Unit 5 - 8 It2
Unit 5 - 8 It2
UNIT 5
INTERNET APPLICATIONS
Task 1 Make a list of all the things you can use the Internet for.
Task 2 Which of the Internet applications (1-10) you would use to perform
the tasks (a-j). Read Part 1 of the Internet FAQs to check your
answers.
a. Connecting a system of interrelated computing devices,
1. Email mechanical and digital machines, objects…… to achieve better
2. The Web performance and efficiency.
b. Accessing information on the web.
3. Newsgroups
c. Coordinating a large range of devices with internet con-
4. Chat – IM
nectivity to exchange messages, post status updates, share
5. IoT photos, videos and links.
6. FTP d. Enabling automatic synchronization across computers and iOS
7. Telnet devices of email mailboxes, documents, photos….
8. Web e. Transferring files from the Internet to your hard drive.
browser f. Sending a message to another person via the Internet.
9. Facebook g. Conducting a live conversation online.
h. Taking part in public discussion areas devoted to specific topic.
10. Icloud
i. Downloading and viewing documents published on the
Internet.
The
j. Communicating with devices over a network in plain text.
so popular that many people now regard it as synonymous with the internet itself. Although it
offers a more powerful and user-friendly interface than other internet applications,
technically, the web is just one of many internet applications.
What’s an IP address?
Internet Protocol addresses are numbers that computers use to identify each other on the
internet. For example, an IP address for vox.com is 216.146.46.10.
Email?
Email or e-mail (short for electronic mail) is a method for exchanging messages between
people all over the world using the internet and electronic devices (computers, tablets,
smartphones…). Email communication is not only used in lieu of letter writing, it has also
replaced telephone calls in many social situations and in professional environments.
Email addresses are written with a custom username at the beginning followed by the
email service provider's domain name, with an @ sign separating the two. Here's an
example: [email protected].
What does TCP/IP mean?
The language used for data transfer on the Internet known as TCP/IP ( Transmission
Control Protocol/Internet Protocol). This is like the internet operating system. Every
computer connected to the Net is identified by a unique IP address.
FTP?
The File Transfer Program (FTP) is a standard network protocol used for the transfer
of computer files between a client and server on a computer network.
Chat and Instant Messaging?
Chat and Instant Messaging (IM) technologies allow you to real-time conversation online,
by typing messages at the keyboard.
Telnet?
Telnet (Teletype network) is a client-server protocol used on the Internet or local area
network to provide a bidirectional interactive text-oriented communication facility using a
virtual terminal connection.
With Telnet, you can access remote computers through a text-based interface from the
comfort of your home or office. It helps you save time and fix problems easily thanks to using
plain text. Unfortunately, it’s not secure, boring (no graphics), and difficult to use because of
limitations of plain text and command typing.
Newsgroups?
Newsgroups are the public discussion areas which make up a system called Usenet. The
contents are contributed by people who post articles or respond to articles, create chains of
related postings called message threads. You need a newsreader to subscribe to newsgroups
and to read & post messages. The newsreader may be a stand-alone program or part of a web
browser.
Internet of Things?
The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances,
and other items embedded with electronics, software, sensors, actuators,
and connectivity which enables these things to connect and exchange data, creating
[Type here]
opportunities for more direct integration of the physical world into computer-based systems,
resulting in efficiency improvements, economic benefits, and reduced human exertions.
Social networking?
Social networking and collaborative services have grown rapidly, enabling people to
communicate and share interests in many more ways. Sites like Facebook, Twitter, Linked-
In, YouTube, Flickr, Second Life, blogs, Instagram, wikis, and many more let people of all
ages rapidly share their interests of the moment with others everywhere.
What is the cloud (icloud)?
The cloud describes an approach to computing that has become popular in the early 2000s.
By storing files on servers and delivering software over the internet, cloud computing provides
users with a simpler, more reliable computing experience.
For example, Google Docs is a cloud office suite. When a user visits docs.google.com,
he/she automatically gets the latest version of Google Docs. Because his/her files are stored on
Google’s servers, they’re available from any computer. Even better, he/she doesn’t have to
worry about losing her files in a hard drive crash. There are many other examples. Gmail and
Hotmail are cloud email services that have largely replaced desktop email clients such as
Outlook. Dropbox is a cloud computing service that automatically synchronizes data between
devices, saving people from having to carry files around on floppy disks. Apple’s iCloud
automatically copies users’ music and other files from their desktop computer to their mobile
devices, saving users the hassle of synchronizing via a USB connection.
Column A Column B
EMAIL FEATURES
When you set up an account with an Internet Service Provider, you are given an
email address and a password. The mail you receive is stored on the mail server of
your ISP – in a simulated mail box – until you next connect and download it to your
hard drive.
There are two ways to get email over the Internet. One is by using mail program
(known as an email client) installed on your computer, for example Eudora or
Outlook Express. The other way is to use web-based email, accessible from any web
browser. Hotmail and Gmail are good examples.
You can make the message more expressive by including emoticons, also called
smileys. For example, ;-) for happy, ;-( for sad, ;-o for surprise and ;-D for laughing
etc. You may also like to add a signature file, a pre-written text file appended to the
end of the message. The name given to unsolicited email messages is spam.
Task 6 Match the parts of the letter (A-H) to the descriptions (1-8).
D Dear Sir/Madam,
E We are writing to ask if you can help us with our school project. We are doing a survey of the major
newspapers in the European Union to find out which computer systems and desktop publishing
programs they use.
F We would be very grateful if you could tell us which hardware, graphic design and page layout software
you use at El Independiente. Could you also tell us how long your online edition has been running for?
Thank you very much in advance.
H Yours faithfully,
Katherine Powell
Katherine Powell, Student representative
[Type here]
Task 9 Find out IP addresses of these websites and explain the meaning
of their parts.
www.hcmute.edu.vn
www.sunderland.ac.uk
www.amazon.com
[Type here]
UNIT 6
THE WEB
Task 1 Look at the screenshot of a typical web page. How many of the
features (a-k) can you say in English?
Task 2 Read the following text and label the features on the screenshot
with the terms in bold.
At the top of the page is the URL address. URL means Uniform Resource
Locator - the address of a file on the Internet. A typical URL looks like this:
http://www.bbc.computer.uk/radlo/.
In this URL, http:// means Hypertext Transfer Protocol and tells the program to
look for a web page, www means world wide web, bbc.computer.uk is the domain
name of the server that hosts the website - a company based in the UK; other top-
level domains are .com (commercial site), .edu (education), .org (organization) or .net
(network); radio is the directory path where the web page is located. The parts of the
URL are separated by (dot), / (slash) and: (colon). Some sites begin fpt://, a file
transfer protocol used to copy files from one computer to another.
The toolbar shows all the navigation icons, which let you go back one page or go
forward one page. You can also go to the home page or stop the current transfer
when the circuits are busy.
[Type here]
Tab buttons let you view different sites at the same time, and the built-in search
box helps you look for information. If the feed button lights up, it means the site
offers RSS feeds, so you can automatically receive updates. When a web page won't
load, you can refresh the current page, meaning the page reloads (downloads
again). If you want to mark a website address so that you can easily revisit the page
at a later time, you can add it to your favourites (favorites in American English), or
bookmark it. When you want to visit it again you simply click show favourites.
On the web page itself, most sites feature clickable image links and clickable
hypertext links. Together, these are known as hyperlinks and take you to other web
pages when clicked.
Extension Meaning
1/ .aero a/ cooperatives
2/ .biz b/ gateway or host
3/ .com (.co in UK) c/ military agency
4/ .coop d/ government
5/ .edu (.ac in UK) e/ professionals
6/ .gov f/ aviation industry
7/ .info g/ commercial
8/ .int h/ educational and research
9/ .mil i/ international organization
10/ .net j/ non-profit organization
[Type here]
Task 5 Read the article quickly and find websites for the following tasks.
Google search engine. Its mathematical formulas surf the combined judgements of
millions of people whose website link to other sites. When you type Justin
Timberlake into Google's search box and go to the star's official website, the site is
listed first because more people are telling you it's the most relevant Justin
Timberlake site - which it probably is.
Skype on the surface looks like software that lets you make free phone calls over
the Internet - which it does. But the way it works is extremely clever. By using Skype,
you’re automatically contributing some of your PC's computing power and Internet
connection to route other people's calls. It's an extension of the peer-to-peer network
software such as Bit Torrent that allow you to swap songs - at your own risk if those
songs are under copyright. Bit Torrent is a protocol for transferring music, films,
games and podcasts. A podcast is an audio recording posted online. Podcasting
derives from the words iPod and broadcasting. You can find podcasts about almost
any topic - sports, music, politics, etc. They are distributed through RSS (Really
Simple Syndication) feeds which allow you to receive up-to-date information without
having to check the site for updates. Bit Torrent breaks the files into small pieces,
known as chunks, and distributes them among a large number of users; when you
download a torrent, you are also uploading it to another user.
Task 6 Read the article again and match the sentence beginnings (1-5) to
the correct endings (a-e).
Task 10 Link each word in column A with a word which it often occurs with
from column B. In some cases, more than one link is possible.
Column A Column B
bulletin board
domain button
file engine
graphical link
mobile map
search message
site name
synchronous page
text phone
web transmission
[Type here]
Task 11 Listen to the recording which explains how your browser finds the
webpage you want. Label the items in the illustration diagram.
6 3 3 4
3
a. Router
5 b. Domain Name System (DNS)
server
c. Remote Web server
d. Browser PC
e. URL
f. Internet Protocol address
[Type here]
UNIT 7
WEB DESIGN
My hobbies
I like music and computers. I can play the Spanish guitar and I love Latin
dancing. I have a mountain bike but my favourite sport is football.
My studies
I study at Politecnica University, Madrid. My favourite subjects are
Maths, Physics, Aeronautics and English. I have studied English for five
years. In the future I would like to be an engineer.
My favoutite city
Zaragoza is a multicultural modern ancient city, with 700,000 inhabitants
and over 2,000 years of history. Muslins, Christians and Jews have lived
together in peace for many centuries. It is famous for its ‘mudejar’ style,
and the charming character of its people.
Frames - rectangular areas that allow the display of different pages in the same
browser window
Cascading Style Sheets (CSS) - a mechanism for adding styles to web documents.
You could use HTML code to specify the font, text styles and background colour.
Nowadays, however, it is more common to use CSS. This makes it easy to apply
presentation changes across a website.
Graphics, clip art, icons, background templates, wallpaper, and transparent
images - common formats are .ipg (Joint Photographic expert Group), ideal for
pictures with many colours, .gif (Graphics Interchange Format), ideal for pictures
with fewer colours, and .png (Portable Network Graphics), which support 16 million
colours.
Hyperlinks - highlighted text or pictures (buttons, image maps, etc.) that act as links
to other pages. If you want to share information with people, you can use RSS feeds
and provide readers with a link to the feed. RSS allows subscribers to receive
updates of blogs, news, podcasts, etc. Before going live, you should check that all
the links work.
Audio, video and animation
Many website now incorporate audio files, and if you're designing a site, you may
like to insert songs, podcasts etc. The most common audio formats are .wav
(Windows wave audio format), .ra (RealAudio file) and .mp3 (MPEG-1 Audio Layer-
3).
Full-motion video is stored these formats: .avi (audio video interleave), .mov
(QuickTime movie) and .mpg (moving picture experts group).
If you want to inject something special into your web pages. You can use Adobe
Flash to include interactive animations and streaming audio. Additionally, you
can insert Java applets - small programs that enable the creation of interactive
files. Animations are made up of a series of independent picture put together in
sequence to look like moving pictures. To see or hear all these files you must
have the right plug-in, an auxiliary program that expands the capabilities of your
web browser.
Task 3 Read the text again and then match the sentence beginnings (1-6)
to the correct endings (a-f).
1. Instructions in HTML
2. Cascading Style Sheets are the way
3. A hyperlink is any clickable text,
4. A plug-in is a small program
5. Java applets are used to provide
6. RSS feeds are summaries of web content
Task 5 Study these seven points for evaluating websites. What questions
would you ask to evaluate a website on each point?
1. Design 5. Navigation
2. Easy of use 6. Accuracy
3. Up to date 7. Helpful graphics
4. Compatibility
Task 6 Study this flowchart for planning a website. Use it as the basis for
a short text providing advice on website planning. Your text
should have three paragraphs corresponding to the 3 stages in
this diagram.
Analysis
Who’s What’s
the target audience? the site’s purpose?
Begin your text like this: You need to plan your website carefully before you
go ahead and create it. There are three stages to the planning process:
1. Analysis
2. Design and implementation
3. Evaluation
UNIT 8
INTERNET SECURITY
1. Who is a hacker?
2. How easy do you think it is to infiltrate the Internet and steal sensitive
information?
3. What is a computer virus? How does it work?
4. How can you protect your computer from viruses and spyware?
Task 2 Read the following text quickly and see how many of your ideas in
Task 1 are mentioned.
There are many benefits from an open system like the Internet, but one of
the risks is that we are often exposed to hackers, who break into computer
systems just for fun, to steal information, or to spread viruses (see note below). So
how document we go about making our online transactions secure?
Email privacy
Similarly, as your email travels across the Net, it is copied temporarily onto many
computers in between. This means that it can be read by people who illegally enter
computer systems.
[Type here]
The only way to protect a message is to put it in a sort of virtual envelope – that
is, to encode it with some form of encryption. A system designed to send email
privately is Pretty Good Privacy, a free ware program written by Phil Zimmerman.
Network security
Private networks can be attacked by intruders who attempt to obtain information
such as Social Security numbers, bank accounts or research and business reports.
To protect crucial data, companies hire security consultants who analyse the risks
and provide solutions. The most common methods of protection are passwords for
access control, firewalls, and encryption and decryption systems. Encryption
changes data into a secret code so that only someone with a key can read it.
Decryption converts encrypted data back into its original form.
Malware protection
Malware (malicious software) are programs designed to infiltrate or damage your
computer, for example viruses, worms, Trojans and spyware. A virus can enter a PC
via a disc drive - if you insert an infected disc - or via the Internet. A worm is a self-
copying program that spreads through email attachments; it replicates itself and
sends a copy to everyone in an address book. A Trojan horse is disguised as a
useful program; it may affect data security. Spyware collects information from your
PC without your consent. Most spyware and adware (software that allows pop-ups -
that is, advertisements that suddenly appear on your screen) is included with 'free'
downloads.
If you want to protect your PC, don't open email attachments from strangers and
take care when downloading files from the Web. Remember to update your anti-virus
software as often as possible, since new viruses are being created all the time.
Note: Originally, all computer enthusiasts and skilled programmers were known as
hacker but during the 1990s, the term hacker became synonymous with cracker - a
person who uses technology for criminal aims. Nowadays, people often use the word
hacker to mean both things. In the computer industry, hackers are known as white
hats and crackers are called black hats or darkside hackers.
·
Task 3 Read the text more carefully and answer the questions.
1. A secure website can be recognized in two ways: the address bar shows the
letter https and a closed padlock or key is displayed somewhere on the
screen.
2. You have to type your username and password to access a locked computer
system.
3. This program displays a message when it detects spyware and other
unwanted software that may compromise your privacy or damage your
computer.
4. Private networks use a software and/or hardware mechanism called a firewall
to block unauthorized traffic from the Internet.
(a) (b)
https://www.bankinter.com
(d)
(c)
1971- John Draper discovered that a whistle offered in boxes of Cap'n Crunch
breakfast cereal perfectly generated the 2,600 Hz signal by the AT&T phone
company. He started to make free calls; He was arrested in 1972 but wasn't
sent to prison.
1974- Kevin Mitnick, a legend among hackers, began hacking into banking networks
and altering the credit reports of his enemies. He didn't expect that his most
famous exploit – hacking into the North American Defense Command in
Colorado Springs – would inspire the film War Games in 1983.
1981- Ian Murphy, a 23-year-old known as Captain Zap on the networks, hacked into
the White house and the Pentagon .
1987- The IBM international network was paralysed by a hacker’s Christmas message.
1988- The Union Bank of Switzerland almost lost £32 million to hackers; Nicholas
Whitely was arrested in connection with virus spreading.
1989- A fifteen-year-old hacker cracked the US defence computer.
1991- Kevin Poulsen, known as Dark Dante on the networks, was accused of stealing
military files.
Task 7 Complete Part 2 of the text with appropriate forms of the given
verbs.
1992 - David L Smith (1) ……………… prosecuted for writing the Melissa virus,
which was passed in Word files sent via email.
1997 – The German Chaos Computer Club (2) …………. On TV how to obtain
money from bank accounts.
2000 - A Russian hacker (3) ……….. to extort $100,000 from online music
retailer CD Universe. A Canadian hacker (4) ………… a massive denial
of service attack against website like Yahoo! And Amazon.
The I Love You virus, cleverly disguised as a love letter, (5) …..…….. so
quickly that email had to be shut down in many companies. The worm (6)
[Type here]
Cybercrimes
• Piracy - the illegal copy and distribution of copyrighted software, games or
music files.
• Plagiarism and theft of intellectual property - pretending that someone else's
work is your own.
• Spreading of malcious software
• Phishing (password harvesting fishing) - getting passwords for online bank
accounts or credit card numbers by using emails that look like they are from real
organizations, but are in fact fake; people believe the message is from their bank and
send their security details.
IP spoofing – making one computer look like another in order to gain
unauthorized access.
Cyberstalking - online harassment or abuse, mainly in chat rooms or newsgroup.
.
Distribution of indecent or offensive material.
Now complete each blank with the appropriate phrasal verb in the
correct form . In some cases, more than one answer is possible.
[Type here]
Task 10 Replace the verb in italics with a phrasal verb of similar meaning.
1. Don't discard your credit card receipts; they could help fraudsters.
2. Trying to penetrate computer systems is against the law.
3. The typical hacker is a young person who has not matured yet.
4. The best way to begin hacking into a system is to try to get hold of a
password.
5. If someone telephones you and asks for your password, don't provide it.
6. Hackers closed Hotmail for five hours.
7. Hackers accumulated a telephone bill of £1m for Scotland Yard.
8. The difficult thing was to determine how the website would look.
9. So you won't forget, record the ID number the support technician gives you.
10. Examine the manufacturers' websites before you phone for help.