cause.
9. ………………
We now hope to raise awareness on the food waste problem and help
owners and clients to considerably reduce it. We do as well want to
reintroduce the delivery service in a transparent way, meaning that we
do not want to take advantage of the riders and hide their social and
economic conditions. Let’s fight food waste, meal after meal!
READING COMPREHENSION
2. After reading, match the headings to the paragraphs. There are two headings you do
not need to use. The first one has been done for you.
A. Future plans for a better
future
F. How it all started
G. A closer look
B. Irreconcilable differences
H. Making friends
C. First steps in business
I. Every cloud has a silver lining
D. Organisation & Management
J. Education and Training
E. Something about me
K. Important shared goals
232 Appendix
7. Women in ICT
90
…see more!
Introduction
Much attention is currently being paid to issues of gender inequality in computing and
tech industries. Women’s contributions have been huge, yet many of their stories
remain untold. It is crucial to put these contributions back at the centre of our shared
history. The stories told here merely scratch the surface of women’s tech history but if
a single person is inspired by them, they have served their purpose.
There have been pioneering women whose contribution to the computing industry was
undeniably formative but whose stories have often been written out by a focus on the
‘great men’ that have been involved.
Many women have contributed to the development, use and application of computers.
You will now read about some of their stories and careers.
Katherine Burr Blodgett
(1898-1979)
Mary Kenneth Keller
(1913-1985)
Grace Hopper
(1906-1992)
1. KATHERINE BURR BLODGETT
Thelma Estrin
(1924-2014)
Kathleen Booth
(1922)
Stephanie Shirley
(1933)
91
Katherine Burr Blodgett was born in New York.
She was mathematically talented and became
the first woman to earn a PhD in physics from
the University of Cambridge in 1926.
When she went back to New York, she began
working at General Electric alongside Nobel
Prize winner Irving Langmuir. Katherine went
on to become a pioneer in surface chemistry
and was the first to realise that layers of
one-molecule-thick films could be coated on
surfaces like glass to increase the amount of
light passing through it. Thanks to this brilliant
intuition, she invented non-reflective ‘invisible’
glass. This technology was the forerunner of
the non-reflective surfaces on computer
screens.
Katherine also focused on new smoke screens
and gas masks for the military, the de-icing of
airplane wings, and developed devices for
measuring humidity. In her final days at GE, she
also worked on electrically conductive glass and
the use of electrical discharges in gases to
remove impurities: they are both very important
for the production of semiconductors.
GLOSSARY
coat (v.): coprire, cospargere
forerunner: precursore, predecessore
233
7. Women in ICT
2. GRACE HOPPER
92
‘I had a running compiler, and nobody would
touch it because, they carefully told me,
computers could only do arithmetic; they
could not do programs.’
Grace Brewster Murray Hopper was an
American computer scientist and United States
Navy rear admiral.
A true pioneer of computer programming, she
was one of the first programmers of the
Harvard Mark I computer and invented one of
the first compiler-related tools. She made the
idea of machine-independent programming
languages popular, which later led to the
development of COBOL, an early high-level
programming language still in use today.
She started her computing career when
working on the Harvard Mark I team led by
Howard H. Aiken. In 1949 Hopper joined the
Eckert–Mauchly Computer Corporation and
was part of the development team that
designed the UNIVAC I computer in 1944.
While working at Eckert–Mauchly she began
developing the compiler. Hopper firmly
believed that it was possible to write computer
code in English by using a programming
language that was based on English words. The
compiler would convert that code into machine
code that would be understood by computers.
By 1952, she had finished her compiler, which
was written for the A-0 System programming
language.
GLOSSARY
compiler: compilatore
READING COMPREHENSION
1. Who…
1. graduated in Physics at Cambridge University?
…………………………………………………………………………………………………………
2. used English words for a programming language?
…………………………………………………………………………………………………………
3. was a US Naval Officer?
…………………………………………………………………………………………………………
4. contributed to the development of non-reflective surfaces on computer screens?
…………………………………………………………………………………………………………
5. worked with a Nobel Prize winner?
…………………………………………………………………………………………………………
6. developed the first compiler in computing history?
…………………………………………………………………………………………………………
234 Appendix
3. MARY KENNETH KELLER
93
‘For the first time we can mechanically simulate the cognitive process. We can
make studies in artificial intelligence and… assist humans in learning.’
Mary Kenneth Keller was an American Roman Catholic religious sister, educator
and pioneer in computer science.
In 1958 she began working at the National Science Foundation workshop in the
computer science centre at Dartmouth College – a male-only institution at the time
– where she took part in the development of the BASIC programming language.
In 1965 she and Irving Tang at Washington University became the first people in
the United States to earn a doctorate in computer science.
Sister Mary later established the computing department at Clarke College in Iowa,
which she then led for twenty years. She believed that computers had a great
potential to increase access to information and to promote education. She
imagined a world where computers would make people smarter and glimpsed
the information explosion that would happen decades later. Her vision was
certainly ahead of her time.
Throughout her life, she was devoted to her own unique path in life, working hard
to support and promote the role of women in the computing field. The computer
centre at Clarke College is now named the Keller Computer Centre in her honour
and heritage for her commitment.
GLOSSARY
glimpse (v.): intravedere
4. KATHLEEN BOOTH
94
Kathleen Booth, neé Britten, was
born in 1922 in Worcestershire,
England. She graduated at the
University of London and continued
her studies to get a PhD in Applied
Mathematics in 1950.
She worked at Birkbeck University
from 1946 to 1962. Booth was in the
same team as her husband and
colleague Andrew Booth. They
travelled to the United States in 1947, visiting with John von Neumann at
Princeton. When they returned to the UK, she co-authored General
Considerations in the Design of an All Purpose Electronic Digital
Computer.
Kathleen and Andrew Booth’s team at Birkbeck was considered the
smallest of the early British computer groups. Nonetheless, from 1947 to
1953, they produced three machines: ARC (Automatic Relay Computer),
SEC (Simple Electronic Computer), and APE(X) C (All-purpose Electronic
(Rayon) Computer). He built the computers while she was in charge of
programming them.
Booth regularly published papers concerning her work on the ARC and
APE(X)C systems and co-wrote Automatic Digital Calculators (1953)
which illustrated the ‘Planning and Coding’ programming style. Moreover,
she co-founded the School of Computer Science and Information Systems
in 1957 at Birkbeck College along with Andrew Booth and J.C. Jennings.
In 1958 she taught a programming course as well and wrote one of the
first books describing how to program APE(X) C computers.
Kathleen Booth worked as a researcher and lecturer for different
institutions, such as Birkbeck College (1952-1962) and the University of
Saskatchewan, Canada, from 1962 to 1972. Her research on neural
networks led to successful programs simulating ways in which animals
recognise patterns and characters.
In addition, she worked as Professor of Mathematics at Lakehead
University in Canada from 1972 to 1978.
She retired in 1978. Her last paper, Using neural nets to identify marine
mammals, was published in 1993 when she was 71.
Adapted from en.wikipedia.org/wiki/Kathleen_Booth
READING COMPREHENSION
1. Read the previous passages and decide if the following sentences are true (T)
or false (F).
1.
2.
3.
4.
5.
6.
Kathleen Booth and Mary Kenneth Keller worked on neural networks.
Mary Kenneth Keller belonged to a religious institution.
Kenneth Keller thought that computers could promote access to information.
Booth was awarded a doctorate in Computer Science in 1965.
Booth ended her research work when she retired in 1978.
Keller’s name was given to a Computer centre as an acknowledgment
for her work.
T





F







236 Appendix
5. THELMA ESTRIN
95
Thelma Estrin, née Austern, was an American
computer scientist and engineer who worked in
the fields of expert systems and biomedical
engineering. She was a pioneer in applying
computer technology to healthcare and medical
research.
She developed an interest in engineering while
working at Radio Receptor Company during
WW2, building electronic devices. After the war,
she and her husband Gerald Estrin continued
their studies and both graduated in electrical
engineering.
Later on, Estrin worked as a researcher at the Neurological Institute of New York and
started developing an interest in biomedical engineering. Her long career led her to
become a Professor of Computer Science at UCLA (University of California) in 1980.
She also received many awards and honours throughout her life.
In 1996 Estrin wrote a paper on women’s studies and computer science to discuss the
intersections of the two disciplines. In this work, Estrin explained that women’s studies
did not approach the science and engineering subfields of computing and biomedical
engineering, which she says were ‘creating tools for exploration of women’s health
and reproductive rights’, until 25 years after its founding.
On the other hand, she clarified that analysing women’s studies ‘implies that we
expand the world of science and technology from its patriarchal history, which
consider these disciplines as inherently masculine’. In her opinion, women’s studies
are helpful to ‘understand the elements of gender in the social and political situations’.
She also claimed the importance of widening women’s access to technology.
Adapted from en.wikipedia.org/wiki/Thelma_Estrin
237
7. Women in ICT
6. STEPHANIE SHIRLEY
96
‘People remember entrepreneurs
because of our success but… it
depends far more on how we deal with
failures.’
Dame Stephanie Shirley was born in
Germany in 1933. She arrived in
Britain as an unaccompanied child
refugee escaping Nazi Germany. The
girl’s high school she attended did not
teach mathematics. Therefore, she took
an assessment in order to be allowed to
take lessons at the local boys’ school.
When she was 18, she started working
at the Post Office’s Dollis Hill research
station. It was here that she became more and more interested
in computers.
She worked on the first transatlantic telephone cable, the first
electronic telephone exchange. In addition, she was the only
woman in the team working as a statistician on the ERNIE
project, led by Tommy Flowers. ERNIE stood for ‘Electronic
Random Number Indicator Equipment’ and raised great interest
in 1957 when it began selecting prize-winners for the new
Premium Bonds, the first government-sponsored gamble in
Britain in modern times.
Later on in 1962, Shirley founded her own software company,
Freelance Programmers. To help promote her company she
began to sign her name ‘Steve’, rather than Stephanie. Her
company was unique and employed an almost exclusively female
workforce until the 1975 Sex Discrimination Act made it illegal
for her to do so. One of the many projects her team focused on
was developing the programming for the black box flight
recorders in Concorde jets.
In 1993, Shirley retired and devoted herself to philanthropic
works. She established and is the President of ‘Autistica’ which
funds and campaigns for autism research.
…see more!
READING COMPREHENSION
1. Match the beginning of each sentence with the correct ending.


Thelma Estrin pioneered
3.

The 1975 Sex
Discrimination Act forbade
C. had interesting cross-curricular aspects to
explore and write about.
4.

In 1962, Stephanie Shirley
used a male name
D. in the application of computer technology
to healthcare and medical studies.
5.

Philanthropy can be
defined as
E. the exclusive employment of a singlegender workforce.
1.
2.
In Estrin’s opinion,
computer science and
women’s studies
A. in order to promote her newly established
software company.
B. unselfish concern for human beings
through donations and/or voluntary service.
INVALSI
TRAINER
Inquadra il QR Code
per un’altra prova
Invalsi!
B1
Overall
LISTENING
Comprehension
(Common European Framework)
Audio
1. TASK IDENTIFIER
TITLE
97
Customer’s Complaints at the Computer Shop
LENGTH OF SOUNDFILE (minutes)
03:07
LISTENING BEHAVIOUR
Quick, selective listening
GENERAL FOCUS
Listening for specific information and important details
CEFR LEVEL
B1
TEST METHOD
Multiple Matching
NUMBER OF ITEMS
9
Customer’s Complaints at the Computer Shop
Listen to a dialogue between a clerk and a customer at a computer store.
First you will have 1 minute to study the task below, then you will hear the recording twice.
While listening, match the clerk’s questions (1-9) with customer’s answers (A-L).
There are two answers that you should not use.
The first one (0) has been done for you.
After the second listening, you will have 1 minute to check your answers.
0
How can I help you, Sir?
Q1
Do you have your store receipt
with you?
Q2
What seems to be the problem?
Q3
Could I take a look?
Q4
Could I ask a few questions?
Q5
How long do you use it for before
it overheats?
Q6
Do you notice any loss of function?
Q7
What do you usually do on the laptop?
Q8
Q9
Is the area where you use the laptop
exposed to direct sunlight or heat?
Do you sit on the bed when using the
laptop?
C
A
Sure, go ahead.
B
That depends
C
I’d like to make a complaint.
D
I use it to check my emails.
E
I think it’s overheating.
F
It usually feels very hot after one
or two hours.
G
It’s usually on top of the covers on
my lap.
H
Yes, I do. Here it is.
I
That’s probably why it’s
overheating.
J
Not at all.
K
Yes, of course.
L
The touchpad becomes less
sensitive to my touch, actually.
240
Invalsi Trainer
B1
2. TASK IDENTIFIER
TITLE
98
Advice for Exams – A Teacher Speaks to the Classroom
LENGTH OF SOUNDFILE (minutes)
02:47
LISTENING BEHAVIOUR
Careful listening
GENERAL FOCUS
Listening for main ideas and supporting details
CEFR LEVEL
B1
TEST METHOD
Multiple Choice Questions
NUMBER OF ITEMS
7
Advice for Exams – A Teacher Speaks to the Classroom
Listen to a teacher’s speech to the students about how to prepare for an exam.
First you will have 1 minute to study the task below, then you will hear the recording twice.
While listening, choose the correct answer (A, B, C or D) for questions 1-7.
Only one answer is correct.
The first one (0) has been done for you.
After the second listening, you will have 1 minute to check your answers.
0
The teacher
XA
B
C
D
is going to give some suggestions.
is quiet.
is all right.
is giving an exam.
Q4 Students
A
B
C
D
Q1 The exam
A
B
C
D
takes some notes to be passed.
is ready.
will be next week.
is about talking.
Q2 During the exam, the students
A
B
C
D
have to eat an apple.
need to follow a proper diet.
must not drink cola.
might be tempted by fruit
and cereals.
cannot ask teacher for help.
have to learn everything by heart.
must select carefully what to
memorize.
only have to do the exercises that
give them the most points.
Q5 Students
A
B
C
D
have to pay attention to details.
have to ignore details at all.
should not worry.
must concentrate on key ideas.
Q6 Students should
A
B
C
D
study in a library.
repeat the contents several times.
copy from their notes.
take inspiration from past students.
Q3 When students feel stressed while studying
A
B
C
D
they can fall asleep.
it’s because they are not
positive enough.
they should turn up the light.
they’d better have a walk.
Q7 According to the teacher, it is not a good idea
A
B
C
D
to stay at home the whole time.
to take some breaks.
to drink a lot of water.
to do some stretching.
B2
Overall
LISTENING
Comprehension
(Common European Framework)
3. TASK IDENTIFIER
TITLE
99
Ex Machina, a SCI-FI Movie by Alex Garland
LENGTH OF SOUNDFILE (minutes)
02:18
LISTENING BEHAVIOUR
Selective listening
GENERAL FOCUS
Listening for specific information and important details
CEFR LEVEL
B2
TEST METHOD
Short Answer Questions
NUMBER OF ITEMS
6
Ex Machina, a SCI-FI Movie by Alex Garland
Listen to three dialogues between Caleb and some other characters from the movie Ex Machina.
First you will have 1 minute to study the task below, then you will hear the recording twice.
While listening, answer the questions (1-6) using a maximum of 4 words.
Write your answers in the spaces provided.
The first one (0) has been done for you.
After the second listening, you will have 1 minute to check your answers.
0
What does Caleb do (dialogue 1)?
Q1
What does Caleb work on (dialogue 1)?
Q2
What kind of competition did he win
(dialogue 1)?
Q3
What does the Turing test explore
(dialogue 2)?
Q4
How many AI has Nathan already built
(dialogue 2)?
Q5
Why is Caleb working with Ava
(dialogue 3)?
Q6
How does Ava feel (dialogue 3)?
He is a programmer.
242
Invalsi Trainer
B2
4. TASK IDENTIFIER
TITLE
100
Is Android Better than Apple?
LENGTH OF SOUNDFILE (minutes)
04:09
LISTENING BEHAVIOUR
Quick, selective listening
GENERAL FOCUS
Listening for specific information and important details
CEFR LEVEL
B2
TEST METHOD
Multiple Matching
NUMBER OF ITEMS
8
Is Android Better than Apple?
Listen to six people giving their opinions about Android and Apple.
First you will have 1 minute to study the task below, then you will hear the recording twice.
While listening, match the beginnings of the sentences (1-8) with the sentence endings (A-K).
There are two sentence endings that you should not use.
The first one (0) has been done for you.
After the second listening, you will have 1 minute to check your answers.
A
Apple has made over many years
You can use your Android device ___.
B
but watch out
Q2
They have to take out important stuff ___.
C
is that Android mobiles are much
cheaper than the Apple mobiles
Q3
You can open up your device ___.
D
if your battery dies
Q4
Since Android phones have so many
different features ___.
E
since they have simple packaging
Q5
Those are just some of the many products
___.
F
as a USB drive
Q6
I believe Apple is better ___.
G
is because you can track iPhones
down
Q7
Apple is the current popular trend ___.
H
as a pen drive
Q8
Another reason I say Apple is better ___.
I
you can buy a phone that has an
incredible camera
J
like the ability to sense what kind
of light you’re in
K
since their stores have a simple
feeling
0
One of the most important things ___.
Q1
C
Overall LISTENING Comprehension
243
B2
5. TASK IDENTIFIER
TITLE
101
An Interview with Sophia, the AI Robot
LENGTH OF SOUNDFILE (minutes)
02:43
LISTENING BEHAVIOUR
Quick, selective listening
GENERAL FOCUS
Listening for specific information and important details
CEFR LEVEL
B2
TEST METHOD
Multiple Matching
NUMBER OF ITEMS
7
An Interview with Sophia, the AI Robot
Listen to the following interview with Sophia, the AI robot, by Steve Kovach.
First you will have 1 minute to study the task below, then you will hear the recording twice.
While listening, match the questions (1-7) with the answers (A-J).
There are two extra answers that you should not use.
The first one (0) has been done for you.
After the second listening, you will have 1 minute to check your answers.
0
How are you?
A
A
I’m fine.
Q1
How do you feel about humans?
B
I think people will become very close to
their artificial intelligence.
Q2
Can humans and robots get along?
C
I like my human companions.
Q3
Can robots have feelings?
D
No, I don’t get to stay up to date on much
television.
Q4
Have you ever seen Black Mirror?
E
My hard disks are spinning.
Q5
Do you have a favourite movie
or TV show?
F
My favourite TV series is a toss-up
between Black Mirror and Humans.
Q6
And then later you said yes. Why?
G
It depends on humans.
Q7
Did you learn from my previous
questions?
H
The reason is not that important.
I
Depends on the robot.
J
I love my human compatriots.
B1
Overall
READING
Comprehension
(Common European Framework)
6. TASK IDENTIFIER
TITLE
7 Useful Tips to Overcome Your Fear of Flying
NUMBER OF WORDS
323
READING BEHAVIOUR
Quick selective reading
GENERAL FOCUS
Reading for gist
CEFR LEVEL
B1
TEST METHOD
Multiple Matching
NUMBER OF ITEMS
6
7 Useful Tips to Overcome Your Fear of Flying
Read the texts about the fear of flying and some tips to overcome it.
Choose the correct heading (A-I) for each paragraph (1-6).
There are two extra headings that you should not use.
The first one (0) has been done for you.
0 ___
For many fearful flyers, learning the basics of how airplanes work can go a long way toward
alleviating their anxiety. For instance, understanding how a plane can continue to fly even if an
engine fails can help you feel less concerned about your aircraft malfunctioning. It is also useful to
know what causes turbulence, and what’s behind those scary sounds during take-off and landing.
Q1 ___
Getting to know what your plane looks like can make it seem a little less scary. For instance, put a
picture of the plane’s cabin on your computer’s desktop; by the time of your flight, the image will
be familiar, not scary.
Q2 ___
Most airlines and booking engines allow you to request a seat assignment when you book your
flight. Request an aisle seat, particularly if you have claustrophobia. You’ll feel less limited by other
people, and you’ll be able to get up and move around the cabin more easily. This choice also makes
it easier to avoid looking out the window if those sky-high views make you nervous.
Q3 ___
It may seem stupid, but it’s worth mentioning: Avoid airplane disaster movies, news coverage of
plane crashes, or other scary media images. Remember that the vast majority of flights arrive safely,
but only the problem flights make the news. Don’t let that distort your impressions of flying.
Overall READING Comprehension
245
B1
Q4 ___
Many fearful flyers are bothered by their perceived lack of control since they have no influence
over the safety or performance of the aircraft. Try to regain a little control by reminding yourself
that you made the decision to fly and that you can decide how you respond to the experience.
Q5 ___
This and other stimulants can make you even more jittery.
Q6 ___
In the days leading up to your trip, it’s easy to let the flight anxiety build. Instead, try to focus on
more positive things – like all the fun things you’ll do once you reach your destination.
Adapted from www.smartertravel.com/fear-flying-18-ways-cope/
A
Try to relax
B
Familiarize yourself with your plane
C
Avoid caffeine
D
Breathe deeply
E
Monitor your media intake
F
Know what to expect
G
Think positive
H
Choose an aisle seat
I
Remind yourself who’s in charge
0
F
Q1
Q2
Q3
Q4
Q5
Q6
246
Invalsi Trainer
B1
7. TASK IDENTIFIER
TITLE
Video Games of the 80s
NUMBER OF WORDS
268
READING BEHAVIOUR
Careful reading
GENERAL FOCUS
Reading for main ideas and supporting details
CEFR LEVEL
B1
TEST METHOD
Multiple Matching
NUMBER OF ITEMS
8
Video Games of the 80s
Read the text about the most popular video games in the 80s.
Parts of the text have been removed.
Choose the correct part (A-K) for each gap (1-8).
There are two extra parts that you should not use.
The first one (0) has been done for you.
1. Frogger
The goal was (0) ____ and then across the pond. If you got run over by a truck or a car, you would
hear a resounding “splat.” And you had to make sure (Q1) ____ when you were crossing the lily
pond. The graphics were simple, but the game was addicting. And if you heard the music, you
knew you were going to be humming it all day long.
2. Space Invaders
It was the game (Q2) ____ based on its model. There was that incessant humming in the
background as you tried to shoot the aliens with the constant, repetitive pressing of the button.
The goal was (Q3) ____ that would move back and forth across the screen as you tried to kill
them. You could also play against a friend.
3. Donkey Kong
The beloved monkey, the King of video games. The game (Q4) ____ because the parents loved
playing it as well. Another Nintendo classic that was released in 1981, this game brought the Mario
character (Q5) ____ that would roll his way.
4. Ms. Pacman
It was nominated for a Kid’s Choice Award for Favourite Videogame. In this 1981 release,
(Q6) ____ to eat up all of those dots and avoid the monsters. Each level brings you to a different
stage in Ms. Pacman’s life. (Q7) ____ for a game has brought so many people hours and hours of
enjoyment!
5. Super Mario Bros.
Being one of the later games on the list, it originally came out in 1985. Who can ever forget this
iconic game and how many countless amounts of times you would fail, (Q8) ____ from the
almighty Bowser.
Adapted from vocal.media/geeks/video-games-of-the-80s
Overall READING Comprehension
247
B1
A
trying to rescue the princess
B
to shoot and destroy the four rows of aliens
C
take your lady around the board
D
to get the frog across the street
E
that kids could talk to their parents about
F
to help and rescue five rows of ghosts
G
that launched a thousand games
H
such a simple concept
I
to life as he jumped around avoiding all sorts of pitfalls
J
that was sold the most
K
not to get eaten by an alligator
0
D
Q1
Q2
Q3
Q4
Q5
Q6
Q7
Q8
B2
Overall
READING
Comprehension
(Common European Framework)
8. TASK IDENTIFIER
TITLE
Cyber Security
NUMBER OF WORDS
361
READING BEHAVIOUR
Quick selective reading
GENERAL FOCUS
Reading for specific information and important details
CEFR LEVEL
B2
TEST METHOD
Short Answer Questions
NUMBER OF ITEMS
8
Cyber Security
Read the review about cyber security, then answer the questions (1-8) using a maximum of 4 words.
Write your answers in the spaces provided.
The first one (0) has been done for you.
The definition of cyber security is often confused with the meaning of information security.
Information security, often referred to as ‘IT security’, looks to protect all information assets,
whether as a hard copy or in digital form. Cyber security is a subset of information security. It
specifically focuses on protecting computer systems and their components – including hardware,
software and data – and digital infrastructure from attack, unauthorized access or being otherwise
damaged or made inaccessible.
Data centres, websites, programs, servers or accounts can all be exploited through a cyber-attack.
Effective cyber security uses risk management to ensure these controls are deployed cost-effectively
– in other words, based on the likelihood of the risk occurring, and the worst possible impact if the
threat materializes.
In recent years, cyber security has come under intense media scrutiny due to the rapid development
of cyber risks in both size and number, and the degree of impact on individuals, governments and
organizations. Most well-informed organizations now consider cyber security a critical business
issue.
What are the consequences of a cyber-attack? Cyber-attacks can cause significant disruption
and damage to even the most resilient organization. Impacted organizations stand to lose assets,
reputation and business, and face fines and remediation costs.
The most effective strategy to mitigating and minimizing the effects of a cyber-attack is to build a
solid foundation upon which to grow your cyber security technology stack. Solution providers often
tell their clients their applications are 100% compatible and will operate seamlessly with the current
IT infrastructure, and for the most part, this is true.
Problems arise when we start adding IT security solutions from different manufacturers. Regardless
of the granularity of their configuration settings, technology gaps will always be present.
Overall READING Comprehension
249
B2
Technology gaps appear for one simple reason: developers always keep certain portions of their code
proprietary as part of their competitive advantage. As such, true compatibility and interoperability
may only be 90%. It is through these gaps that vulnerabilities usually appear, which criminal hackers
can exploit. A reliable cyber security foundation will identify these gaps and propose the appropriate
action to take to mitigate the risk of an attack, enabling you to build a robust cyber security strategy.
Adapted from www.itgovernance.co.uk/what-is-cybersecurity
What is cyber security often confused with?
Information security.
Q1
What kind of assets does information security
protect? (Give two answers)
a.
b.
Q2
What elements do computer systems include?
Q3
What is cyber security based on?
Q4
How do well-informed organizations consider
cyber security?
Q5
What do impacted organizations stand
to lose?
Q6
What is the most effective strategy to
minimize a cyber-attack?
Q7
What do developers always keep as an
advantage?
Q8
What level of compatibility can at present
be reached?
0
250
Invalsi Trainer
B2
9. TASK IDENTIFIER
TITLE
The Trends in Smart Home Technology
NUMBER OF WORDS
589
READING BEHAVIOUR
Careful Reading
GENERAL FOCUS
Reading for main ideas and supporting details
CEFR LEVEL
B2
TEST METHOD
Multiple Choice Questions
NUMBER OF ITEMS
6
The Trends in Smart Home Technology
Read the article about the newest trends in smart home technology, then choose the correct
answer (A, B, C or D) for questions 1-6.
Only one answer is correct.
The first one (0) has been done for you.
Smart home devices are all the rage going into 2019. But what type of smart devices do consumers
own? And aside from asking Alexa to tell jokes – which is the number one request in my
household – how are consumers using this technology? The answers to these questions and more
are here in the following five trends in smart home technology, with results analysed from
a recent Ripple Street Research consumer survey.
Ownership will remain centred around speakers and watches, followed by thermostats/carbon
dioxide monitors, security, lighting and outlets.
Smart speakers are the most sought-after item. According to projections, over 50% of US
households will own a smart speaker after this holiday season. Our research shows that 25 to 35% of
consumers currently own and are interested in smart speaker and watches – many more than other
devices like smart thermostats, carbon dioxide monitors, security systems, smart lighting and outlets.
There appears no current interest or need for all the fancy smart kitchen appliances. That will come,
but not so soon.
Men are far more likely to own and give smart home devices. According to the research, men are
three times more likely to own smart lighting and outlets, twice as likely to own smart speakers,
thermostats, CO2 monitors and security systems and 67% more likely to own smart watches. Not
only are they more likely to own a smart device themselves, but they’re also more likely to give one.
Men are 50% more likely to offer a smart device this holiday season compared to women. There is
a big opportunity for brands in these categories to connect with female consumers, educate them
about the utility of these products and create an experience that allows them to feel informed and
comfortable enough to purchase.
Men and women discover smart home technology differently. Men are finding new smart home
products by reading blogs, articles, reviews and generally searching for information online. On the
other hand, women are discovering smart home products primarily through recommendations from
friends and family members. Women are twice as likely as men to discover a smart home product
through friendly recommendations. With the complexity of most smart home products, the data
suggest that men seek the advice of a professional prior purchase, whereas women look to those that
know them best.
Speakers are still not used for communication and purchase. For all the talk about smart speakers
changing the buying habits of consumers, most aren’t interested in using them to make purchases –
Overall READING Comprehension
251
B2
or to talk to one another for that matter. The most common uses for these speakers are: listening to
music, podcasts, etc. (94%), hearing weather forecasts (73%), setting alarms/reminders (58%) and
asking fun questions (56%). Less than half of their owners use everything else these speakers can
do – and only 29% use their smart speaker to make phone calls. As for making purchases? That’s just
20%, but we know that number is likely to multiply.
Consumers say they are concerned about privacy, but it doesn’t impact the likelihood to purchase a
smart device. When specifically asked about privacy concerns, most consumers have them – 84% to
be exact. However, it doesn’t appear these concerns are a deterrent to purchasing a smart device. For
those who don’t currently own one, only 20% cited privacy concerns as the reason why; most others
mentioned the price (55%) and/or a lack of need (42%). As is the case with most technology these
days, consumers are willing to ignore their privacy concerns as long as they see a need for the product.
Adapted from www.smartbrief.com/original/2019/01/5-trends-smart-home-technology
0
Smart home devices
XA
B
C
D
are very popular nowadays.
are not really owned by people.
have been invented in 2019.
are classified by types.
Q4 Men
A
B
C
D
Q1 In author’s family
A
B
C
D
everybody asks Alexa for jokes.
Alexa is the most requested device.
children cannot use technology
properly.
there are five trends.
Q5 Speakers
A
B
C
Q2 Smart kitchen devices
A
B
C
D
are as popular as Alexa.
are not as widespread as thermostats
and carbon dioxide monitors.
are owned by 50% of US households.
are not that interesting yet.
Q3 Women
A
B
C
D
must be educated about the utility
of technology by men.
look forward to being connected
by technology brands.
need to be reassured before
buying a device.
often receive technological
gifts from men.
do not trust their relatives
and friends.
usually look for experts’ opinions.
mainly buy devices on line.
find out more new products
than women do.
D
are seldom employed for music.
are used for hearing weather
forecasts by one consumer in two.
might be used more often
to purchase.
are usually used for telephone calls.
Q6 Privacy
A
B
C
D
is the main reason why people
do not buy a smart device.
does not concern consumers at all.
is a problem for 84% of the people.
does not worry buyers that much.
252
Invalsi Trainer
B2
10. TASK IDENTIFIER
TITLE
7 Ways Netflix Reinvented HR (Human Resources)
NUMBER OF WORDS
499
READING BEHAVIOUR
Careful reading
GENERAL FOCUS
Reading for main ideas and supporting details
CEFR LEVEL
B2
TEST METHOD
Multiple Matching
NUMBER OF ITEMS
8
7 Ways Netflix Reinvented HR (Human Resources)
Read the texts about Netflix and how it changed the way human resources are valorised.
Choose the correct heading (A-K) for each paragraph (1-8).
There are two extra headings that you should not use.
The first one (0) has been done for you.
0 ___
“If you want to build a ship, don’t drum up the people to gather wood, divide the work, and give
orders. Instead, teach them to yearn for the vast and endless sea.”
Those are the words of the author of The Little Prince, Antoine de Saint-Exupéry, but also displayed
proudly on Netflix’s website about working at the organization and their culture and values. Netflix
and its former Chief Talent Officer Patty McCord are synonymous with great company culture. In
2009 their revolutionary “culture deck” was made public, setting out the vision and approach for
attracting and keeping the best employees. It has since been viewed over five million times. The
strategy was set around seven key points outlining a culture based on company values, hiring top
talent, giving employees the freedom to succeed.
Q1 ___
Instead of something written on posters and stuck on a wall, values should be lived, breathed – and
actually valued, Netflix explained. This means: do as I do, not as I say. Leaders and managers, Netflix
revealed, need to live and breathe the company values in everything they do.
Q2 ___
Your employees should operate as a highly performing sports team, not a family. You join the
company to compete, and every day you do your best to contribute to the success of the group.
Q3 ___
This one is also simple: be honest and treat people like adults. If you are looking for people to
take ownership, innovate, be smart and creative, then you need to give them the freedom and
responsibility to do so. Ultimately, responsible people thrive on freedom and are worthy of freedom.
Q4 ___
Don’t control staff, rather provide context to get the best results out of them instead. Netflix believes
only by understanding the full context of their business can employees help their company grow.
Q5 ___
Setting a common goal and allowing your teams to achieve it without heavy-handed supervision is
vital for Netflix. Teams across the company must work to the same strategy, ensuring they are highly
aligned but loosely coupled, meaning that they are not constantly checking each other’s work or
sitting in endless meetings.
Overall READING Comprehension
253
B2
Q6 ___
Hire the best and pay top dollar for it. Netflix always pays top of the market salaries. In their words,
‘One outstanding employee gets more done and costs less than two adequate employees’.
Q7 ___
Netflix believes that people should shape their own futures within a company rather than have a
career plan shaped by the company. The company scrapped formal yearly reviews early on. They
found them to be too ritualistic and infrequent. They asked managers and employees to have regular
conversations about performance as an organic part of their work.
Q8 ___
Instead of cheerleading, talent managers should think of themselves as business people, McCord
says. They should be asking themselves: What’s good for the company? And then they should
implement strategies to address these. Ultimately, when a company is at the top of its game, so too are
its people and their morale.
Adapted from www.sagepeople.com/about-us/news-hub/7-ways-netflix-reinvented-hr/
A
Pay top of the market
B
Context, not control
C
Freedom and responsibility
D
Do not copy competitors
E
High-performance
F
Get inspiration form literature
G
Promotions and development
H
‘Values are what we value’
I
Highly aligned, loosely coupled
J
Patty McCord’s overall advice for leaders
K
An innovative “culture deck”
0
K
Q1
Q2
Q3
Q4
Q5
Q6
Q7
Q8
Copyright (2022) by Trinity Whitebridge
www.trinitywhitebridge.co.uk
info@trinitywhitebridge.co.uk
Coordinamento editoriale: Sergio Olimbo
Responsabile di redazione: Monica Monari
Redazione: Silvia Magi
Revisione linguistica: Mario Bianco
Progetto grafico e copertina: Sergio Olimbo
Copertina e impaginazione: Marta Boccato
Archivio immagini: Archivio Spiraglio; Shutterstock
Christoph Roser at AllAboutLean.com for Industry 4.0
Credits Kiranshastry
All reasonable efforts have been made to identify and contact copyright holders but in some
cases these could not be traced.
If you hold or administer rights for materials published here, please contact us.
Any errors or omissions will be corrected in subsequent editions.
L’Editore è a disposizione degli aventi diritto non potuti reperire.
I diritti di traduzione, di memorizzazione elettronica, di riproduzione e di adattamento, totale o parziale, con qualsiasi
mezzo (compresi i microfilm e le copie fotostatiche), sono riservati per tutti i Paesi.
Fotocopie per uso personale del lettore possono essere effettuate nei limiti del 15% di ciascun volume dietro pagamento
alla SIAE del compenso previsto dall’art. 68, comma 4, della legge 22 aprile 1941 n. 633 ovvero dall’accordo stipulato tra
SIAE, AIE, SNS e CNA, CONFARTIGIANATO, CASA, CLAAI, CONFCOMMERCIO, CONFESERCENTI il 18 dicembre 2000.
Le riproduzioni per uso differente da quello personale potranno avvenire solo a seguito di specifica autorizzazione
rilasciata dall’editore.
Nel testo possono essere presenti nomi e marchi commerciali. Non sono stati eliminati per non rendere il testo irreale.
Non esiste però alcun rapporto fra l’Editore e i relativi marchi, né si intende che gli eventuali marchi citati siano migliori
o peggiori di altri, o che l’Editore voglia consigliarli o sconsigliarli.
Stampa: Arti Grafiche Sograte, Città di Castello (PG)
Prima edizione: 2022
Ristampe:
2022
I
2023
II
2024
III
2025
IV
2026
V
www.trinitywhitebridge.co.uk
Il libro
• Ogni Unità propone letture tecniche graduali, note esplicative ed un ricco apparato
vdi esercizi ed attività.
• Un’unità incentrata sul mondo del lavoro nelle tecnologie (Sicurezza sul lavoro,
Compilazione del CV europeo, etc.).
• Esercizi di certificazioni PET e FCE aggiornati.
• Mappe Concettuali.
• Glossary: un glossario visuale di abbinamento parola-immagine per aiutare la
memorizzazione.
• Appendix con case studies aggiornati su aziende e professionisti del settore.
Edizione digitale
Il testo è conforme alla normativa in corso in materia di edizione mista, digitale e on-line.
La versione digitale è acquistabile su www.scuolabook.it.
Teacher’s Book
Cod. 50283
Il Teacher’s Book contiene:
• tutte le soluzioni degli esercizi e delle attività presenti nel volume per lo studente;
• trascrizione dei materiali audiovisivi presenti sul volume per lo studente;
• prove di verifica con relative soluzioni;
• prove di verifica per studenti con BES con relative soluzioni.
Altri contenuti digitali sono presenti sul sito dell’Editore, nella sezione riservata ai DOCENTI.
co
IC d. 7
T
3
PL 05
U 7
S
ICT PLUS
ISBN 978-88-99673-57-4
COD. 73057
€ 24,50
Download