Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Basic English.doc
Скачиваний:
25
Добавлен:
05.11.2018
Размер:
936.45 Кб
Скачать

Issues in computing

Because faults can develop in computer systems, it is important to keep copies of valuable data using a backup system. This is especially important in a network where many users are storing vast amounts of data.

Networks also require security systems to control access. Login names and passwords are often used, but these may be combined with the use of plastic swipe cards containing a user identification number. Some computer systems use recognition systems that scan and identify characteristics of the user such as their fingerprints, facial features, voice, or eyes.

Computer crimes include:

      1. hacking - unauthorized access to computer systems and tampering with other users data.

      2. pirating, i.e. illegally copying and selling programs.

      3. intentionally attempting to spread viruses.

Viruses are programs that have been written to make a computer behave in an unexpected and- undesired way. Although they are often relatively harmless, they sometimes cause a lot of damage. They are usually designed to remain hidden and dormant until a particular time, or until the user performs a particular action, such as pressing a particular combination of keys. They have a tendency to replicate themselves, and often attach themselves to other programs. It is common for a user to have a virus program on their disk without being aware of it.

Viruses can be found and removed by anti-virus programs, which scan disks and files looking for programming code that is known to belong to particular virus programs. When a piece of virus code is found, the virus can be identified, and an appropriate program run to delete the virus code from the disk or file. Plain text email messages cannot contain a virus, but viruses can be carried in email attachments, i.e. files attached to email messages. Some viruses are much more common

than others and are often unknowingly downloaded from a network system such as the Internet. Care should be taken to check for viruses when using removable disks or when transferring files.

Objectives

By the end of this unit, students should be better at: listening and note-taking predicting from text headlines.

They should be able to make rules and guidelines using always, never, and must, mustn't.

They should know and be able to use these words and abbreviations: activate, dormant, hacking, pirating, prevention, virus, anti-virus.

Tuning-in

Task 1

Give students only a short time for this exercise. See which group or pair can come up with three solutions in the quickest time.

Key

        1. back them up regularly

        2. prevent access with a password

        3. prevent access with a password.

Task 2

Treat this as a pre-listening task as preparation for Task 3. Don't correct this exercise until the students have listened to the recording.

Listening

Task 3

Asks students to work in groups of three. One student in each group should listen and make notes on each of the three headings: What you have, What you know, Who you are.

Students then combine their information to complete the table. An alternative approach is to ask two students to listen and the third to be the secretary. The listeners dictate what they remember to the secretary who fills in the table.

made stronger by using always and never. Then transform them using must and mustn't, as in the examples in the Student's Book. Provide further examples using the rules for CD-ROM and floppy disk care given in Task 1, Unit 8 on page 3 4. If you can obtain a CD-ROM, demonstrate these examples: Hold a CD-ROM by the edges.

Always hold a CD-ROM by the edges.

You must hold a CD-ROM by the edges.

Hold a CD-ROM betweenfinger and thumb.

Never hold a CD-ROM betweenfinger and thumb.

You mustn't hold a CD-ROM between finger and thumb.

Examples

swipe card, active badge password

fingerprint, face, voice, retina recognition

Reading

Task 4

Treat this as a pre-reading task. Most students of computing know quite a lot about viruses. Pool their answers on the board.

Task 5

Key

          1. making computer viruses, hacking, pirating

          2. flash = display briefly, gobbledegook= meaningless rubbish, dormant= opposite of active, eradicate = remove totally

          3. new viruses appear every month

          4. see table:

Virus Effect

Yankee Doodle plays this tune every 8 days at 5pm Cascade all the letters in a file fall to the

bottom of the screen Michelangelo turns data into nonsense Jerusalem B erases any file you try to load

Language work

Key

Access system What you have What you know Who you are

Elicit examples of guidelines for preventing and treating viruses. Write them on the board in their imperative form. Demonstrate how they can be

Task 6

Key

            1. You must keep your network password secret.

            2. You mustn'ttry to access other people's data.

            3. You must make a backup copy of all your important files.

            4. You mustn't use commercial software without a licence.

            5. You must check your email regularly.

            6. You mustn't install software before it is virus- checked:

            7. You mustn't re-use Web images from pages which have a copyright symbol.

            8. You mustn't change other people's data without permission.

            9. You mustn't believe every email message that warns you about viruses -some are scare stories.

10 You must virus-check an email attachment before opening it.

Task 7

Key (other answers are possible.)

              1. Always keep your password secret.

You mustn't use a password which is easy to guess.

              1. Never add extra labels to a floppy disk.

You mustn't remove a disk from a drive by force.

              1. Always make backups.

You must label your backups.

              1. Always make sure the monitor is easy to see. You must have a chair with back support.

              2. Always check a floppy disk.

You must update your anti-virus program regulaYly.

              1. Never smoke when you use a CD-ROM drive. Always hold a CD-ROM by the edges.

Problem-solving

Task 8

Before the students start the exercise, talk through each headline with them. Answer any questions about vocabulary, and encourage your students to predict the kind of story which will follow. Get them to suggest words that might appear in each story, and list them on the board.

The language of the articles is colloquial, e.g nab, villain, rather than technical, but there are sufficient clues in these newspaper extracts to enable your students to match title and text. Advise them that reading the title carefully and predicting the contents of the text which follows is a good way to start reading any text in their specialism.

Note that e is a myth. You cannot catch a virus by reading an email.

You can do so by only downloading an attachment without virus-checking it.

Key

1d 2b 3a 4e 5c

Writing

i

_____

Task 9

Your college will probably issue guidelines on student use of computers. With a more advanced class, ask your students to try to translate any rules which relate to unauthorized use. They will need your help as they are translating from their own language into the foreign language, but an occasional activity of this sort can be useful.

Computers are used in a wide variety of work and there are many different types of jobs available in computing. Job adverts used in this unit include areas such as analysis and design, programming, maintenance and support, computer operation, and computer sales. The job titles used for a particular type of work vary, and there is a lot of overlap of responsibilities in the different computing jobs advertised. For example, a job having the title of Analyst/Programmer includes a mixture of systems analysis and computer programming. Appropriate technical experience and qualifications are normally required, including a Higher National Certificate (HNC), a Higher National Diploma (HND), a Bachelor of Science degree (B.Sc), or a Master of Science degree (M.Sc). As with most jobs adverts, a variety of skills are required. These might include good communication skills, the ability to think logically and the ability to work under pressure. In some computing jobs, good colour vision is essential, and it may be necessary to have a current driving licence. Knowledge of common operating systems, computing languages and programs are often required. Common network operating systems include Unix, Novell Netware, and Microsoft Windows NT. Common programming languages include C, C++, Pascal, fava, Delphi, Visual Basic (VB), and HTML. Common programs include the integrated general purpose package called Microsoft Office, databases such as Oracle and Microsoft Access and a groupware product called Lotus Notes. Knowledge of hardware and networks systems, such as the Internet, and email systems is often required. The growth of the Internet has meant that a knowledge of using TCP/IP (Transmission Control Protocol/ Internet Protocol) is often required. This is the standard set of rules for communicating over the Internet. Above all, to get a job in computing, it is usually necessary to keep up with new technology, and have some knowledge of current systems.

Objectives

By the end of this unit, students should be better at:

reading and note-taking

making inferences from a listening text.

They should be able to use must have/be, and should have/be to describe job requirements.

They should know and be able to use these words: systems analyst, programmer, technical sales manager, network support person, hardware engineer, software designer.

Tuning-in

Task 1

Remind them of jobs they already know the English terms for through the interviews in this book: computing support assistant, IT manager, analyst/programmer. Encourage them to ask you the English names of computing j obs they know in the mother tongue.

Task 2

Elicit reasons for choosing a career and provide key vocabulary as required, e.g. salary, promotion, demand, security, interesting.

Reading

Task 3

Careers in computing

This is a jigsaw read and report activity. It is not easy to reduce these texts to main points as they are already almost in note form. Ask students to try to make notes which summarize sections of the text and to ignore details.

Key (other answers are possible)

Job Main responsibilities

Software designs, writes, compiles, and

engineer/ tests systems and applications

designer programs of all kinds

Computer sells computer hardware, in

salesperson addition may arrange support or training for customers

Computer analyst programmer who

systems support maintains and updates a person company's software and solves

problems of users

Computer creates software programs, may

systems analyst specialize in one aspect such as programmer programming or cover all, may also provide support

Hardware researches, designs, and develops

engineer computer hardware and the

computerized element of other equipment

Network support maintains all aspects of networks person including software, wiring,

workstations, etc.

Task 4

Emphasize that this is supposed to be a speaking activity, and encourage students to exchange information orally, and not simply show each other their notes.

Listening

Task 5

Before they listen, ask students to predict some of the words and phrases which these professionals might use. Write their predictions on the board. Help them further, by doing the first example together. Go through the tapescript and point out each phrase which helps identify the speaker as a Systems Analyst Programmer. For example,... I write a program, carry out a... study in the company, I have to... make an analysis of their systems, etc.

Key

  1. Systems Analyst Programmer

  2. Technical Sales Manager

  3. Network Support Person

  4. Hardware Engineer

  5. Software Designer

Language work

Write on the board or elicit from the class the requirements for the job of Computer Network Support Person. Task 3, text 6 and Task 5, extract 3 will help. The full list is given on page 112. Ask students to separate the requirements into most important or essential, and less important or desirable. Demonstrate how must have/be is used for requirements that are essential and should have/be for those that are desirable only.

Task 6

As practical follow-up to this task, students could be asked to find out the essential and desirable criteria for a job they would like to do in computing. They could research this by looking at j ob advertisements in computing magazines. Your college library may have a selection. In addition, the college career guidance service should be able to provide data on careers in computing which you could help them translate.

Key (other answers are possible)

Essential

    1. certificate in computing

      1. able to put technical ideas into everyday language

      2. able to persuade and negotiate

        1. thorough understanding ofthe product

        2. driving licence

        3. high level communication skills

        4. patient, persistent, and diplomatic Desirable

          1. experience in the computer industry

            1. qualification in marketing

10 able to work away from home

Problem-solving

Task 7

Ask students to work in groups of three. They should first read the job advertisement carefully to make a list of the essential and desirable requirements for the post. Then each member of the group can read the details of one applicant to identify how closely the applicant matches the requirements of the post. He or she should report back to the group who must agree on the best candidate. In case of doubt, they can refer back to the applicants' details. This will encourage a very close reading.

No applicant matches exactly.The closest candidate is Applicant 2.

Writing

Task 8

You can use this CV as a basis for this task. Go through each element.

Personal details

Name: Helen Dickens

Date of birth: 30 August 1976

Address: 5B ThePleasance, Birmingham,

BUI 3ST

Marital status: Single

Education and qualifications

1995-1999 Chamberlain College, Birmingham HND Information Technology Systems

1988-1994 Abraham Wright Secondary School,

Derby

A levels in Engineering and Mathematics.

Standard Grade English, French, Art, Physics

I am familiar with Unix and Windows operating systems and with many mainstream packages including Microsoft Office and Lotus Notes. I am also familiar with programming languages such as C, Java, and Visual Basic.

I have a clean driving licence. I qualified in 1994.

Employment Historii

1999-present Tester Fault Finder

E. G. International Electronics Limited, Faraday Industrial Estate, Birmingham

My duties are to test and repair electronic circuit boards for a wide range of customers.

References

Work

MayBonhill, Personnel Manager, E.G. International Electronics Ltd. Birmingham BG4 7ZQ

College Harold Mills, Head of IT Department, Chamberlain College, Birmingham, BUI 9TL

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]