
- •Infotech 1
- •Module 7 Programming / Jobs in ict 119
- •In this module, you will:
- •Write a short presentation summarizing your discussion. Then ask one person from your group to give a summary of the group's ideas to the rest of the class.
- •In pairs, label the elements of this computer system.
- •X is a type of...
- •In pairs, answer these questions. If necessary, look at the Glossary.
- •Complete this diagram of a pc system. Look at Units 1,2 and 3 to help you.
- •In pairs, compare your answers.
- •6 Your ideal computer system
- •In a computer shop
- •Listen again and complete the product descriptions.
- •MacBook
- •Vocabulary tree
- •In this module, you will:
- •Interacting with your computer
- •Interact with a computer by using one of these: a light pen, a scanner, a trackball, a graphics tablet, a game controller or a microphone.
- •This is a device the cursor and selecting items on the screen.
- •Alphanumeric keys represent letters and numbers, as arranged on a typewriter.
- •6 Speech recognition systems
- •I In pairs, discuss how many ways there are of capturing an image on a computer.
- •I oolaere ljOo can manLpulate Lt.
- •2. TVie scaled
- •In small groups, compare your answers and decide about the following.
- •Image you don't need.
- •In pairs, discuss these questions.
- •- The width of the screen in proportion to its height
- •Vertically
- •What substance produces light and colour when hit by electrons in a crt monitor?
- •Display screens and ergonomics
- •Get a good chair, one that your lower back and is
- •Instructions and advice
- •Find words in the article with the following meanings.
- •Output quality, measured in dots per inch (lines 10-15)
- •Comparatives
- •Good —► better bad —► worse little —► less
- •6 Reading quiz - printer adverts
- •In pairs, read the adverts and then answer these questions. See who in your class can finish first.
- •Which printer would you recommend to someone who wants to print advertising graphics?
- •If you have the wide-format printer from Vutek, what kinds of material can you print on?
- •In pairs, discuss these questions.
- •(2! Listen to an interview with Mike Hartley, the director of the Assistive Technology Project for the Blind in Washington dc. Make notes about these topics.
- •Investing in assistive technologies
- •In this module, you will:
- •Indicating addition furthermore in addition besides moreover and
- •Iomega portable hard drive
- •I Read these posts from a forum about the topic of'Blu-ray versus hd-dvd'and then add your response, giving your opinion on the topic.
- •Dragon flash drive
- •Vocabulary revision
- •Like music.
- •Summarize the text on page 64 in 90-100 words. Follow these steps:
- •In pairs, read the instructions and complete the puzzle.
- •Instructions
- •Insert ] Fgmat look ТдЫе V£jndow Help
- •0 ( Replace All ) Replace ( Cancel ) f Fmd Next *
- •I In pairs, discuss the advantages and disadvantages of showing the information above as a graph, rather than as a worksheet.
- •In this module, you will: of the Internet page
- •Internet basics
- •Make a list of all the things you can use the Internet for.
- •Internet faQs
- •Internet faQs: Part 1
- •Internet faQs: Part 2
- •To connect to a computer by typing your username and password (in Telnet paragraph)
- •In pairs, make questions using these prompts. Then practise asking and в
- •In pairs, discuss these questions. Give reasons for your answers.
- •Virtual meetings
- •In pairs, discuss these questions.
- •Virtual meetings
- •In pairs, discuss these questions. Give
- •ISl Listen again and decide whether these sentences are true or false. Correct
- •In pairs, discuss these questions.
- •How old was the hacker that broke into the us defence computer in 1989?
- •1981 - Ian Murphy, a 23-year-old known as Captain Zap on the networks, hacked into the White House and the Pentagon.
- •A Canadian hacker (4) - a massive denial of service attack against websites like
- •The iLoveYou virus, cleverly disguised as a love letter, (5) so quickly that email had to be shut down in many companies.The worm (6) image and sound files
- •6 Internet issues
- •In this module, you will:
- •In pairs, look at the computer graphics (a-d) and discuss these questions.
- •В Read the text on page 101 and check your answers to 3 and 4 in a.
- •What type of graphics software is used to make maps or 3-d models of the Earth?
- •In total.
- •Read the text and check your answers to a.
- •In pairs, discuss the question What is desktop publishing? in as much detail as you can. Then look back at the text on page 105 to see how much you remembered.
- •1 Multiple forms of media
- •In pairs, discuss these questions.
- •In pairs, discuss these questions.
- •Web page design
- •Visual basic and VoiceXml Work in pairs. Student a reads about Visual basic, Student в reads about VoiceXml. Try not to look at your partner's text. Complete your part of the table.
- •Click here -V-'
- •It professionals
- •I've never worked with databases.
- •Vacancies at eJupiter.Co.Uk Webmaster
- •In this module, you will:
- •Information and communications technologies (ict)
- •In pairs, discuss these questions.
- •VoIp technology
- •In pairs, describe your mobile phone.
- •In pairs, discuss these questions.
- •Small networks
- •How many types of network are there?
- •How do I install a wired modem router?
- •How do I log on to the Internet Service Provider?
- •What is wireless networking?
- •What do I need to set up a home wireless lan?
- •Which is better, a wired or wireless lan?
- •Internet Service
- •Ish aerial
- •In pairs, discuss these questions. Give reasons for your answers.
- •In pairs, discuss if you agree with everything that Matt says in his interview
- •In pairs, look at the statements about gaming (1-4) and say if you agree or disagree with them. Give reasons for your answers.
- •In pairs, discuss these questions.
- •Language work: future forms
- •Integrated into our lives. What do you think about number.
- •Curriculum vitae
- •It skills
- •Irregular verbs
-
Which hacking case inspired the film War Games?
-
When did Captain Zap hack into the Pentagon?
-
Why was Nicholas Whitely arrested in 1988?
-
How old was the hacker that broke into the us defence computer in 1989?
The history of hacking - Part 1
1971 - John Draper discovered that a whistle offered in boxes of Cap’n Crunch breakfast cereal perfectly generated the 2,600Hz signal used by the AT&T phone company. He started to make free calls. He was arrested in 1972 but wasn’t sent to prison.
1974 - Kevin Mitnick, a legend among hackers, began hacking into banking networks and altering the credit reports of his enemies. He didn’t expect that his most famous exploit - hacking into the North American Defense Command in Colorado Springs - would inspire the film War Games in 1983.
1981 - Ian Murphy, a 23-year-old known as Captain Zap on the networks, hacked into the White House and the Pentagon.
-
-The IBM international network was paralysed by a hacker's Christmas message.
-
-The Union Bank of Switzerland almost lost £32 million to hackers. Nicholas Whitely was arrested in connection
with virus spreading.
-
- A fifteen-year-old hacker cracked the US defence computer.
-
- Kevin Poulsen, known as Dark Dante on the networks, was accused of stealing military files.
*
/Л
€
В i- ;| In pairs, discuss which of the cases in Part 1 you had heard of.
Which do you think is the most important?
Language work: the past simple
A Look at the HELP box and then complete Part 2 of the text with the past simple form of the verbs in the box.
show spread steal launch attempt overwrite be infect affect
The history of hacking - Part 2
-
- David L Smith (I) prosecuted for writing the Melissa virus, which was passed in
Word files sent via email.
-
- The German Chaos Computer Club (2) on TV how to obtain money from
bank accounts.
-
- A Russian hacker (3) to extort $100,000 from online music retailer CD Universe.
A Canadian hacker (4) - a massive denial of service attack against websites like
Yahoo! and Amazon.
The iLoveYou virus, cleverly disguised as a love letter, (5) so quickly that email had to be shut down in many companies.The worm (6) image and sound files
with a copy of itself.
-
- The Code Red worm (7) tens of thousands of machines.
2006 - Hackers (8) the credit card details of almost 20,000 AT&T online customers.
However, subscribers to its service (9) (not)
<►
Past simple
-
We use the past simple to talk about a complete action or event which happened at a specific time in the past.
Past 1 Now
He began hacking in 1974.
-
We form the past simple of regular verbs by adding -(e)d to the infinitive.
John Draper discovered that a whistle...
We form questions and negatives using did/didn't.
When
did
Captain
Zap hack
into
the Pentagon?
He didn't expect that his most famous exploit...
-
There are many verbs which are irregular in the past simple.
Kevin Mitnick began hacking into...
For a list of irregular verbs, see page 166.
We form questions and negatives for irregular verbs in the same way as for regular verbs. The exception is be (see below).
When did Kevin Mitnick begin hacking into ...?
He didn't begin hacking until 1974.
-
We form the past passive with the past simple of be + the past participle.
IBM international was paralysed by hackers.
He wasn't sent to prison.
Why was Nicholas Whitely arrested in 1998?
В Read these landmarks in the history of the Internet and prepare at least five questions in the past simple.
Example:
What
happened in 1969? What did Ray Tomlinson do in 1971?
1969 - The US Defense Department establishes ARPANET, a network connecting research centres.
1971 - Ray Tomlinson of BBN invents an email program to send messages across a network. The @ sign is chosen for its at meaning.
-
- IBM sells the first IBM PC. BITNET provides email and file transfers to universities.
-
- TCP/IP is adopted as the standard language of the Internet.
1988 - Jarkko Oikarinen develops the system known as Internet Relay Chat (IRC).
1991
- CERN (Conseil
Europeen pour la Recherche Nudeaire)
creates the World Wide Web.
-
- The Internet 2 network is born. It can handle data and video at high speed but is not a public network.
-
- Online banking, e-commerce and MP3 music become popular.
-
- Napster, whose software allows users to share downloaded music, maintains that it does not perpetrate or encourage music piracy. However, a judge rules that Napster's technology is an infringement of music copyright.
2004 - Network Solutions begins offering 100-year domain registration.
2006 - Americans spend over $100 billion shopping online.
С PI In pairs, ask and answer your questions.