Documente Academic
Documente Profesional
Documente Cultură
ilr
arnet
PatrickFitzgerald,
M ar i eM c Cu l l a g ha n dC a r oTl a b or
En gl i shfor
lcT
STUDIES
in H igherE d u c a ti o nS tu d i e s
Course Book
Series
editor:TerryPhillips
arnet
Publishedby
Ltd.
GarnetPublishing
8 SouthernCourt
SouthStreet
Reading
RG14QS,UK
Ltd.
Copyright@ 2011GarnetPublishing
MarieMcCullaghand CarolTaborto be identifiedasthe
The right of PatrickFitzgerald,
with the Copyright,Designand Patents
authorsof this work hasbeenassertedin accordance
Act 1988
All rightsreserved
No part of this publicationmay be reproduced,
storedin a retrievalsystem,or transmittedin
photocopying,recordingor otherwise,
any form or by any means,electronic,mechanical,
Any personwho doesany unauthorized
without the prior permission
of the Publisher.
act in
relationto this publicationmay be liableto criminalprosecution
and civilclaimsfor damages.
Firstoublished
2011
lsBN978 1 85964519 2
Data
BritishCataloguing-in-Publication
A cataloguerecordfor this book is availablefrom the BritishLibrary
Production
Serieseditor:TerryPhillips
Projectmanagement:
ValeDominguez,ClaireForsyth
Amandallic,KarenKinnair-Pugh
Editorial
team:KirstenCampbell,
ClaireForsyth,
review:JohnHawker
Specialist
Design:HenryDesignAssociates
and Mike Hinks
Photography:
SallyHenryand TrevorCook,alamy.com,
clipart.com,corbis,com,
gettyimages.com,
istockphoto.com
dreamstime.com,
Audio recordedat MotivationSoundStudiosoroducedbv EFSTelevision
ProductionLtd
Theauthorsand publisherwould liketo thank the followingfor permission
to reproduce
copyrightmaterial:
lmageno. 7 on page7 reproduced
with kind permission
of SymantecCorporation;lmageC
lmage2 on page 15 from www.apple.com;lmageno.
on page 10 from www.euroncap.com;
4 on page23 reproduced
with kind permission
of Nokia;Screenshot
on page24from
SysTools;
Resultsfistingson page35 with kind permission
of Google;lmageno. 1 on page39
reproducedwith kind permission
of StevenSengel,www.oldcomputers.net;
lmageno. 3 on
page39 reproduced
with kind permission
of TheInternetEncyclopaedia
of Science;
Graphson
page39 reproduced
with kind permission
of RayKurzweil;lmageno. 1 on page40
reproduced
with kind permission
of The International
SlideRuleMuseum;lmageno 3 on
page40 reproduced
with kind permission
of the NationalArchives,lmageno. 4 on page40
from www.ibm com; lmageno 2 on page43 reproducedwith kind permission
of BillDegnan,
www.vintage-computer.net;
lmageno. 3 on page43 from www.cisco.com;
lmageno. 4 on
page43 reproduced
with kind permission
of IntelCorporation;lmageno. 5 on page43
reproducedwith kind permission
of BelkinLimited;lmageno 6 on page43 reproduced
with
kind permission
of GeorgeMichael,www.computer-history.info;
lmageno 7 on page43 from
lmageno. 8 on page43 from www ibm.com;lmageson page
COREMemory/MarkRichards;
49 from YouTube,Flickr@,
Bloggerand Wikpedia;page58 (c)2010 Netscape
page59 My SQLis a registered
Corporation.Usedwith permission.;
Communications
trademarkof Oracleand/orits affiliates.Usedwith permission.;
lmageson page59 from The
ApacheSoftwareFoundation,
www.apacheorg, Linux,www.linux.co.uk
and The PHPGroup,
wuruvphp net; Screenshots
C on page63 reproduced
with kind permission
of Microsoftand
with kindpermission
Ubuntu;lmagesno 1 and 2 on page74reproduced
of Nokia;lmageno
3 on page74 reproduced
with kind permission
of Hewlett-Packard
Development
Company,
public
L.P.;lmageno. 4 on page74 from Toshiba
EuropeGmbH;Formon page79 contains
sectorinformationlicensedunderthe OpenGovernmentLicencev1.0;Texton page83 O
CengageLearning;lmageC on page87 from wannr.bodetech
com; lmageson page91
reproduced
with kind permission
of GrahamTurner/Guardian
News& MediaLtd 2006
Everyeffort hasbeenmadeto tracecopyrightholdersand we apologizein advancefor any
unintentionalomission.We will be happyto insertthe appropriateacknowledgements
in any
subseouent
editions.
Printed and bound in Lebanonbv International
Press:interoress@int-oress.com
Introduction
Englishfor ICT Studresis designedfor studentswho plan to take an ICTcourseentirely or partly in English.
The principalaim of Englishfor ICT Studiesis to teach studentsto cope with input texts, i.e., listeningand
reading, in the discipline.However,studentswill be expectedto produce output texts in speechand
writing throughout the course.
The syllabusfocuseson key vocabularyfor the disciplineand on words and phrasescommonlyusedin
academicEnglish.lt coverskey facts and conceptsfrom the discipline,thereby giving studentsa flying start
for when they meet the samepointsagain in their facultywork. lt alsofocuseson the skillsthat will
enable studentsto get the most out of lecturesand written texts. Finally,it presentsthe skillsrequiredto
take part in seminarsand tutorials and to produceessayassignments.
English for ICTStudiescomprises:
o studentCourseBook includingaudio transcriptsand wordlist
o the Teacher'sBook, which providesdetailed guidanceon each lesson,full answer keys,audio
transcriptsand extra photocopiableresources
. audio CDswith lectureand seminarexcerpts
Englishfor ICT Studieshas 12 units, each of which is basedon a different aspectof lCT.Odd-numbered
units are basedon listening(lecture/seminarextracts).Even-numberedunits are basedon reading.
Eachunit is dividedinto four lessons:
Lesson1: vocabularyfor the discipline;vocabularyskillssuchas word-building,useof affixes,useof
synonymsfor paraphrasing
Lesson2: readingoi listeningteit and skillsdevelopment
Lesson3: readingor listeningskillsextension.ln addition,in later units,studentsare introducedto a
writing assignmentwhich is further developedin Lesson4; in later listeningunits, studentsare
introducedto a spokenlanguagepoint (e.9.,making an oral presentationat a seminar)which is
further developedin Lesson4
Lesson4: a parallel listeningor readingtext to that presentedin Lesson2 which studentshave to usetheir
new skills(Lesson3) to decode;in addition, written or spokenwork is further practised
The fasttwo pagesof each unit, Vocabularybank and Skil/sbank, are a usefulsummaryof the unit
content.
Eachunit providesbetween 4 and 5 hours of classroomactivity with the possibilityof a further 2-4 hours
on the suggestedextra activities.The coursewill be suitable,therefore, as the core component of a
faculty-specificpre-sessional
or foundation courseof between 50 and 80 hours.
It is assumedthat prior to usingthis book studentswill alreadyhavecompleteda generalEAP(Englishfor
AcademicPurposes)coursesuchas Skillsin English(GarnetPublishing,up to the end at leastof Level3),
and will have achievedan IELTSlevel of at least5.
For a list of other titles in this series,seewww.garneteducation.com/
Book map
Unit
1 what is lcT?
Lis t ening .Sp e a k i n g
3 lntroductionto ICTsystems
Lis t ening . Sp e a k i n g
4 ICTin education
Reading . Writing
6 The lnternet
Reading . W ri ti n g
Software development
Lis t ening .Sp e a k i n g
8 Efficiencyin computersystems
Reading . W ri ti n g
9 Human-computer
interaction(HCl)
Lis t ening .Sp e a k i n g
1 0 E-commerce
and e-government
Reading . Writing
11 Computingand ethics
Lis t ening ' S p e a k i n g
Topics
o definingICT
. introductionto differentaspectsof ICT
.
.
.
.
.
embeddedand generalpurposesystems
data storageand management
control systems
communicationsystems
functionsof ICTsystems(datacapture,processingand output)
developmentmethodsand processes
waterfall,iterativeand prototypingmodels
planningthe development
process
open sourcesoftware
. efficiencyin computersystems
o reliability,security,speedand cost
.
o
.
.
. lawsand regulations,
includingcopyright
o principles
and ethics,includingprrvacyand surveillance
. the roleof hacking
o
.
.
.
virtualand mirrorworlds
augmentedreality(AR)
lifelogging
usingtechnologicalgrowth curvesto predictfuture development
Vocabularyfocus
Ski l l sfocus
Listening .
.
.
.
.
Unit
preparingfOra lecture
predictinglecturecontentfrom the tntroductton
understanding
lectureorganization
choosingan appropriate
form of notes
makinglecturenotes
Speaking . Speaking
from notes
. English-English
dictionaries:
headwords definjtions parts
of speech phonemes stressmarKers
countable/uncountable
transitive/intransitive
. stresspatternsin multi-syllable
words
. prefixes
Reading . usingresearch
questions
to focuson relevantinformatjonin a text
. usingtopicsentences
to get an overviewof the text
Writing
o writingtopicsentences
. summanztng
a text
Li s teni ng
.
o
.
.
Speaking
.
.
o
o
computerJargon
abbreviations
and acronyms
discourse
and stancemarkers
verband noun suffixes
. word sets:synonyms,
antonyms,etc
. the languageof trends
. commonlecturelanguage
. synonyms,
replacement
subjects,
etc, for sentence-level
paraphrasing
preparingfor a lecture
predictinglecturecontent
makinglecturenotes
usingdifferentinformationsources
. reportingresearch
findings
. formulatingquestions
Reading . identifyingtopicdevelopment
within a paragraph
. usingthe Interneteffectively
o evaluatingInternetsearchresults
writing
. reportingresearch
findings
Listening . understanding
'signpostlanguage'in lectures
. usingsymbolsand abbreviations
in note-taking
speaking . makingeffectivecontributions
to a seminar
Reading . locatingkeyinformationin complexsentences
writing.
. reportingfindingsfrom othersources:
paraphrasing
. writingcomplexsentences
. understanding
speakeremphasis
o
.
.
.
compoundnouns
fixedphrases
from ICT
fixedphrases
from academicEnglish
commonlecturelanguage
Listening
.
o
.
.
synonyms
nounsfrom verbs
definitions
common'direction'verbs
in essaytitles(discuss,
analyze,
Readipg
. understanding
dependentclauses
with passives
Writing
o paraphrasi ng
. expandingnotesinto complexsentences
o recognizing
differentessaytypeystructures:
descriptiveanalytical
comparison/evaluation
argument
o writingessayplans
. wnttngessays
. responding
to queriesand requests
for clarification
evaluate,etc )
. fixedphrases
from ICT
. fixedphrases
from academicEnglish
A
Z
speaking . makingeffectivecontributions
to a seminar
. referringto otherpeoplesideasin a seminar
o'n e u t r a l 'a n d ' m a r k e dwo
' rds
. fixedphrases
from ICT
. fixedphrases
from academicEnglish
.
.
.
o
Reading . recognizing
the writerSstanceand levelof confidence
or tentativeness
. inferringimplicitioeas
writing
10
o writingsituation-problem-solution-evaluation
essays
-. usingdirectquotations
. compilinga bibliography/reference
list
Listening . recognizing
the speaker's
stance
. w fl trngup notesi n ful l
Speak i ng o bui l di ng
an argumenti n a semi nar
. agreeing/disagreeing
Reading
. understanding
how ideasin a text are linked
Writing
o
.
r
o
11
n""l the text. The red words are probablyfamiliarto you in generalEnglish.But can you think of a
different meaning for each word used in an ICTcontext?Changethe form if necessary(e.9.,change a
noun into a verb).
Anna phonedthe languageschoolto sayshehad a virus and was too ill to work. Shefound a little bit of
chocolatein the fridge, pluggedin her CD player,and sat down to browsethrough her TV magazineand
play with her pet mouse.On the table there was a menu for a local Chineserestaurant.Anna was
choosinglunch when the postmanarrived with a packageaddressedto her. Shesteppedout to get it and
the door closedbehind her.Anna realizedher kevswere insidethe houseand shewas locked out.
B nead these sentencesfrom ICTtexts. Completeeach sentencewith one of the red words
from ExerciseA. Changethe form if necessary.
1 Selectan option from the drop-down
4 High-levelprogramming
numbersand symbols.
7 Thissoftware-.-, -.
8 One way to protect data is to encrypt it so that only someonewith the correct
, or password,can open it,
9 Most Internet
begin www.
10 Youmayneedto installa
I
n:
Crii
Anach
Add/ttg
fonti
Colort
gn
Aj
To: rJ flywheelGnetmailcom
C c:
Subject; Hello'
,
HrFolks
All'swsll hergdownon lhg lan Howare youdoing?
?padq
:'.'a--e
D:r
lg,*
G http://www.ny{imes.com/
m
HB .Mac Welcometo
Welcometo Times
Get Started
ffa-
'i
cr"Ci,eaC :::ck
r3.,'.'a:
-i:b
LeaC3:ffe:
is
i!::r.c
E ^ --^ ^ --
ser.de:
I
pr epar ing f or a lec t u r e o p r e d i c t i n g l e c t u r e c o n t e n t o m a k i n g n o t e s
A Wtratcanyou ...
1 develop?
2 process?
3 connect?
4 assemble?
5 install?
5 launch?
7 program?
8 computerize?
9 monitor?
T^
\^
\,\J!\,\
v\.^..^S
^\
1.=^-cl
Match each organization of information in ExerciseB with a method of note-taking from ExerciseC.
You can use one method for different types of organization.
6) titt"n to five lecture introductions.Choosea possibleway to take notes from ExerciseC in each case.
Example:
You hear: ln today's session,we're going to look at tCTin business.We wilt be looking at a car
manufacturingcompanyand discussing
four areasof business:administration,finance, researchand
development, and operations,to see what happensin each areaand how tCT supportsworkers in
these areas.
You choose: tree diagram
I
m ak ing n o t e s o s p e a k i n gf r o m n o t e s
Studythe pictures.
1 What do pictures1-5 show?Usewords from the box.
2 What doeseachpictureA-C show?
I W}IATE
ICT in busiress
administraf,on
eg., Inlerrel,
dalabases,wP, DTP,
e-ntil, inlrar-el
e.g., CAD,simuiaiors
eg., CAM
slock c,onlrol
advelisirg
sla$ ,eco.ds
compary docs
conlrol o{
Voduclion,
envronrY\enT
comftr/'/'ntcaTon
Z - sysler#
6oflw ar e de gqrer / ar ch;l ec;l)
- developrrenl
d;ff . pa,4s
program inleraclirg
in unprediclable way
5 -
operalion and
'ns*a/llFion,
ft\anTer]drce
using ARPANET
l17Z- US scienfrsis ard academic^s
117
3 -ARPANETu*l ;rier-uliorully
ea{y 80s - Inlenel - *o{d*ide
comV.*ers {or mililary ue. +
x-aiemic / x-ier*;f;c r ey-arch
infrarel
internal
rclwo,*, of
l;miled acc.ess
Advar*aqesof e-r',arl
'":tY
o taSt
o rnesSd$escheap lo serd
. can a#ach files, e.g'
docs, pholos,video
. can SeDdI rneSSage
lo rrnny Vople
Al ,
e><terrBl lnlefl1eT
ogn
woddwideaccess
Disadvaniaqes
+. 1
. Sometimes e-marls
geI losl
. *l-up costs higA
bompuler, elc)
. inforrnationovedoad
. SPam/Junkmail
. viuses
12
Prepare
o Getto the lectureroom early.
o Sitwhereyou canseeand hearwell.
o Bringanyequipment
you mayneed.
o Writethe date,topicand nameof the lecturerat the top of a sheet
of paper.
During a lecture ...
Predict
o Listencarefullyto the introduction.Think:What kind of lectureis this?
o Write an outline.Leavespacefor notes.
o Thinkof possible
answers/solutions/effects,
etc.,whilethe lecturer
isspeaking.
Produce
o Write notes/copyfrom the board.
o Recordsources- books/websites/names.
o At the end,askthe lecturer/other
studentsfor missinginformation.
13
usingan English-English
dictionary
helpyou understand
dictionarlr
and producespokenandwrittenEnglish?
A Howcanan English-English
Discuss
the pictureson the oppositepageusingwordsfrom this lesson.
1 .1
ICT
intranet
lrr\
I
us ing r es ear c hq u e s t i o n s
* ..HADFORD
..1
Foculty: ICT
Assignment
D o some reseorchi nl o l he use of IC T i n the
w orK P roce.
Moke notes to onsw er these questi ons .
I
95
17
. tOpicsentenges
. summarizing
lnternet video-conferencing
manager reorder communication
upgrade impossible
A Discuss
thesequestions.
1 Canyou rememberhow ICTis usedin
differenttypesof businesses?
2 What arethe benefitsof usingICT?
3 What arethe costs?
B fne lecturerhasaskedyou to do someresearch
into the changingnatureof work.
1 What effecthasICThad on the work that
peopledo?
2 Thinkof good research
questionsbefore
you readthe text on the oppositepage.
3 Lookquicklyat the text on the opposite
page.What isthe bestway to record
informationwhile you are reading?
18
2IC T IN TH E WOR K P LA C E
Chon g i nth
g ew oy w e w ork
job for
the past, nrany people staved irr the sar.rre
Jn
l'
Itheir whole life. When ICT first appeared in the
n'orkplace,manv people feared thev r'r'ouldlose their
jobs to machines.This was true ir-rsome cases For
example, robots have replaced largc numbers of
production line workers in the manufacttrring
industry. Serviceindr"rstries,
strch as banking, also cut
jobs when they brought in automated systems
Howe.",er,while technology has made some jobs
disappear,at the sametime it has creatednew types of
employment. These include jobs in areas such .rs
softw.ue engineeringand website design. Nolarlavs,
peoplehave to preparefor change,possiblvinvolving
letraining more than orrce
The introduction of modern technologyhas not
causedhigh unemployment,but it has meant tl-rat
workers need new skills. Many people have retraine'd
so that they can find nerr, n'ork in customer sen ice
industries,like call centres.Somehave nroved into the
ICT industry to n ork as developersor trainers.Others
have learnt to do theil old jobs in a rrew wav For
example, typists and journalists rrorv r,r,ork n,ith
computers instead of tvpewritc.rs.Sonre pcople find
that new technology has changed tlreir w,ork and
given them increasedresponsibilities.This can nrcan
that their jobs are nor\/much more interesting
ICT is not only changing the nature of rvork, it is
Most
alsostartingto changear/rcrcthat work is dor-re.
office r,r,orkerstravel to and from rvork cvery clar'.Nor'r,
companiesare starting to look at the possibilitiesof
teleworking, or telecommuting, wherc staff r.r'orkat
home or from a telecentre They use computers and
telecommunications
equipmentto stavin contactrvith
their office.
Telework has advantagesior both employers anci
emplovees.Firms save monev becausethev do not
need large offices They can recruit people who live
fr-rrtherawav or n'ho r,r,ouldfinci it clifiicult to n'ork
r-rormal office hours: for example, worncrr with
children. Hower.e1,it does mean that thel' lose dilcct
control over their workers. Employces save time
becausethey do not have to commute long clistances
^-'{
^^"
ru
lrzs
or
r ol r ^-^^^;-^
ur F) o l
their work to suit themselves The
disadvantasefor telervorkersis that they u',rrp o1,rt-r"
or
and may miss-sharingideaswith their collcagues,
Tl-rey
fincl
it
working as part of a team
can also
n'ork
home
lifc
difficultto separate
and
pogexii
t- --.'
-J
il
Paraphrase
of topic sentence
Supportinginformationand
examples(summarized)
o checkyoursummary.
checkthat the ideasflow rogically.
checkspellingand
grammar:lf your summaryisshort,it maybe just one paragraph,ForJlonger
summary,
divideit into paragraphs.
thesequestions.
A Discuss
1 Whendo you useICTor seeICTbeingusedaroundyou in your everydaylife?
2 What are the benefitsof ICTto your life?
3 Are there any disadvantages?
containsinformationabout an individual.
from satellites
systems
usesignals
to triangulate
their position.
This
informationcanthen be displayedin mapform to helpdriverstravelfrom one placeto another.
5 Global
6 Usethe remote
7 Bodyfunction
patient'scondition.
8 WAP phonesusewireless
..
protocol.
E Studythe words in box b. Findthe prefixand try to work out the meaningin eachcase.
automated
automation
automaton
binary
bidirectional
bia n n u a l
embed
encode
enable
output
outsource
outline
2A
'1'and '0',
system
usesonlytwo numbers,
devices.
predecessor
preformat
preprogram
ICTsystems.
T
I
\:::rvreweasxr I wrsHLrsrI tpr-llrltp-q!1. t,t,p
IIADFORD Uniuersity
Foculty: ICT
lecture:IntroductionnoICTsystems
. mR
a
PrflsH
F133A1"".,,1, o
-:
@
r what ICTsystemsdo
. different types of computers
2 What doesthe lecturergive definitionsof?
3 What is a good way to organizenotesfor this lecture?
gl
24
'--
6_
syllables.
ldentifythe word below in eachcase.Numbereachword.
6d titt"n to somestressed
Example:
You hear:
1 lec llekl
application
You write:
database
management
I
automated
electrical
binary
embedded
regulate
communicate
f unction
satellite
component
information
storage
control
instruction
system
process
I/o/S
I Flashdnve
Usei
Portablenenory
Oevt@
*,
it y
XtY HADFORDI' tti t'crs
Foculty: ICT
Encodingdoto
Microprocessors:
o brief history
Doto processing
StudentA
o Do someresearch
on encodingdata.
o Tellyourpartneraboutyourfindings.
StudentB
o Do someresearch
on data processing.
o Tellyour partneraboutyourfindings.
25
3.2.
A Youare goingto listento a continuationof the lecturein Lesson
1 Makea listof pointsfrom that lecture.
2 What isthe lecturergoingto talk abouttoday?(Clue:Lesson
3.2.research
task)
3 C) Listento the end of the.lastlectureagainand checkyour ideas.
4 Reportyour findingsfrom the research
taskin Lesson
3.3,Exercise
F.
a
b
c
d
e
f
g
i*--io
26
Dolo
informolion
Dolo
sy$em
Sl i d e1
Volve
opened
lo
leloulwoter
Sensor
delecls
woler
levelistoohigh
Volve
opened
to let
woler
in
Sensor
delects
level
isloolow
Sl i d e2
Flood
control
zone
volve
,------FloodOole
Minimum lanel
2Nm-
(onlrol
uolu, I
'data,'storage
'modern,'central
in'stall, con'trol
Nouns
Adjectives
Verbs
de'vice,ma' chine,re'sult
u'nique,se'cure
'program,'input
Multi-syllable words
somecontentwordshavethreeor moresyltables.
Multi-syllable
wordsare
normallystressed
threesyllables
from the end.
Example:
Ooo o Ooo
ooOo o
Thisistrue for mostwordsendingin:
-izel-ise
-5lS
-ate
-ifv
-ical
-ity
-ular
-al
-ology
-cy
'authorize,'summarise
a'nalysis
'automate,'regulate
'classify,'specify
'physical,nu'merical
u'tility, a'bility
par'ticular, 'regular
'decimal,con'tinual
metho'dology
e'fficiency
Exceptions:
Multi-syllable
wordsendingin the followinglettersare normallystressed
two syllables
from the end.
-lC
-ton
-ent
-tial
28
auto'matig bio'metric
app Ii' cation, con' versi on
com'ponent,e'fficient
diffe'rential
,- ,* -
" ---J
Completethe instructions
for usingthe
LearningResource
Centrewith wordsor
phrases
from box a.
and acronyms
c Studythe abbreviations
in boxb.
1 How do you sayeachone?
2 Dividethem into two groups:
o abbreviations
. acronyms
See Vocabularybank
CAL CLI GUI HCI HTML
HTTP IsP RAM ROM URL
USB VLE WIMP V\A/VW
30
.E
books browse/searchcatalogue
close cross-referencedatabase
electronicresourcesexiVlogoff hyperlink
index library log in/logon look up
menu open page searchengine
table of contents web page World Wide Web
ADFORD Uniuersity
leoming Resourte Cen|rre
lnstructionsfor use:
If you want to accessweb pageson the
, you must first
to the university intranet
with your usernameand password.You
can use anv
but the
defaultis Google.
for web
pagesby typing one or more keywordsin
the searchbox and clicking on Search,or
pressingEnter. When the resultsappear,
(highlightedin
click on a
blue)to jump to the web page.Click on
Back to return to the resultslisting.
You can also usethe universiw
of learningresources.
Click on ICT Resourceson the main
ComputerWeekly
Internatlonrl
Mdgazlne
Ilrc Cornputer
Jargor)
Buster
There are many
books
electronic resources
index
searchengine
cross-reference
hyperlink
catalogue
database
library
WorldWideWeb
table of contents
menu
translated into
jargon words when
we talk about using
computers and the
Internet for similar
look up
browse/search
PaSe
oPen
web page
close
exit/log off
log in/log on
functions.
There are many abbreviations and acronyms in computing. Learn some useful ones.
What
it means
HTML
human-computer
the way that a user works with a computer system
interaction
hypertext markup language a way to write documentsso they can be displayed
HTTP
hypertext transfer protocol a set of rules for transfering files on the WVWV, usually
on a website
includedat the beginningof a website address
(e.g.,http://www ...)
ISP
RAM
ROM
URL
USB
VLE
virtual learning
environment
WIMP
windows,icons,menus,
pointers
WIVIV
WorldWideWeb
ComputerWeekly lntematlonal
Magazlne
Discuss
thesequestions.
1 How are computersusedin educationtoday?
2 What are the advantagesof using
computersfor learning?
administration
learningresources
VLE
Look at the title of the text on the opposite
page.
assessment
communrcauon
1 What does'computer-assisted
learning'
mean?
2 What sort of coursescan CALbe usedin?
Make a list.
Virtuol LeorningEnvironment
CALhasalwaysbeen easylo
use.
Teachersdidnl like usirp CAL
so{*ware produo+sa* firs*.
CALis ius* anofhe, add'lionlo
lradilional leachinq me*hods.
CALhas,adically changedlhe way
peo?leleam.
In lhe {u}ure,leache.s will be
.eplacedby CAL.
*"
\"7
HADFORDLn rt'ct'sitj'
Computer-Assisted leorning
- o-?ulers
educ-atio^
:a.\5
in
grobe.
---g.ove-e^l
and
^Ye.tme^t
Computers
havebeenusedin educationsincethe 1960s.Initially,theytendedto only be usedin
computer-related
subjectsbecausethey were, unfortunately,
quite difiicult to use.This was
because
theyhadcommandline interfaces
(CLI). Usershadto typelong linesof textin orderto
getthecomputerto do something.
However,the 1980ssawtheadventof thefirst graphicaluser
interlaces(GUls) which weremuchmoreuser-friendly.
This improvement
in human-computer
interaction(HCI), togetherwith new subject-specific
software,made it viable to employ
computersin moresubjects.
Educationinstitutionsbeganto seethe valueof computer-assisted
learning(CAL). Many investedheavilyin equipmentandtraining,theoutcomeof whichcanbe
seentodayin manyclassrooms
aroundtheworld.
By the endof the 20thcentury,therewasa wholerangeof CAL softwareproductson offer. In
general,the first CAL programswere not terriblyexciting.However,in the late 1980s,CDROMs and other multimediaproductsbecameavailable.Thesemadeit possibleto produce
softwarewith sound and graphicswhich was also easy to distribute.As a result, more
buSinesses
becameinvolved in developingeducationalsoftware.The new productswere
attractiveand many studentsenjoyed using them. Nevertheless,
they were expensive.In
addition,they wereoftenperceivedto be just a differentway of learningor testingthe same
things.Teacherswho dislikedusingcomputerswere largelyable to ignorethem or conflne
themto self-study.
By contrast,it wasdifficult to ignorethe arrivalof the Internet,which heraldeda new phase
in CAL and had a huge impact on education.Although slow links and downloadtimes
characterized
theearlydaysof theIntemet,thedevelopment
of broadband
technologyprovided
much speedieraccess.The Internetprovidesan alternativeto textbook-based
learningand
accessto authentic,up-to-dateonline resources.Furthermore,it offers studentsa way to
communicate
with eachother,andwith theoutsideworld.Theycanevenpublishtheirwork on
the Web for others.Now CAL is morethana 'bolt-on'to traditionalteaching.It requiresnew
skills,suchastheabilityto find information,
evaluatewebsites,
or to collaborate
with othersvia
a network.
:ilecl
of
'roq
dJ
6 e o{i l
of cAu
\earnioq
o\
ULL
oo
Discussthese questions.
Tle, docw'rcnl cnrres from a iourrral. It has iAis year s dale. Il is a la"ge docuner*. TIe, websile addressends in .org T[e, websile address erds in .edu Tle,websile addresscontains .ac rl
^^tt $ a fut
al
tte. _
Scanthe resultslistings.Answerthesequestions.
1 What keywordswere entered?
2 Why wasjournalusedasa keyword?Why is it not in inverted commas?
c $nswerthesequestions.
1 Whichresultscontainabbreviations
or
acronyms?
34
Sign in
Wcb
lmages
Groups tlews
Frooole Maps
!E@.
@iffiltr*P
Web
+ "latest technology"
Journalof ComputerAssistedLearning-Vol
26. lssue 5
The Journal of Computer Assisted Learning is a quarterly,peer-reviewed,
internationaljournal
which
coversthe whole rangeof usersof informationand communication
technology to supportlearningand
knowledgeexchange.
^ttp://onlinelibrary.wiley.com/journal/10,11111%28lSSN%291365-2729
- Cached
An evaluationof comouter-assisted
learningin mathematics...
11 Jul 2010 -An evaluationof computer-assistedlearning in mathematics... International
Journalof
MathematicalEducationin Scienceand Technology,Vol 23
.';ww.
informaworld.
com/.. ./content-content=a746
869072 - Cached
JOLT- Journalof OnlineLearningand Teaching
15 Dec 2009 -A USB donglesimilarto a flash driveservesas the wirelessreceiver... , Journalof
ComputerAssisted Learning, 20(2),81-94.doi: 10.11111jJ365-27292004.00074
... Journalof Research
on Technologyin Education,
41(2),161-177.
...
olt.merlot.org/vol5no4/klein_1209.htm
- Cached- Similar
E-Learning
Journals
- Journalswith a focus on EnglishStudiesand Technology ... Publishedthreetimes per year,
30 Jun 2O1O
the magazinecontainsin-deptharticleson the latestlearningtrendsand developmentsas well as ...
Journal of Computer-AssistedLearning ...
,vww.english.heacademy.ac.uk/.../technology/journals.php-Cached-Similar*
IPDFITeachingComouterSciencein HigherEducation:
EnablingLearning...
24 Jun 2010 - More than just the latesttechnologybuzzword,it's a transformativeforce that's ... in
multimediaComputer Aided Learning. Journal (CALJ)...
fie-conference.org/fie201
O/papers/'1
100.pdf- Cached- Similar
Learninginteractionand networkedcommunities
20 Jul 2010 - A currentfocus is on designingtechnologiesthat incorporatelearninginteractionand dialogue
design.Paperin Proceedingsof International
Workshopon LearningInteractionand Learning Technology.
',vww.londonmet.ac.uk/ltri/research/interaction.htm
- Cached- Similar
AJET:AustralasianJournalof EducationalTechnology
15 Mar 2010- articlesin educationaltechnology,educationaldesign,multimedia,computer assisted
learning, and relatedareas.AJET is publishedby the AustralasianSocietyfor Computersin Learningin
TertiaryEducation(ASCILITE)...
wwwascilite.org.au/ajeUabout/about.html
- Cached- Similar
IPDF]LEARNINGAND TEACHINGAWARDS
15 Feb 2010- Technology-enhanced
learning, or computer aidedlearning (e-learning)
can be
institutionally
... assistedteachingsessions.Figure3 explainsthe processof learningfor all three ...
the latest technology and e-learningpackageswhich ... establishingcriteriafor e-learningdevelopment.
www becta.org.uk/page_docu
pdateO2_04
pdf - Similarpages
ments/research/ictres_u
Promotingcomputerassistedlearningfor personswith disabilities...
6 May 2010- The currenttechnologies allowcomputerapplications
...
with a higherdegreeof accessibility
Computer Assisted Learning (CAL)solutionsfor peoplewith visualdisabilities.
A basisof many accessible
toolsfor ...
iinkinghub.elsevier.com/retrieve/pii/S1877042810007597-Gached-Similar
'CAL'- Past.presentand bevond- Crook- 2010 - Journalof ComouterAssisted
Learning...
...2002) nor to regardthe latesttechnology as a replacementfor more traditional... and distancelearning,
Journal of Gomputer Assisted Learning, Vol. ...
onlinelibrary.wiley.com/doi|10.11111j.1365-2729.2009.00343.x/full
- Similar oages
*Note that this link refersto an institution that will no longer be
fu nded f r om J uly20 1 1 ,s o l i n k i s l i k e l yto b e c o m ei nacti ve.
35
E
I
/eil
litl
latl
lel
lel
ltl
la<tl
lju'^l
lol
/t'l
Common suffixes
Suffixes for verbs
Thereare somecommonverbsuffixes.
Theymakenounsinto verbs.The meaningis basically
make+ noun.
Examples:
-tze
computerize,mechanize,digitize
-(i)ry
-ate
-en
broaden,lengthen, strengthen
Suffix
pertorm
+ nce
+ tion
Noun
production
pertormance
computerize* + tion
computerization
manufacture + tng
manufacturing
coordinate
+ ton
coordination
specify
+ ication
specification
*both
-isel-ize (-isationl-ization)forms are acceptablein
BritishEnglish.
AmericanEnglishusageis -ize (-ization).
rr rcrrlrEDucArrol{
tf
Workwith a partner.
1 Choosean imageon the oppositepage.Usewords
from box b to describeit.
2 Yourpartnershouldguesswhichimageyou are
talkingabout.
Lookat Figure1.
1 Howwouldyou describe
the graph?
2 Whatdo eachof the lineson the graphshow?
ADFORDUziuersity
Foculty:ICT
lecturc: Thehisnry ol compuling
In order to fully understondthe currentstote
of the computer,it is essentiolto know obout
the key stogesin its technicolevolution.This
introductorylecturewill look ot thesestoges,
beginningwith the obqcus- firstusedto
colculoietoxesin Bobylonin 2500 sceond continuingup to the present.
The lecturewill exominehow, over time,
new colculotingengineswere developedfor
specificpurposesby inventors.lt will look ot
the woy in which the orchitectureof the
mochineswos limitedby the toleroncewith
which portscouldbe mode,usingthe
technologyot the time.
The lecturewill olso explorehow mochines
becomemorecomplexos inventors'
understonding
of computingdeveloped.This
includesthe kind of mochines
which hod to
be configuredfor eoch tosk,os well os
mochines
whichwere progrommoble.
In
oddition, it will look ot how doto wos stored
ond convertedinto inputtypessuitoblefor
the computer.Finolly,it will exominewhy
computershove becomenecessoryin wor
ond how militoryneedsin the 20thcentury
were responsiblefor so mony new
developments.
1985. Up
to 1.979,there was a
in the number of transistors.
During the same period, prices
. From 1979 to 1985, the cost
of the transistors showed a
o
5
E
35,000
20,000
10,0 0 0
o
c
.^
lu
I
g
'g1
o
E
I
r,ooo
1oo
01
0 01
0.001
10
1920
1930
1940
1950
Figur e1
600
500
o
Or
E8
400
9o
E?
300
ct
c
200
fl o
100
0
Figur e2
4r-
Transistors (x 1,OOO)
-+
pre-mechanical
computing
electroniccomputing
S l i de1
B.
Studythe topicsin Exercise
1 Write some key words for eachtopic.
2 Canyou matchthe topicswith Slides1-4?
3 What is a good way to make notes?
4 Make an outline for your notes.
6d tirt"n to Part 2 of the lecture.
1 Add informationto your outline notes.
2 Which of the topicsin Exercise
B are discussed?
ln what order?
S l i de2
a calculating
2 adding
b do
3 important people
4 jump ahead
c machine
d important point
5 perform
e key figures
6 invented
t move forward
7 device
g created
S l i de3
S l i de4
Mechanical
compulirg
2 The notescontainsomemistakes.Findand
correctthem.
Company
becaueIBM.
() l13Z- BusAmIT - D'fferenlial
Aruly.". comm.use = elec. molors&
qears, binarv
J'T
1 Completeyour notes.
wwz
ayplogue,usedvalves* relays.
syllables.
ldentifythe
f) titt"n to somestressed
word below in eachcase.Numbereachword.
chip
digital
programmability
addition
computation
magnetic
subtraction
calculation
cryptography
mechanical
transistor
The computer is
goods to record,it
Discuss
the researchtask set by the lecturer.
1 What kind of informationshouldyou find?
2 What do you-alreadyknow?
ontributionsto a seminar
o disagrees
politelywith a previousspeaker
o bringsin anotherspeaker
o givesspecificexamples
to helpexplaina point
mainpoint
2 What exactlydoesthe studentsay,in eachcase?
3 What otherwaysdo you know of sayingthe samethings?
askpol;lelyfor inforrnlion
E work in groups.
1 Lookat the pictureson the oppositepage.Decidewhichsetsof data in Figure1
the picturesrelateto.
2 Whichof the threeelementsshownin the graphhelpedcontributemostto
speedingup the development
of the Internet?Lookat the graphand makesure
you canjustifyyour decisions.
3 Conducta seminar.
Ohepersonshouldact asobserver.
42
.F
o
CL
o
L)
|l)
TD
e
o
at
c,
CL
t) ir :r " 1 ,1[) !)
Processor
speedl-"=-
^@
l9re?
''
oooooooooooo
' l- uoouoooev ooo
IIIIERFICE
ilssAGE
PR@ESSOR
o l o o o l o o o l o o g l o g o l gogl l
.1...t...1...1...1..
l-l,F:l,lI t|lT]
41--
Vocabularysets
It is a good idea to learn words which go together. Why?
o lt is easierto rememberthe words.
wordswith oppositemeanings,
.9.,analogue,digital
a generafword for a set of words, e.9.,arithmetic =
addition, subtraction, multiplication, division
e.9.,innovation,invention,advance
Describing trends
Youcanusea varietyof phrases
to discuss
trendsand statistics.
Examples:
Go up
nse
increase
grow
improve
soar
No change
Go down
fall
decrease
decline
worsen
d16p
plunge
plummet
Adverbs
slightly
gradually
steadily
significantly
sharply
dramatically
Stance
Speakers
often usecertainwordsand phrases
to showhow they feel about
what they are saying.Commonstancewordsare:
adverbs
phrases
arguably
naturally
unfortunately
of course,...
it's essentialtolthat
we might saythat ..
In manycases,
differentstancewordsand phrases
are usedin spokenand
written language.
Spoken
anotherthing
it seems
unfortunately
believe
Written
additionally
evidently
regrettably
contend
saythe samething in a
differentway
returnto the mainpoint
Seminar language
The discussion
leadermay:
askfor information
askfor opinions
bringin otherspeakers
Participantsshould:
be polite when disagreeing
makerelevantcontributions
Thatremindsme ..
Participantsmay:
agreewith previousspeaker
disagreewith previousspeaker
linkto a previous
speaker
Couldyou saymoreabout...?
paraphrase
to checkunderstanding So what you're sayingis ..
referbackto establishrelevance
Justgoing backto .
askfor clarification
Participants
maynot be sureif a contributionis new or relevant:
I'm sorry.Hasanybodymade the point that ...?
I don't know if thisis relevantbut ...
Noun
Verb
visill
visit
StudentA
Z By 2,010,
daia usilg VoIP pro*ocols was
decreas,ng rapidly.
Adjective
ATM LUIU.
Student B
o lfn 4O/O, +Ue ?R
?co+oco\ u:o.s .s*i\\
u.sed sofe *hon on$ o+hec ?io+oco\ on
*he lJn-tecne*.
r" *f+ec
eOO7, *con.sfec.s of doto using
P/P aco+oeo\s dec\ined .si6"ifieo^+tg.
c -ft e co*io of do-to vsin.3 -eomin.f
?co+oco\s ho.s incFeosed ce\o*ive *o
oveco\\ +coffie on -\he T61sa^.*.
d -lue ?coloc*ion
of :r5+4e^s+ do+o
usi^.3 s+ceohin.A ?fo+oco\s n ?OOQ
l.Jo.s ovef +dice os hueh o.s i* hod reen
'
\
a-n1
d vu
/ -
coaid
I MegaFileShare
Eile yrew
SelectType:
llep
lnyfypefil
.Anyryps |
^rndto
r ) $g_.1
lllgLj
glg-J
J!E!gU.J
*****
Wo i l d n e w s- 3 4 s]- 4 9 6 8w i l d ca l sd a n g e r
mp3
2 4 9 7 Kb
6 a 1 1 74 4 1 4
* * t* *
Wo n d n w s- 3 7 0 4 - &7 3 :w i l d cl sa l e n
mp3
1 1 8 8 Kb
32 170 152 24
* ttt_
So u n d a g e n cy- 8 2 1 6 - 8 3 8 8 - 8 l sn to u b
mp3
2 5 7 3 Kb
28 110 16324
Plcurevaullanimarbrary-24384:felines2g
jpg
3500Kb
24 144 164 24
Pctu r e va l l l a n ffa tb r a r y- 1 o 3 r q e n e r a l 2 3 f5
l fl
4 5 2 6 Kb
24 144 167 25
Ph o to - N a l u e - cl o se u p - d a n g e r o u s- 1 3 5 Ae wj p g
4 O5 OKb
52 106 18825
p easl s
l m a g e d o cto Fn e w sz4 - 3 4 3 - a n r m
2 8 0 0 Kb
67 82 173 183
*i**,
Piclurevaul-newsonline-animarrescue
5873Kb
21 147 16825
tttt,
Vr d e o - a r e sl n e w sL u b e - scr a tch r e p o n
6 6 5 Kb
Hotnews-onrine:endangered-23998
356Kb
69 122 16848
pdl
725Kb
45 135r833
Favoudlecatsrowdown 887334
pdl
208Kb
48 12516488
***,
***
* * * 'i
***r
t=ll!ll!
'
****t
****
****,
My favourite feline
Figu re 1
100%
90"/"
P2P
80%
70%
60"/"
HTTP
50%
40%
Streaming
30%
Vol P
20"/"
Gami ng
t0 %
0%
2007
-Other
2008
2009
20 t 0
20tl
20t2
20t3
2 0t 4
Browser(client)
Server
2 Browsermakes
link
1 User
-t clicks
data.
Figure3a: hyperlink,HTTPserver,HTML
Browser(client)
1
Server
User action
updatesoaoe
usinodata from cabhd
uodates
with data from server
Discuss
thesequestions.
File data
lnformation on file location
A and
2 Usingyour ideasfrom Exercises
81, write someresearchquestions.
T,
\J
Figure1
Two studentsparaphrasedpart of the text.
1 Which part of the text are theseparaphrases
of?
2 Which paraphraseis better?Why?
StudentA
rtn
*ho*
S tudent B
im?oc*on*
v.ses.s
direc+\g,
\)at.
cou\d
using
ovoi\os\e
*heic
qs
i-o.ge.s
Q\vg-in
rrdJo.advarc-e.
t.o^
o.s
o fsee\g
oc odd-o^-
Ta
r.rhen o ves'.sion of F\o.sh oq.s
"?OO3t
ce\eo.sed
.s*seomin.3,
o.
ohich inc\vde.d
"ide.o
vec$ hi.$h ?ro?oc*ion
of ,^)es v.s:er.s
do,-r^toqdad
The
+i{-.s+
o ureb-bosed
400.t-
+he
'ideo
?\u-in.
uros
"ideo
a
^ar{.'.ed
o ures-r.o.sed
Flosh
?t-o.gt-o6,
bcorisec
\jos
u)eb bcor.)sec.
i^ /q?6
=^+soduced
onino*ion
4 -O devetophen+
nou: rie,-r vidao o^d
uatooded
shot-in-g
*o
.$ouTuse,
q??\icqlion,
rn
5 THE IIITERI{ET
Web2.02
Reol
chonge
0rhype?
ftoS.Q
arepress
u,-
ry
....,..,
otKno
'
;q^ t
I
lt,
dd[blefl F,,sd,our rs
\r,
itrcgn,
\{r
," 'C ,d
$..rK
utwo frr)7'i",
2t
","i,;,.
I
' :;
*'T.flickr
1p'6.6.rav
vrzu
O@
| '.'| .d* -
et
atmondReri
Tagy!
. ,- ;
s l m py
the number before the decimal, so that 1.0 becomes 2.0, for
It was against this background that Flash and Ajax, the two
the decimal. Other writers, however, felt that the term Web 2.0 was
add-on
the changes.
-fhe
through
many
h orL. fixecl ancl there rvas little rnteractivrtv Over time, static
five billion images and YouTube n,as serving over tu'o billion
videos per day The other technology associatedwith Web 2.0 was
r r n d e s k t o pa p p l i c atio n s
Since the late 1990s,users have exchanged music and video files
flvpertext
Fronr 1998
Iessneed to download files using P2P irr order to share files, and
fall was p;radual and P2P remains popular for higher quality
Tr!
".tfs
u n d e r s t a n d i n gc o m p l e x s e n t e n c e s
If
are
are
, the
Studysentences
A-E on the oppositepage.
1 Copyand completeTable1. Put the partsof
eachsentencein the correctcolumn.
2 Rewritethe main part of eachsentence,changing
the verb from activeto passiveor viceversa.
changedfrom
to
was very important in the
d a ta
from databases.
development revolutionary
hypertext interactivity indexing
asynchronous refresh reload
writing complexsentences
I
)
Table l: Bre
/t4ain5
AtainO/C
lt\ain V
A web 2.0
were cau'rg
wkch supporled
a drop in PZP
l,af{ia
gfltCeS
Adv.plu'ases
OllerV
+ s/o/c
By Z0t0
onlire video
vewrE.
tbse.ial td.'qkiha
SacJ!,groqn<l
o elen did 5E begin?
wies
6/15)
rySW
- b6Aoo3
fucew
laqrcJea aooy
rl
I
Rapiclgraob
i!
frsa
a
a
a
ro
4 5E
-+
initiaUy liuitd
to US qnutsfu'es
la
> Soo4qVs
lr
fuo.re 4 5rl5
i.
i.
5p
rqlre.*qh
Go- aatn)
ctatn)
45Wq
fwfuk
ds tqce exckoive
F?9t.
,o
.'. eetl
= 3u +ses
la
LtAl FigA.4),q&el
= isZte
- laqtrJ.t, 3 u&.
822ooS
-+
es@.coa
xpl,tg
tp otb
ZyiceS
Reporting findings
Youcannotuseanotherwriter'swordsunlessyou directlyquote.Instead,
you mustrestateor paraphrase.
Thereareseveralusefulwaysto do this:
use a synonymof a word or phrase
active ) dynamic
data using VolP protocols ) VolP
traffic
subject
usea replacement
lmportant
youshouldaimto makesurethat 90%of the words
Whenparaphrasing,
you usearedifferentfrom the original.lt is not enoughto changeonlya
few vocabulary
items:thiswill resultin plagiarism.
Example:
Originaltext
Plagiarism
Ellipsis
sometimes,
if the meaningisclear;wordsare impliedratherthan actually
givenin the text.
Examples:
Thereare manyways(in which)data canbe transferred.
The servicehad a numberof key featureswhichallowed usersto comment
on diary entriesfrom other people,(whichallowedusersto) maketheir
entriespublic or private,and (whichallowedusersto) add otherusersas
their friends.
. li' i
,qffiP,'
'
12
back client
assurance design
design
end management
2 Which word in each phrasehasthe strongeststress?
programming
development
production project
requirements
Studythe phrasesin box b.
quality system specification tools
1 Completeeach phrasewith one word.
_---
to decide which
*:lgl:P:11
s:i:::llir::*:i:::
a statement ot
requirements.
of the development process
takes place when the site is uploaded to the
...:::P..Tr-:
Y.:9.::v-:::
1r1s::li::: .
These requirements are then andyzed using
UML (Unified Modelling Language),
in che diagram, and detailed
specifications are produced outlining the
functiondiry
as the features of
the site.
in
--,.-,
to
- the
i-
a number of a variety of
at the sametime
bear in mind basedon dealwith
from the point of view of
the beginning of the developmentof
Developing a website
Week 2
Week 3
Week 4
Week 5
Week 6
Week 7
A Gantt chart is a useful planning tool, especiallyfor project management.The chart makesit easyto handlea
situation where different stagesoverlap. For example, this chart shows some stagesof the evolution of a new piece of
software.The startof the processinvolvesthe creationof a specificationdocument.Then, using the specifications,
UML models of the software are made.The developersuse various criteria to decide on the best platform and design
tools. Simultaneously,mock-upsof the designare createdusing input from severaldesigners,and a numberof models
are preparedfor the client to choosefrom.
makeanewf riend.co m
HKiEilF'gT
aml
ME
uhry
ddud
cdedMr
adiF
elit d dhm ns
dh ouisd
h
d b@.1&h
rclutsl Ul 6l nim ad
MDMENEh, qUB lE
dbr
M.reElbb
(ryrsdpilM
nbldall@horoa ffi
||@ffiqutoub
Look up an ::,ilT:::fji:if".;..i
old fraend
;::frX';y*i""tT":i""
nnakeane.quyfraendl
"corn
r3
5l
F
L-l
\-;
o working prototype
. costsof production
ADFOR.D Uniuersity
Fotulty:l(I Studiet
(omputerSoftworeDevelopment
(letturell
leclule
ovelview
o Sofmore
process
developmenl
o Terhnicol
issues
o Specifying
feolures
of softwore
o Models
forsofMore
developmenl
o Plonning
production
sofmore
ondscheduling
o production methods
o scheduling
D
E
56
Fixedphrase
Followedbv .
1 An important
concept (is) ...
2 What do I mean
by ...?
an imaginary example
4 Looking at it
another way,
a concluding comment
giving a result of
something
5 In project
management
terms,...
5 Say.
a comment about a
diagram, or stage
7 The point is .
an explanation of a word
or phrase
8 In this way .
6) tirt"n to some stressedsyllables,ldentify the word below in each case.Number each word.
Example:
You hear: 1 con lkonl You write:
concept
requirements
dependent
f unctionality increment
documentation
proprietary
specification
features
prototype
spiral
2.
6d tirt"n to the final part of the lecturefrom Lesson
1 Completethe noteson the right by addinga
symbolin eachspace.
2 What research
task(s)areyou askedto do?
Studythe phrases
from the lecturein the bluebox.
Forwhichof the followingpurposes
did the lecturer
useeachphrase?
a
o
o
a
o to give an example
. to restate
LJ
resources
---
develory.-
a.*side conLol o{
clien*s-
changesin
req,irenenls
Z. destgn-
developrred rradels
1100s)
Usirg wa+er+all
nadel eaAie.tf"g"t
lirrc.los* ;f
Ganl* cha#s
et cetera
In otherwords,...
Let'stake ...
Let me put it anotherway.
I almostforgotto mention...
Not to mentionthe fact that ...
Plusthere'sthe fact that ...
Thefact of the matteris,...
You'veprobablyheardof ...
m ak i n g e f f e c t i v e c o n t r i b u t i o n s t o a s e m i n a r
IWhdorr
Home
Er1,\.,,1,
lntrn\Er$o(s, f,
_:,:,,,1
6.ffi*.tt.ilo'r
introducing
askingfor clarification
agreeing/disagreeing
clarifying
giving reasons
2 Reportto the classon your discussion,
for your decisions.
Absolutely.
7 SOFTWARE DEVELOP'IENT
Press Release:
Does open source'change
the game' for software?
cashmachine
desktop
computer
lottery
machine
ballpicking
phone
mobile
airfield
radarsystem
back end
operating system
development tools
open source
As we have seen
a reminderof previousinformation
An important concept is
a referenceto an illustrationOR
a logicalconclusionfrom previousinformation
As shown in
a resultof something
X = reminderof lastpoint, Y = new point
ln the caseof .
At the sametime, .
. basedon .
The point is .
in order to (do X, Y)
X = objective,Y = necessary
actions/conditions
ln other words,
Looking at it another way,
ln this way .
a resultfrom previousinformation
5ay .
an example
an explanationof X
New
Modeltype 1
Clarifying points
When we are speaking,we often have to clarify points.There are many expressions
whichwe canuse.
Examples:
Letme put' it anotherway ...
Lookat it thisway ...
Discuss
the followingquestions.
1 What is meantby efficiencyin computersystems?
2 What can be usedto measurethe efficiencyof the
itemsin boxa?
62
cluster
consume
convert
disrupt
distribute
drivedown
ensure
incorporate
mask
measure
playa rolein
interrupt
guarantee
contribute(to)
reduce
in c lud e
group
transform
balance,
share
assess
use
hide
AIDFORDUniaersity
Efiiciency
in systems development
Parts of a system
esTek
--:WhyUs I Guarantees
Us HelpCentre sign
Up I
| (ontact
rr rqn llt4ct
FF TFft.
bh
,n
;;:.T-"
ld.| t.i<
t-b
rrrtfraa
t gt
o.r.!F
o '9 m
:
t0
Q. Ar.FE
qc r .e- s
User applications
and services
Futek System
p""k.F."ol
I
storage
lv'a.]
I servers
,tr
system)
system(s)
operating
au
aarat,frooa.
-
{.
l:'
I multiple
operating
sysrems
2 dedicated
helplines
3 high-speed
network
connections
4 easy-to-use
panel
control
5 energy-efficient
pr0cess0rs
System administration
Edmin d;tal
| (secured) |
6 low-costdata
storage
7 system
diagram
f.t-.5'qq
sldro$*s:$r!-Err
...,-:ol,:e
E,r*;;rg*P:gfiflIFi:
HADFORDT Jnircrsir),
o descriptive
o analytical
o comparison/evaluation
o arSument
Readthe text.
1 Usingyour own words,make notesfrom
the text on informationfor your essay
question.
2 Work with another personwho has
chosenthe sameessayquestionas
you. Compareyour notes.
Studythe highlightedsentencesin the
text.
1 Underlineall the subjectsand their
verbs.
2 Which is the main subjectand verb
for eachsentence?
Word/phrase
2 data i ntegri ty
3 energy
circuitson the computer'smotherboard
proporti onal i ty provi di ngthe vol tagesrequir edby t he
mi crochi ps
Meani ng
thehordwore':
'Hiding
Using virtuol mochines to improve system efficiency
Good system design has always kied to balanceperformanceand cost.For designersof generalized
commercial systems,this has meant a careful analysisof the specificationsof component parts, to
ensurethat they can provide the necessaryfunctionatfy and reliability at the least possiblecost.
Where systemsare a key elementof commercial organizations,the level of system efficiency can
mean the difference between successand failure for a company.
Here is a list of questions which have to be considered
by systemsdesigners:
o What can be done to minimize system hardware
costs?
o What is the best balance between the level of
specification of hardware components in a system,
and their cost?
e What are the implications of these changeson the
overall operation of the system?
r How easily will the system architecture'scale up':
that is, increaseproportionally,if it needsto be
expanded?
r How can systemsbe designed to minimize their
effectson the environment?
Some answers to the above questions have been
provided by ttirtualization A key conceptof
virtualization is clustering, which means locating the
hardware elements of the system together in a data
centre or server farm. This makes it easier to orovide an
optimal environment for the hardware to woik in.
System maintenance is also simplified by clustering, as it
makes components easily accessiblefor repair or
replacement.Another concept is masking, wlich
involves rnaking the physical components of the system
appear as one virfual device to system administrators.
This makes it easier for them to manage the system.
Virtualization can be used for servers,storage and
networking. A key benefit of virtualization is that
physical components can be added or removed without
shutting down the system (this is known as'hof
swapping'). This provides great flexibility for system
designers as it means that processing,networking or
storage capacity can be scaledup or down very quickly
in responseto changesin the businessenvironment.
In addition to flexibility in system size, virtualization
allows flexibility in terms of the specification of system
components which can be used, although there are
limitations. The system developer's choice of
components is limited by the level of reliability required
by the system. For example, 'out-of-the-box' servers,
which are those purchased from manufacturers without
modificatio4 are typically both expensive and high
specification. They are ideal for e-commercecompanies
such as Arnazon which require very high levels of
reliability and data integrity (ensuring that data is not
F','i
i' -r:'::it{#@fi'::jf.#iei
"'
"i " $f4''i'"r'
r*r "
"i ;T
if?rJ'
1 ldentifythe dependentclause.
2 Copythe table under the sentences
and write the
partsof eachdependentclausein the table.
3 Rewritethe sentenceusingan activeconstruction.
Example:
Here is a list of questions which systemsdesigners
have to consider.
Readthe essayplansand extractson the oppositepage.
1 Match eachplan with an essaytitle in Lesson8.2.
sys+ems
de5grer5
w r i t i n g c o m p l e x s e n t e n c e so w r i t i n g e s s a yp l a n s . w r i t i n g e s s a y s
vrtualzalon
Essayquestion
Essayplans
t Jntroduction:
syslem
efficienc-yi
Z Define
J
imgor[anc.e
eyete-
So-e
oS
queelione
[o be c-oneidere.dl
giye essdyaims.
aims oS eeeag.
e$Sicienc-g,
lrirodw-lion:
Def,n;,lton o{ virlualizalion.
ha.doare
re\iabi\ilg,
minimi3in3 e$Tec-t on
enYrronment,
r-f Exa-y\eel
?Ce
lo
A-a3on
to
c-o|,
eneu.e
daLa
inte3ri[5,
tc,onomic- im?\ic.aLio^s in
ter-g
L.angac-lione,
Ircreasilg
of
5 Conc-\ueionl different
recluiremente
qnglcerg to
oi\\
3o-e
c-omyany
diqgerenL
-ean
oT [he.ee
queelione,
impor*arr.e o{ globalwarmilg as
Essayextracts
It is importantto acknowledge
that therehasbeenwidespread
recognition
of the impactof
global
pointed
virtualization
on
warming.As a 2006US EPAreport
out,at the time,data
centreswereusing15% of the electricityproducedin the UnitedStates.Thereportalso
recommended
thatthe technologyusedby the datacentresneededto be improvedif their
growthwasto continueat the samepace.However,
becausevirtualization
requireslarge
amountsof hardware
to be clusteredtogether,it wouldappearthat somemeansof coolingis
necessary.
Currently,
a highproportionof datacentresusechillers- elaboratewater-based
coolingsystems- to maintainan appropriate
temperature
for the hardware.
Theevidence
suggeststhatthesearenot alwaysrequired,as the exampleof Googlehasshown.
In considering
thesequestions,
it is worth lookingat the way in which Googlehas
minimizedhardwarecostsby usinglow-costPCsratherthan'out-of-the-box'
servers. Becauseof the low revenueper searchreceivedby Google,it is essential
that the cost of eachtransactionis kept as low as possible.The effectof a lossof
datafrom componentfailureis relativelylimited. At worst, it may meanthat the
userhasto re-runa search.
67
brackets
or
which
'Virtualization'is basicallyabout ..
.. itsdata centre(serverfarms).
... most data centres usechillers,or water-basedcooling
systems,to ...
... 'out-of-the-box' servers,which are those purchased
from manufacturers without modification ...
a commaor
... uninterruptible power supplies(UPS)- giant
a dash(-)
batteries which ...
immediately
after the word
or phrase
phrases
such
... component load rates:that is, the work performed
as that is,in
by each system component. ln other words, how often
other words
the components...
Remember!
When you write assignments,you may want to define words yourself.
Learnto usethe methodsabove to give variety to your written work.
Directionverbs
State... Say... Outline ...
What islare...?
Describe... Summarize..
Possiblestructure
Descriptivewriting
Listthe most important points of something:e.g.,a list of
key eventsin chronologicalorder; historyof a computer
system;a descriptionof a process,detailing eachstep and
what the outcomeof eachstep might be.
Summarizepoints in a logicalorder.
Example:
What are the key featuresof virtualization?
Describethe impact of innovative systemdesign on reducing
data centre power consumption.
. introduction
o description of process/system
o point/step 1/outcome
o point/step 2/outcome
. point/step 3/outcome
o conclusion
Analyticalwriting
Listthe important points which in your opinion explainthe
situation.
Justifyyour opinion in eachcase.
Look behind the factsat the how and why, not just
what/who/when.
Look for and questionacceptedideasand assumptions.
Example:
Explain the appeal of virtualization to systemsdesigners.
o introduction
o definitions
o most important point:
1,
example/evidence/reason
2,
example/evidence/reason
etc.
. next point:
3,
example/evidence/reason
4,
example/evidence/reason
etc.
o conclusion
o introduction
o state and define aspects
Eithen
o aspect 1: subjectA v. B
. aspect2: subjectA v. B
Or:
o subjectA:aspect1,2, etc.
o subject B: aspect '1,2, etc.
o conclusion/evaluation
o introduction: statement of
issue
o statement giving opinion
o define terms
o point 1: explain+ evidence
o point 2: explain+ evidence,
etc.
o conclusionimplications,etc.
Alternativelll,
o introduction: statement of
issue
o define terms
o for: point 1, 2, etc.
o against:point 1, 2, etc.
o conclusion:statement of
opinion
69
1
2
3
4
5
6
7
8
developmentI
hardwareI
project I
qua lityI
systemI
userI
visu a lI
i nput E
a assurance
b development
c device
to
d display
the
e interface
some
management
many
r,_._
thrs
g method
h specifications
that
HADFORDUziuersity
Baseform
constrain
evaluation
intuition
manipulate
measure
navigate
observe
response
sequence
u5e
Otherrelatedforms
Contraint
contrained
9 HUIVIAN.COMPUTERINTERACTION (HCI)
:--l#
\'{
1
c0mpany
executive
hardwear
desrgner
syslem
Iesler
interface
desrgner
psychologist
pr0lecr
manager
www
8oo
Definitions
A a numberof actionswhichfolloweach other.
usuallyin orderto attaina specificgoal
H this carriesinformation
fromthe individual's
to the cognitiveand motorsystems
environment
B a specificareawithinwhicha goal is to be
achieved
this systemprocessesinformation
to perform
work suchas knowing,understanding,
deciding
and problemsolving
r '[,
i!
' Wn
Fr=s1tili
i::,.'ffiffi"
1W ffi r
*.
\'-v
L It t t t','rsi t t'
HADFORD
Humon-compufer
interoction
o Humonsciences
sociol
- psychology,
disciplines,
orgonizotionol
knowledge
1 Completethe Notessectionbelow.
2 What is the lecturer'sstory about? Why is it not
given in the notes?
o Computersciences
- hordwore,softwore,
devices
3 Completethe Summarysection.
o Computer-bosed
usobilityevoluotionmethods
4 Answerthe Reviewquestions.
1 Researchhasshown
3 Completethe Summarysection.
4 Were your questionsin Exercise
A
answered?
of ...
Increasi ngl y,
w e f i nd that
6 It'strue to saythat
l l n terms of ...
8 S o i t shoul dbe cl earthat
a concl usi on
an i deathe speakerm ay
not agree with
tlotzs
HCf : 2..l*4uan sei (H5) and co,r.rpqtr sci. (C5)
HCz is
4
H5
I lrhin pqrpose * H5 ..?
Systztt d"siEtfrs drour on ---?
Ait.ase H5?
(5 speofic oir.rs)
that...
2 Write someReviewquestions.
Reviat:
? cu'tpowttts ol HCZ te?
flupcr+fiIcz o+ HCf r'tcans --7
syst
H5
t_
4
vorio..ls
desigt:rlrsdroto on H5 .
proyide
2 lrhin u&el?
3 fugroves
Srarqry.qrt
r'adellitg hq^aon
F.rotot-J cqnitMe)
o erqpiricat+
o gdcularly
(nHn
qre h*d
qse&4, q
crn dqf,o
d"stgtrt5
\
4
*'i.@recognizingdigressionso understandingspokensourcereferences
'l visual,input,design,haptic,output
2 mentalmodel,userinput,visualdisplay,
input device,actionsequence
generally,
actually,
ideally,
usually,
crucially
Extract2
Extract3
Extract4
Name of writer
Title and date of source
Location
Typeof reference
Relevantto ...?
lntroducingphrase
E Useyour notes to write 75-1OOwords about methodsof evaluating interfaceusability,
drawing on the human sciences.
F Work in groups.Studythe four methodsof usabilitytesting
linkedto the human sciences
in box c. Chooseone type you
would like to find out more about and then discuss
these
questions.
1 What kind of informationwill you needto find?
2 What ideasdo you havealready?
task,userand environment
analysis
focusgroup
cognitive
walkthrough
t h in k in ga lo u d
Work in pairs.
Student A: Think of good ways to take part in
a seminar.
StudentB: Think of bad waysto take part in a
seminar.
You are going to hear somestudentsin a
seminar.They have been askedto discuss
the
question:'What can computer-based
methods
contributeto usabilitytesting?'
1 Cd Listento the four seminarextracts.
Decidewhether eachcontributionis good
or poor.
2 Givereasonsfor your opinion.
3 Think of somemore informationto add to
the good contributions.
Work in groups of three or four.
your informationfor the topicsin
1 Discuss
Lesson9.3, ExerciseF.Agree on the best
definition.
2 Discusshow best to presentthis
information.
3 Presenta definitionand descriptionof
your topic to the whole class.
StudyFigure1 and Figure2.
1 What do the picturesin Figure1 show?
2 Studythe informationin Figure2 on the
oppositepage.In pairsor groups,discuss
the following:
a What doesthe informationshow about
InteractivityUn Iim ited?
b What other evaluationmethodscould
InteractivityUnlimitedhave used?
c Look at the usercomments.What
problemswith the web interfacedesign
could havecausedthese?
d Which interfacesdo you think E-Tail
shouldconcentrateon improving?Tell
the classabout your decision,saying
what it is basedon.
Fi gure1
metaphor
phonesite:
a
o
o
Limit the sizeof the site,so that it fits on the screenmore easily.
Keepthe number of clicksneededto getto information to a
minimum.
Ensurethat clickableitems areseparatedby enoughwhite space
so the userdoesnot click on the wrong link.
PC
-TV
Mobile
Smart phone
ir i
reduce
recite
reflect
review
Look again at the key words and the summary(and do this regularly).
Recognizingdi gressions
Lecturerssometimesmove
away from the main point in
a lectureto tell a story or an
anecdote.Thisis calleda
digression.You must be able
to recognizethe start and end
of digressions
in a lecture.
Sometimesa digressionis
directlyrelevantto the
content of the lecture,
sometimesit has some
relevancea nd sometimes,
with a poor lecturer;it may
be completely irrelevant.
Sometimesthe lecturerpoints
out the relevance.
Don't worry if you get lost in
a digression.
Justleavea
spacein your notesand ask
people afterwards.
Recognizingthe start
That remindsme ..
I remember once ..
By the way, .
Recognizingthe end
Nameand
As Dix pointsout
introducing
phrase
Toquote Dix .
Where
in human-computer interaction .
What
10
' neut r al' a n d 'm a r k e d ' w o r d s . e x p r e s sni g c o n f i d e n c e / t e n t a t l v e n e s s
Marked
rise,increase
rockel, soar
fall, decrease
big, large
gooo
small
Readthe scriptfrom a news programmeon
e-commerce.
1 Usea markedword in placeof eachof the blue
(neutral)words.
2 Look at the red phrases'How strongare they?
*
'.| " HnoPoRDi ,rrrr,'irr
E-commerce
ond e-governmenl
...r.-l
.f-
d,
(
I
I
i
probably caused
may havecontributedto
was possiblyone of the factorswhich
contributed to _--
The evidenceindicatesthat
A recent surveyhasfound
It is obvious...
Most writers agree
The evidencesuggeststhat ... -
Theirsurveyfound ...
Example:
Theavailabilityof browserencryptionI and I secure
webserversI areusuallythoughtof I asgtobal
factors,I while I nationalfactors I include I both I
thelevelof Intemetpenetration
andits speed...
A
Developments
in technicalinfrastructurecanoften
be carriedout quickly,whereasotherinfrastructure
which requirepoliticalinterventiory
developments,
take place over much longer timescales.
B
This data shows how, by implementing a technical
infrastructure to put Singapore'sregulatory
frameworks online, the government could directly
influence the take-up of e-commerceby businesses.
Overcomingbarriersto e-commerce
E-commercehas tremendouspotential to speedup, simplify and reduce the cost of all kinds of
commercial and non-commercialtransactions,and to provide easyaccessto global markets.
Howevel, the evidenceindicates that there are significant barriers to e-commerce,resulting in huge
variations between regions and countries.It is obvious, therefore,that by identifying thesebarriers
and devising ways to overcomethem, significant benefits can be delivered.
Bajajand Leonard [1] have suggestedthat factors affecting e-commercepenetration can be grouped
under three headings:culture, technology and policy. Thesefactors can be further grouped in terms
of whether they are global or local. A recentsurvey has found that the most important global cultural
factor for international companiesis ensuring that their e-commerceweb interfacesappeal to
different nationalities. Most writers agreethat key local cultural factors include the level of trust
between individuals, and also between individuals and their institutions. Technicalfactors can aiso
be global and local. The availability of browser encryption and secureweb serversare usually
thought of as global factors,while national factors include the level of Intemet penetration and its
speed which are both very low in many developing countries.
Many writers seemto agreethat government legislatiory such as setting targets for Internet
connectivity and bandwidth, can have a significant effect on e-commercepenetration.In addition,
government has a role to play at all levels.As Haag, Cummings and McCubbrey [2] point out
"Loaal, regional, and national govemments can play a key role in promoting the adoption of
e-commerce".Local and regional government can identify savingswhich e-commercecan provide in
the delivery of public services,and highlight the benefits it can bring to businesses.Developmentsin
technicalinfrastructure can often be carried out quickly, whereasother infrastructure developments,
which require political intervention, take place over much longer timescales.
The evidence suggeststhat, in addition to the technical infrastructure, the legal, financial and
physical aspectsof a country's infrastructure also need to be considered.Roubiah, Hassanienand
Khalil [3] assertthat "well-developed legal and regulatory frameworks" are an important factor in
the rapid adoption of e-commerce.Consumer protection legislation ensuresthat goods sold are good
quality. The state of the physical infrastructure determineshow far and at what cost goods can be
delivered. Similarly, the stateof the financial inJrastructurewill determine whether payments can be
made quickly and securely.As Ou, Sia and Banerjee[4] point out, if trust in the quality of goods and
servicesis low, there is likely to be less demand for online payment methods, as buyers may want to
checktheir purchasesbefore paying. The evidencefrom a BBC report [5] on China's e-commerce
supports this position.
Lefs look at an example of government intervention to improve in-frastructure.In 2004 Teo and
Ranganathan[6] examined e-commerceuptake among companiesin Singapore,which already had a
huge level of Internet penetration.Their survey found an astonishinglevel of e-commerceuptake
among traditional 'bricks and mortar' companies.Much of this was due to the tremendouswork by
Singapore'sgovemment in promoting the benefits of e-commerceto thesecompanies.During the
1990s,the govemment funded a gigantic e-commercesystem for non-commercialtransactions,
allowing companiesto submit import and export data. The system slashedtransactiontimes
dramatically from four days to around two minutes, demonstrating to businessmanagersthat
e-conunercecould be what Teo and Ranganathan[5] term a "strategicbusinessdecision and not just
a technology decision." This data shows how, by implementing a technicalinJrastructureto bring
'e-corunerceto Singapore'sregulatory frameworks, the government could directly inlluence the
take-up of e-commerceby businesses.
ii1
for consumers?
and disadvantages
Tabl e1
Situation
Problem
Solutions
Tabl e2
3 Write a concludingparagraph.
Solution
Argument for
Argument against
Table 1: Referencingbooks
Author(s) Place
Publisher
Date
Pages
Volume
Nameof journal
Table 3: Referencingwebsites
CaseStudy I
Up to the early 1990s, travel agents sold
airline tickets and passengerbooking details
were stored on computers shared between
airlines. Older companies dominated the
industry, and it was very difficult for new
companies to compete. The growth of the
Internet made the e-ticket possible.Details of
bookings could be stored on an airline's
computers and printed off the Internet by
customers.Ryanair, a 'no-frills airline', used
this as an opportunityto gain market share.By
I t i s g e n e ro l l y o g re e d th o t for e-commerce
to grow qui ckl y i n o country,
c o n s u me rsn e e d s e c u re m e th o d sfor moki ng pqymentsonl i ne.
I n C h i n o , re l o ti v e ty fe w c o n sumershove credi t or debi t cords. D espi te the
f o c t th o t e -c o mme rc tro
e n s o c t i ons ore the qui ckest w oy to poy, evi dence from
0u, Sio ond Bonerjee (2005) suggests thot monyconsumersdo not wont to poy
on l i n e . T h e y h o v e c o n c e rn so bout the quoti ty of the goods they ore orderi ng
on d w h e th e r th e y w i tl o rri v e . B y poyi ng on del i very, they con check thot the
goods ore os described ond hqve not been donogedduring tronsportotion.
References
[]
A. Bajaj and L. N. K. Leonard, "The CPT framework: understanding the roles of culture,
policy and technology in promoting ecommercereadiness,"in ProblnnsandPerspectiaes
in
Managanail,vol. 3, 2004, pp.242-252.
t2l
t3l
t4l
t5l
t6l
(
I
-J
payment collection
regulatory framework
technical infrastructure
virtual storefronts
Beingtentative
Beingdefinite/confident
Recognizing'marked' words
Manycommonwordsin English
are'neutral',i.e.,theydo not implyanyviewon the partof
However,
whichare'marked'.They
the writer or speaker.
thereare often apparentsynonyms
showattitude,or stance.
Examples:
Neutral
Onlineclothingsa/esroseby 10%.
Marked
Online clothing salessoared by 10%.
84
Marked
soa?rocket
slump,plummet
say, state
IO E-COIIiIERCEATIDE-GOVERI{MENT
national
governments
can
help
in every part
of the world
can
help
promote
tn many
e-commerce different ways.
Title of book
Author
Title of lnternet
article
BBC.
Author
Title of article
Placeof publication
Publisher
London:
Date
(or'n.d.')
Date
Full URL
Date of retrieval
Available:[Accessed:
June20081
Title of journal
A. Molla
" E-government
Journal of
vol. 52,61-69,
and
and e-commerce, lnternational
P.5. Licker partnersor rivals?" ElectronicCommerce
Date
2008.
*lnstituteof Electrical
and Electronics
Engineers
More informationon referencing(includingother systemssuchas APA and MLA) can be
found at: http://libguides.murdoch.edu.au/IEEE
or http://owl.english.purdue.edu/owl/section/2
link ing i d e a s
F
86
Computer ethics
Computers play an increasingly important role in our
is that decisions made by computer
society.
professionalshave an
people. -,
on a growing number of
was at
risk. -,
if found responsible for the death and
destruction becauseof negligence,he faced a large fine
1 computer professionalsI
a death
2 lossof life E
b employee
3 environmentalE
contamination
c failure in
standards
4 negligencel
d destruction
5 conflict of opinion I
e disagreement
5 computerprofessional!
f ficontractors
censorship.
B odys c ann e r
D N A te s ti n gs y s te m
system
5urvei l l ance
Leqislalion
*
'..,:r' HADFORD1 ;rir,';,rI
Generol Knowlege Gluiz
I
Di-citalMillenniurnCopyri-uht
Act TDMCA)
it
cybel cri me
EulopeanUnion Copyri_eht
Directive
( E UCD )
ernailfbrgely
keylog-uer'
CtlrxputerMisuseAct
rnalware
Hacker'sManif'esto
tr
UK DataPlotectionAct (DPA)
World IntellectualPropertyOrganization
(' colxputerll'itud
( w l Po)
(DRM) sofiware
Digital rightsrnanagement
hacker'
Trojan
identitytheft
phi shi ng
botnet
*,
\:'/
HADFORD
VisilingSpeoker:Dr W Mifthell
l5th Februory5.00 p.m.
'Ethicsond computers:
decision-moking
for the computingprofessionol'
Dr Mitchellwill explorekey foctorsin
ethicoldecision-moking
in todoy's
ropidlychongingenvironment.
'What
To some degree...
i n an attempt to ...
s t r es sin p h r a s e s . b u i l d i n g a n a r g u m e n t
disciplinary
action
blackhat
identity theft
denialof service
software exploit
socialengineering
illegalactivities
bulletin board
*,
\'- v HADFORD Utti ucrsi r.v
'What
a
b
c
d
e
f
giving a counter-argument
givingyour opinion
statingthe issue
supportingthe reasonwith evidence
rejectinga counter-argument
giving a reasonfor your opinion
In groups,discuss
the researchtask set by the
lecturer.Talkabout thesequestions:
1 What are the three pointsin relationto
hackingthat you will need to consider?
2 Which one will you choose?
3 What ideasdo you alreadyhave?
4 What kind of informationwill you need to find?
5 Where can you go to find more information?
Reportbackto the classon your discussion.
In Lesson11.4you will take part in a seminaron this topic.
s t r e s si n p h r a s e s. m a k i n g e f f e c t i v e c o n t r i b u t i o n s t o a s e m i n a r
blackhat hacker
known softwareexploit
technicallegal breach
passwordprotection policy
Internet safetyg uidance
secureequipmentdisposal
1
client
data
legal
penetration
pnvacy
reverse
root
I
successfu
target
unpatched
testing
system
access
protection
outcome
legislation
exploit
engrneenn9
consent
situation
Doesanybodyhaveany opinionsor
anythingthey would like to add?
I think we need a different viewpoint.
OK,to continuethen ...
Followingon from what X hassaid ...
II COiIPUTIIIGATIDETHTCS
I n n er W e S
b e c u r i tyG on su l tan ts
Latest guidance and information on:
Internetuse
Networksecurity
Generalsecurity
EmploveeInternetsafew ouidance
Passwordorotectionoolicv
Buildinoentrvsecuritv
Securitvaudit checklist
Technicalouidanceon blockingunsafesites
Guidelinesfor memorystick
use
Secureeouipmentdisoosal
Networksecurityguidelines
Guidanceon emoloveee-mailmonitorino
Anti-virussoftware
Emptoyee
Monitor
Logs
lile
,.iP
eontrols
Options
Help
ProsramsUsed
+ Pr-ogram(s)
Logged
Options
General
StartupandAccess
Settings
WebsitesVisited
0 Website(s)
Logged
N*vt
KeystrokesTyped
Keystroke(s)
Logged
i:-. ,,Screenshots
l&'
zscreensnot(s)
Block Programs
program
!;nti0ure
LoggingSettings
Logging
Configure
Options
, E-mailLogDelivery
Remote
Contigure
-=f
Delivery
Linking words
We use linkingwords and phrasesto join ideastogether in a sequence,
to show how
the ideasare related.
Somelinkingwords can be usedto join independentand dependentclausesin a sentence:
Examples:
The decisionsmade by computer professionals
Eecausecomputers play an increasingly
have an impact on large numbers of people
important role in society,the decisions
OR
becausecomputers play an increasingly
made by computer professionals
have
important role in society.
an impact on large numbers of people.
Other linkingwordsjoin sentences
in a text.
Example:
Computersplay an increasinglyimportant role in society.As a result. the decisionsmade by
computer professionals
have an impact on large numbersof people.
when buildingan argument,it is a good idea to use linkingwords to add points:
Examples:
Firstly,...
ln addition, ...
For example, ...
Moreove4...
Another point is ...
... whereas...
Secondly,...
Finally,...
Firstmention
Secondmention
Third mention
Fourthmention
lT workers
computer
professionals
people in ICT
more .
rising numbers of ..
growing ..
increased..
Tear<, +
?riva.J
A result of thlse 'Big Brother' fearswas the privacy Act of 1974,which apptied
to government only and did not cover commercial systems...
o makingsurethe grammaticalwords are put back in, e.g.,
Notes:
-)
\eqie\ation
copied
bq dk
Building an argument
A commonway to build an argument is:
1 First,statq the issue:
Doesgrey hat hacking help improve the levelsof securityin company systems?
2 Next, give a counter-argument:
ldeally, there should be no reasonto break the raw by accessingcomputer
systemswithout their owners' permission.
3 Then give your opinion:
ln fact, even white hat hackerscan break the law at times.
4 Then give evidencefor your opinion:
The example of how grey hat hackershetped improve Apache securityin 2000
provides evidence to suppott this position.
Summarizing a source
When we talk about the ideasof other people in a lectureor a semina4we often
give a summaryof the sourcein a sentenceor two.
Examples:A book by (name of writer) called (name of book) publishedrn (year)
gives an explanation of how ...
Briefly,(name of writer) explainshow ...
An introduction to (topic) can be found rn (name of writer).
referringbackr introducingquotations/paraphrases
anticipate archive
augmentation contingency
create demonstrate doubling
eventuality geospatial locate
mirror prediction produce
propose reflect revolutionize
show stable storage
suggest transmit
2 Which verbshavesimilarmeanings?
3 Which verbsare not followed by that?
4 When can you use each verb?
Example:
accept= the writer (reluctantly)thinks this idea
from someoneelseis true
Readtext B on the opposite page. Look at the
highIighted sentences.
1 What is the purposeof eachsentence?
Example:
Mirror worlds model the world ... = statement of fact
2 In an assignment,
shouldyou refer to the highlighted
sentencesby quoting directly or paraphrasing?
3 Choosean appropriate introductory verb and
write out each sentenceas a direct quotation or
a paraphrase.Add the sourcereferencewhere
necessary.
Readeach of the texts on the opposite page.
1 ldentify services(suchas Google Earth)which you use
or know about, in each of the four categoriescovered
by texts A-D.
2 Discuss
which technologyyou find most usefuland
write a short summaryof your conclusions.
Virtuol worlds
Virtual
norlds
distinct lrom
even'da1'life.
They
began as text-based
role-playing games, whose plavers rvere mainlv those u'itl-r lots of timc and a vivid imagination. As
computer graphics improvt'd. thev rnadc it possible to create detailed visual representations of the virtual
rvorlds in r'ririch thc sames or rolc-plavs take placc. A conrnon figure in almost all of these is the avatar.
This can be a human or fantasy figure and represents a plaver n'ithin the rirtual l.orld. Tivo visions exist
for the future development of virtual worlds. In the first vision all the activities of the real world can be
carried out. Such a world can act as a platform lor the provision of training and education, and for the
delivery of scn'ices and customer assistance. The second is more limited. It is simply somewhere
individuals can have fun inte racting n itl-r other plavers in a varien' of role -plav acti\-ities.
S. Green and T. Ashley,"Exploring the future of virtual worlds," Journal of Computer lnteraction,vol. 42, pp. 24-32, May 2OOa.
page 429
Mirror worlds model the world around us, mirroring the geospatial reality that we experiencein our everyday lives.
They createan infrastructurewhich can capture,store,analyzeand managedata which is spatiallyreferencedto the
Earth Other data,such as the locationof specificservicesor resources,can then be mappedonto thesemapsand
images.An importantrole which has beenproposedfor mirror worlds is as a tool for managersto manageassetsin
the real world. It is clear that mirror worlds can play a key role in helping managerswith contingencyplanning,so
they can anticipateevents,ratherthan reactingwhen they occur.However,it appearsthat the successfuluse of
mirror worlds for contingencyplanningis very dependenton the quality of the data used.As Ding' (2009) states,it
will be some time before it is possible to "look into a computer screenand see reality". Relatively low-cost GPS and
camera technology, such as that used for Google Streetview, show how it is possible to capture large quantities of
high-qualityvisual data quickly.
W. C h e n , " P r e d i c tive kn o wle d g e m a n a g e m e n tu sin g d atafrommi rrorw orl ds,"FutureD esi gnTechnol og,es,vol
14,pp.429-450,Jan.2010.
link ing id e a s i n a t e x t . q u o t i n g a n d p a r a p h r a s i n g
Discuss
the following questions.
1 Why is the issueof growth ratesfor technical
componentsparticularlyimportantfor the
future of computing?
2 What factors other than componentsare
importantwhen consideringthe success
of
new developments?
Surveythe text on the oppositepage.What will
the text be about?Write three questionsto which
you would like answers.
Readthe text. Doesit answeryour questions?
Numberthe sentences
on the right 1-8 to show
the order in which they happened.
Twitterservicebegins.
Googlelaunches1Gbe-mail
SteveMann begins'lifecasting'.
Gordon BellstartsMyLifeBits.
Gordon Moore predictsa doubling of
processingcapacityeverytwo years.
Smartet al. make their predictionsfor
the future of computing.
SteveMann createsthe first wearable
computer.
Facebookextendsits serviceto anybody
over the age of 13.
For eachparagraph:
1 ldentifythe topic sentence.
2 Think of a suitabletitle.
Look at the underlinedwords in the text. What
do they refer backto?
Studythe highlightedwords and phrases.
1 What do they have in common?
2 What linkingwords or phrasescan you useto
show:
. contrast?
o concession?
o result?
o reason?
with the highlighted
3 Write the sentences
itemsagain,usingother linkingwords or
phraseswith similarmeani ngs.
Future C omputi n g
growlhcurves
terhnologicol
Using
to predktlhefuturedevelopment
of servires
By M. O'Brien qnd T. Ching
THt nrrr oF GRowrHin the processingpower ond copocityof
compufinghordworehos remoinedrelolivelystobleoverthe post
30 yeors.Populorlyknownos Moore'sLow,the prediclionmode
by Gordon Moore in 1965 thot the numberof tronsistors
on o
single chip would double every yeor hos proved remorkobly
resilient.For exomple,the numberof honsislorson o stondord
chip in 1980 wos 30,000, ond by 2000, fiis hod grownfo 42
million.In reol lerms,thol represented
o doublingof processing
power every l8 months Another low, Kryder's[ow, predicts
thot the copocityof hordworefo slore doto will double every
two yeors,ond the growlh curve hos lorgelybeen in line with
this. Memory copocitytoo hos followed o similorexponentiol
growthcurve,os hos the growth in bondwidth,both wired ond
wireless.Tokentogelher,these growth curves odd up fo on
exponentiolincreosein the overollperformonce
ond copocityof
computersystems.
A numberof intereslingpredicfionsfor woys in which this
increosed performonce ond copocity will be used ore
highlightedin o 20Q7 reporf by Smortet ol [1]. Drowing
togethercurrenttrends in exisling Inlernetlechnologies,they
idenfifiedthosewhich could be used fo creote shored sociol
spoces.Thesespoceswould providetoolsto ollow individuolsto
interoctwith eoch other, ond with the world oround lhem, in
woys which hove not been possiblebefore.Thev put forword
lhreekey developments
os cenlrolto thisfuture.Thefirstwos lhe
Future Computing
page 59
)"
ReportA: Method
A written questionnaire(design) to measurehow
younger and older adults differ in their attitudes to new
computer technologies.Six hundred questionnaires
(send)to a random sampleselectedfrom eachof the
two subjectgroups,of which 250(return).In addition,
25 young people(interaiew)in universitiesand
libraries. Over 65%of the sample (be) male.
ReportB: Method
Growthin the performance
of processors
is sti[[ in line with
Moore's
Law.In orderto find out whetherthis rateof growth
cancontinue,a literaturesearch(undeftoke)
usingthe Science
Directdatabase
andthe Googte
search
engine.
Thesearch
terms
which(use)weregrowthcurue,computingandprocessing.
r es e a r c hr e p o r t s : q u e s t i o n n a i r e s f, i n d i n g s , d i s c u s s i o n
Findings
(20%)ofolderrespondents
Firstly,a-, -,
(state)that they felt that new developmentsin
computing would not be generally beneficial.tn
(70%)(say) that they
addition, the
-felt the developmentswould be generally beneficial
(L1%)hadno opinion. The
and a
results from the sample of younger people were
(80%)(indicate)that they
similar.A
felt that new developmentsin computing would be
(20%)
generally beneficial,while a
-_-(feel)
of younger respondents
the developmentscould
be more harmful than beneficial.
Report A: Inhoduction
Report A: Conclusion
Report A
90
80
70
60
50
40
30
90
80
t0
60
50
40
30
20
l0
0
20
t0
0
%yes
% no
()Uer
= 45-65
oduhs
= 18-25 f
Youngw
odults
e,
@elqry!*En
wWAtgAArcals4ryq
! fauiliqiqzwitLts';
l lvilicLziry}ercfits
%yes
l{oopinion
Younguoduhs=
18-25 I
l{oopinion
0lderoduhs=45-65
atuc/|@ a+.4r1-s
tedtdniesi
OifuzaCry
oder edc,ts ed
J6zMtEf-a,Di
tD lci'lvoMe{in e @ig
in +sirgcorgrter prodrct
Ltvclrecairitgfclr
oklcr qdqtCs
%n o
of eor'4rldjtg
gEe!44
rl
oF i@zst
lgjbs sgs
via': Wqs
Introductory verbs
Choosingthe right introductoryverb is important.Your choiceof introductoryverb shows
what kind of statementthe writer is making.
Example:
As Chen linsert ref no. in square brackets]argues,the quality of the data used is very
important when using mirror worlds for contingency planning.
Your choiceof introductoryverb alsoshowswhat you think of anotherwriter'sideas.Thisis an
important part of academicwork.
Example:
SkellyIinsert ref no. in square brackets]claimsthat the first commercialusesfor AR will be
found in tourist locations.
Verb
The writer .
agree
accept, concede
is giving his/heropinion
cite
is referringto someoneelse'sideas
disagree, dispute
suggest*
is giving his/herrecommendation
describe
is giving a definition/description
il lustrate, i nd icate,show
is explaining,possiblywith an example
report
is giving researchfindings
Contrast
Within sentences
Between sentences
Result
so,so that
Reason
because,since,as
overwhelming
significant
slight
insignificant
Over
More
Less
than
majority
minority
number
half
a quarter
a third
x %o
(of + noun)
Structuring a researchreport
A researchreport is an accountof some researchwhich has been undertakento f ind out
about a situationor a phenomenon,e.9.,What do older age groups think about social
networking sitesT
o Introduction
o Methods
Conclusion
o Summarizethe main pointsin the report
without repeatingunnecessarily.
o Make someconcludingcommentssuchas likely
implicationsor recommendations.
Note: No new information;all the main points
shouldbe in the body of the report.
Incorporating quotations
o Usean introductoryverb.
Do not quote more than one sentencewithin the body of a paragraph.lf you want to quote
put in a colon and write the quote as indentedtext, so that it clearly
two or three sentences,
standsout from the body of your essay.
However,think very carefullybeforeyou includea long quote. lt is usuallybetter to
paraphrasein this case.
Additionalmaterial
5.4
StudentA
\ Sec-ondaru
Jnternet,
l.ade
rna$3,2
oS lec-hno\o3ie.3 and
re.\alive.\y Sael
de.ve.\og"".ent<1
-
journa\
poss, oul
7. 4
StudentA
Security
5.4
StudentB
Z -Prinnarj_
arlic-\ee
Because
sourcecodeis availableto anyone,it is easierto quickly
identifybugsand vulnerabilities
in the softwareand to rectify
them. lt is alsoeasierfor hackers
to identifyweaknesses
in the
software.
Because
upgradesto new versionsof the softwareare free, it is
morelikelythat opensourcesystems
will be kept up to date.
Because
of its wider communityof users,securityissues
are more
likelyto be identifiedquicklywith opensourceprogramming.
Fewercomputervirusestargetopensourceprograms.
e,1,, r3areh
Jou
gan be e.xpeniVel li",.e.-c,onunnin$
need
on
and,plus
less,minus
plusor minus
is,equals,isthe sameas
is approximatelyequivalentto
is not, is not the sameas,doesn'tmean,doesnot equal,is differentfrom
is greaterthan, is morethan, is over
is lessthan
gives,produces,leadsto, resultsin
is given by, is producedbv resultsfrom, comesfrom
grows
rises,increases,
falls,decreases,
declines
ditto (repeatstext immediatelyabove)
therefore,so
because,
as,since
at:
century,as in 20'hC
paragraph
number,as in #1
this is doubtful
Abbreviations
e. q.
for example
approximately,
as in c.1900
compare
chapter
companv
editor(s)
and the other people(usedwhen referringto a book with more than two authors)
and all the rest
and the followingasin p.10ff.
figure (usedwhen giving a title to a drawingor table)
that is,that means,in other words
in the sameplacein the sourcealreadymentioned
important
no date qiven
op. cit
in the sourcealreadymentioned
pp.
paqes,as in pp.1-10
concernrng
with referenceto
namely
re.
ref.
103
11.2 ModelCornellnotes
R*iet^:
fl6tes
Legol f,octors:
e.9., intr'{]t:tiornt
o) ftivacl
teaties,
govmnuet.tt legislatiut,
lo..r
legisladut
in U5
+'Big
4
& U5 qVeru^ert
4
legisladon copied by UK
-)
4
qnarrthorized
datat4*s..
UX Cri$'P'tct
ntsqx
Ac:-, l91o
U.".*tize
.or.,t
dif+*""t
categtia
of cor"ro.ftln aiue
ir"pt"r*tt"d
p.*"nts
inpletventea in EU a
a ganizaticr.r tr:eqties
C-atzgties
o.F qtuc:iue,
data cr:irzes 4
tffilcirk
ayoidi
totevewy
rye"s
Etropean C-o?2right DirectNe
eg,
csirqes 4
occe.Ss c'r:itulrzs4
introdvcing Vint*s,
relqtlzd qiues 4
crlr'v.tt6
lor., 4
covel' etuplo2uent ord --' t lat
profossionot5 ob,\?d to do
controct
4
obo coritrocts
disgreenent u
cMil tar': -4
*Sbed
cMit lat^t 4
104
/vc.:t.(.o.lr:f,,A)
cst"rr'tt('.
W4nen
couporties/proftSSionols
ytality o'F product q Wie.
u:jse
prodqct,
dt cd,4t1t/
inyosion ol Vrivacn)
dauages
7.4
| Cost
Student B | . Development
costsof softwarecanbe lowerbecause
of codereuse.
. Old versions
of softwarecanbe supportedindefinitelyso there is
no forcedupgradeto new versions
to ensuresupport.
. Opensourcesoftwaretypicallyrequireslowerspecification
hardware.
. Higherlevelsof technical
maybe requiredto maintain
expertise
opensourcesystems.
. A wide rangeof free applications
can be obtainedfor opensource
operatingsystems,
althoughthey may not be assophisticated
as
proprietarysoftware.
5.4
StudentC
Quanlilalive
= etalielic-a\
lhrou3h
+
o.
que.etionnair
'.' \ar3e
3ood Sor fac-Lua\ info) overve"c of tre.nde
no3.
iS \ooKinq
at
hu"..an-Cornpuler
7.4
| Flexibility
nna$ *
interac-lion
annp\
Sor que.Gtionnaireg
Student C | . openlyavailable
sourcecodemeansit is mucheasierto transferor
'port' the codeto new platforms,i..,convertit so it canbe used
on a differentoperatingsystem.
. Existingcodecan be 'forked'to developdifferentversions,
.9.,
less
both a stablereleasewith basicfeaturesand a multi-featured,
for others.
stable,release
. Newfeaturescan be addedby userswithout havingto consult
with softwareowners.
I
. Opensourceoperatingsystems
are moremodularand provide
morecontroloverwhichfeaturesare installed.
5.4
StudentD
4 Quo\itatiye
7.4
StudentD
106
Social
o Because
sourcecodecan be reused,there is lesswasteof effort and the
benefitsof the softwarecanbe sharedby manywithout further cost.
o Greaterdemocracy
in termsof whichfeaturesaredevelopedin future
versions.
o code istransparent,not 'blackbox',so it can be easilytestedto ensure
that softwaredoeswhat it is supposedto.
o cost is not a barrierto usingopensourcesoftware,bringingcomputing
to a wider userbase.
o No limitson the distributionof opensourcesoftwaremeanthat good
softwareisquicklyrecognized
and widelyused.
9.3 Humansciences-based
usabilitytestingmethods
Task,userand environmentanalysis
In taskanalysis,
the objectiveisto focuson the users'goals- what theywant to
achieveby usingthe interface,for exampleusinga web interfaceto locatea
particularservicelocalto them.In orderto understandhow they approachthis,it is
necessary
to understand
the personal,
social,and culturalcharacteristics
the users
bringto the goal.Taskanalysis
alsoinvolvesworkingout the specifictasksthat users
mustcompletein orderto achieve
theirgoalwhileusingthe interface.
Depending
on the resultsof the useranalysis,
the interfacemayneedto be modifiedto take
usercharacteristics
into account,for exampleby usinglargerfontsfor thosewith
poorvision.A third type of analysis,
whichisoften (but not always)carriedout
whichinvolvesunderstanding
alongsidethe othertwo, is environmentanalysis,
users'physical,
social,
culturalandtechnological
environments.
Forexample,
one
aspectof this might be examiningthe physicallocationin whicha systemisto be
placed,
to determine
for the visualdisplay.
the typeof light levelsavailable
Focusgroups
Althoughthe focusgrouphasits originsin marketing,it hasbecomea usefultool
for obtainingfeedbackon an interfaceat an earlystageof development.
a
Usually,
smallgroupof aroundsixusersisaskedto work with an interface.Underthe
guidanceof a trairiedfacilitatonthey givetheir reactions
to the interface.
Dependingon the stageof development
of the interface,this maybe a mock-upor
a paperprototype(wherethe prototypehasnot beenbuilt,but existson paper
for example
only).Occasionally,
focusgroupsare usedwith workingprototypes,
wherea deviceisveryhigh profileand isexpectedto havea verywide appeal.Video
recordings
of the discussions
are usuallymadesothat exactquotationscanbe
put togetherto providea summaryof the
obtained,and keyclipsare sometimes
session.
Cognitivewalkthrough
Cognitivewalkthroughis a methodof testingthe designof an interfaceat a
relativelyearlystageof development.
Expertevaluators
usethe specification
of a
prototypeto createscenarios
Theythen
for varioustasksand goalson the system.
role-playthe part of a user,'walkingthrough'the differenttasksto determine
whetherthereare any blockswhichpreventthe userfrom reachingtheir goal.lf the
it canindicate
sequence
requiredto achievea goal isverylong and complicated,
and replaceit with a simpler
that there is a needto reviewthe actionsequence
approach.
Thinkingaloud
Thinkingaloudisway of obtainingfeedback
from the useroverthe courseof their
interactionwith an interface.A userisgivenvarioustasksto performusingthe
systeminterface.Theyare instructed
to talk out loud asthey performthe task,
Thetype
explainingwhat they arethinkingaboutand the problemsthey encounter.
of data gatheredfrom this type of testcaninclude:
o the users'feelingsgenerallyaboutthe look and feel of the interface
o whetherthey likethe colours
o how easytheyfind it to carryout the taskthey havebeenassigned
o what problemsthey encounter
Thiscanprovideverydetailedin-depthdata,but it is not alwaysclearwhat usersare
talkingabout.Bycombiningsystemloggingand a recordof the user'scomments,
this difficultycanbe overcome.
107
Wordlist
Note: where a word has.more.thanone part of speech,this is indicated
in brackets.The part of speech
given is that of the word as it is used in the unit. 'so,for
example, advanceis listedas advance(n),
although it can alsobe a verb.
Unit
A
acceleration
access(n and v)
actionsequence
active
adding machine
addition
adopt
9
4
9
5
5
5
10
advance(n)
Ajax (AsynchronousJavascript
and XML)
6
Unit
U ni t
billing
10
binary
component
biometric
complex(adj)
computer-assisted
(or -aided)
1'l
blog
botnet
11
breakdown
'bricksand mortar'
computerize
1,5
3,4,9
1,4
concept
confidentiality
11
10
conflict
11
connect
broadband
browse
communication
1,4
connectivity
browser
connector
10
,|
consume
analogue
analytical
bug (n)
analyze
bulletin board
11
consumerprotection
business
(B2B)
to business
10
consumer
to consumer
(C2C) 10
business
to consumer(B2C)
10
contingencyplanning
't2
3
6
annotationtools
12
antivirus
1
"l
application
10
applicationssoftware
approach
cache
convention
calculate
convert
call centre
3
't2
copyright
capability
core
capacity
cost
CPUboard
centralprocessing
unit (CpU) 3
creator
change
criminallaw
chip (microchip)
cryptography
current
arithmetic
arithmeticlogic unit (ALU)
archive
assessment
asynchronous
augmentation
augmentedreality
4
6
12
12
censorship
aural data
automated
chiller
civil law
avatar
12
client
client consent
cluster
backend
balance
code
cog
bandwidth
barrier
behaviour
beneficial
'Big Brother'
108
10
10
9
11
't1
11
8
"t1
6
cybercrime
cycle(n)
8
't 'l
11
11
3
11
8
5,7
D
data
data centre
cognitive psychology
data integrity
cognitive systems
data processing
cognitivewalkthrough
data protection
11
commercial
common
5,10
8
database
decirnal
2,4
5
Unit
decode
decrypt
denialof service
3,5
5
"l'l
eventuality
Unit
12
U ni t
hard drive
3
1,3
evolutionary
hardware
expand
hardwarespecifications
dependability
exploit (n)
10
harmful
11
dependent
export
10
heuristic
designer
heuristicevaluation
desktoppublishing(DTP)
extensiblemark-uplanguage
(XML)
6
host
hot swapping
development
developmentmethod
developmenttools
device
digit
digital
5,6
eye tracking
9
7
2,3
factor
10
faulty
11
1, 5
feature creep
features
hyperlink
1,6
hypertext
digital rightsmanagement
(DRM)
't1
f ixed
disciplinary
action
"t'l
Flash
idle
flashdrive
illegalactivities
f lexible
diskdrive
disputeresolution
5
10
5,6
identitytheft
11
8
11
3
disrupt
f lexibility
impact
8, 11
distribute
focusgroup
import
10
division
forgery
11
include
documentation
f raud
1"1
incorporate
download
driver
1,4
1
f unction
increase
functionality
increment
incremental
index
indexing
information
informationprocessing
e-commerce
10
general purposesystem
electronic
1,5
geospatial
electroniccommerce
10
gigabyte
electroniccommunication
10
global
electronicpoint of sale(EPOS)2
3
12
1
10
global positioningsystem
(Gesl
graphical
engine
enhancing
growth curve
12
environment
encode
encrypt
energyproportionality
essential
ethical
evaluation
3
3,5
5,10
governmentlegislation
5
11
9
H
hacker
hapticdata
10,12
initiative
12
10
10
4
11
embedded
infrastructure
11
9
innovation
input (n and v)
5, 9
2,3, 4, 5
input device
install
instruction
intellectualproperty(lP)
1"1
interaction
interactive
interactivity
interface
4,8,9
109
interfacedesign
Internet
intranet
invention
inventor
iterative
iterativemodel
I
job
joystick
junction
K
key (adj)
keyboard
keylogger
keyword
kilobit
L
LAMP(Linux,Apache,
PHP)
MySQL,
laserprinter
launch(v)
layout
leadto (v)
legalinfrastructure
legalsituation
legislation
lifelogging
limited
limitation
link( n andv)
Linuxoperatingsystem
local
log (n and v)
log in/on
log off
l ogging
110
9
2
2
5
5
7
7
8
3
5
5
3
11
4
1
6
3
1
7
5
10
11
10
12
5
9
4
5
10
2
4
4
9
Unit
Unit
Unit
M
machine(n)
magnetic
tape
maintenance
malWare
mask
measure
memory
mentalmodels
men u
metaphor
microchip
microprocessor
migration
military
mirror
mirrorworlds
mock-up
monitor(n andv)
monitoringdevice
Moore'slaw
motherboard
motor
motor system
mouse
multiplication
multi-purpose
N
negligence
network(n and v)
neuralnetworks
non-commercial
numerical
operatingsystem
optimal
optimum
outage
out-of-the-box
outcome
output (n and v)
output device
outsourcing
5
5
8
11
8
8
8
I
8
8
7
1,3,4,5
9
2
1,4
9
1
3
8
5
12
12
7
'l
3
't2
8
5
9
3
5
5
1'l
3
12
10
5
o
objectoriented
obligation
obsolete
onlin e
opensource
7
11
5
3,4
7
P
payment
paymentcollection
(P2P)
peer-to-peer
personalcomputer(PC)
penetration
penetration
testing
perception
perceptual
system
persistent
trend
phase
10
10
6
2
10
11
9
9
"12
6
p h is h in g
11
physical
reality
12
positioning
3
portable
5
(n
)
p lu g -in
1
prediction
12
(PHP) 6
pre-hypertext
processor
prevalent
8
privacylegislation
11
private
6
procedure
2
(n andv)
process
1, 3,8
processor
3
procurement
10
product
6
program(n andv)
1, 5
programmer
1
projectmanagement
7,9
projector
2
promotion
10
proprietary
protection
protocol
prototype
prototypingmodel
public
punchcard
purchase
7
10
3
7
7
6
5
10
a
qualitative
qualityassurance
R
radical
reduce
reflect
refresh
regulatoryframework
relay(n)
release
reliability
reload
reputation
requirements
resources
responsible
restart
resultin (v)
reverseengineering
revolutionary
revolutionize
robot
role-play
root access
rule
6
7,9
5
8
't2
6
10
5
6
I
5
't'l
7
7
11
1
5
't1
5
12
2
12
11
6
s
scaleup
scan(n and v)
scanner
I
2 ,12
2
Unit
Unit
Unit
scheduling
screen(n)
search(n and v)
searchengine
searchresults
target system
task
taskanalysis
technicalinfrastructure
4
4
10
securely
security
select
sensor
server
serverfarm
10
6
3
4,6
8
share
skills
socialengineering
socialnetworkingservices
(sNs)
software
softwareengineer
softwareexploit
softwarepackage
8
2
11
6
1
2
11
1,2
specific
specificationdocument
specialized
spider(n andv)
spiralmodel
stable
stack
stage
static
statusquo
storage(n)
store(v)
submit
subtraction
outcome
successful
surveillance
switch
system
systemdeveloPment
systemlogging
software
systems
..f
7
12
5
6,7
6
10
3,5,'12
1,2,5
10
5
11
11
5
1,5
9
9
3
technological
technology
tefecommunications
teleworking
testing
text (n and v)
theft
t h in k in ga lo u d
timescale
tolerance
tracking
transaction
transform
transition
t ra n s mit
transistor
Trojan
troubleshooting
trust
U
comPuting
ubiquitous
power
uninterruptible
(UPS)
supplies
unpatchedexploit
upgrade(n and v)
11
2,8
9
10
5
1
'l, 2
2
9
2
11
9
7
5
9
8, 10
8
6
3,'l2
5
11
7
10
12
8
11
2
usability
usabilitytesting
useranalysis
userinput
userinterface
utilization
V
vacuumtube
valve
9
9
9
5
111
U ni t
1,7
variable(adjand n)
version
6
2
video-conferencing
4
virtual
virtuallearningenvironment
(VLE)
4
virtual storefront
10
virtualworlds
12
virtualization
virtuallyenhanced
12
virus
visualdata
visualdisplay
Voiceover lP (VolP)
W
waterfall model
wearablecomputer
web page
website
white hat (hacker)
wireless
7
12
1,6
5
11
3
wi relessapplication protocol
(wAP)
work out (v)
World Wide Web (WWW)
WP (WordProcessing)
112
3
5
5
2
Transcripts
Unit 1, Lesson 2, Exercise g 6) t.t
Part 1
Good morning, everyone,and welcome to the ICT
faculty. I want to start by asking a simple question.
What do the letters l-C-Tstand for? That'sa very
simplequestion,isn't it? We all know the answel
don't we? Informationand Communication
Technology.But what is ICTabout?
Well, if you ask most peopleto explainICTto
you, they will probablysay it means'computers'.
So if I use my computerto play a game of Solitaire,
is that ICT?Not really.lt usesa computel certainly,
and computersare often found in an ICT
environment, but a computer is a component
rather than the whole system.lt's an important
component, as it's the part that processes
data. But
ICTis more than just using computers.
Perhapsif we look at the intrinsicmeaningof the
three words that make up Informationand
CommunicationTechnology- three words that are
used separatelyand together on an everydaybasis
- we might get closerto understanding.
rcT?
g 6) t.+
Unit 1, Lesson2, Exercise
Part4
Let'slook at the intrinsicmeaningof our original
three words: information,communicationand
technology.OK. Iechnology meansthe tools and
machineswe useto solveproblemsor do things
efficiently. lnformation refers to facts about
someoneor something.In the contextof ICL
information is data that is input, stored, processed
or transmitted.That informationcan be
representedin different forms, for example as a
list, a text document, a spreadsheet,a picture, or
an audio or video file. So what sort of information
are we talking about?Well, examplesinclude
patient recordson a hospital database,a web
113
g fi t.S
Unit 1, Lesson
3, Exercise
Introduction 1
In today'ssession,
we're going to look at ICTin
business.
We will be looking at a car
manufacturingcompanyand discussing
four areas
of business:
administration,finance,researchand
development,and operations,to seewhat
happensin eacharea and how ICTsupports
workersin theseareas.
Introduction 2
In this lecture,we're going to look at computer
bugs.In generalEnglish,a bug is a very small
insect,and there'sa popularstorythat the first
time the term was usedin connectionwith
computerswas in 1945,when a smallinsect
crawledinto a computeLcausingit to fail. Today,
when we talk about computerbugs,we don't
mean insects;we mean a flaw or fault in a
computerprogram.I'm going to look at the causes
of computerbugs and the effects.
lntroduction 3
OK. Are we all ready?Right,l'll begin.Today's
topic is the informationsystemslife cycle.Systems
developmentprojectsusuallyinvolvea number of
people,often working in different locations.For a
project to succeed,the goals and the procedures
needed to achievethose goals need to be
understood.Thereare many different
developmentprocesses.
Todaywe're going to look
at the five stagesthat make up the waterfall
model.
1\ 4
lntroduction 4
The Internet,as we know it today, is a global
computernetwork which connectsmillionsof
peoplearound the world. Thisweek, I'm going to
talk about the originsof the Internet.Who were
the pioneers?When did it all begin?We could say
that it reallybegan in the early 1990s,when Tim
Berners-Lee
developedthe conceptof the world
wide web. But, in reality,it startedin 1957,with
the launchof Sputnik1.
Introduction 5
The subjectof today's lecture is CMC,computermediatedcommunication.We'll begin by looking
at one particularform of CMC,electronicmail, or
e-mailasit is more commonlycalled.In next
week'ssession,
we'll see how e-mailworks, but
today we'll look at what we mean by e-mailand
discuss
the advantagesand disadvantages
of
e-mailas a form of communication.
Lecture
z 6) t.Z
5o what are the causesof computer bugs?Well,
bugs can occur in either a software program's
sourcecode or in its design,and they are usuallya
result of errors made by developers.For example,
a programmermay have made a mistakewhen
writing the sourcecode, or the different parts of a
program may interact in a way that wasn't
predicted at the design stage.
The effectsof a computer bug can be mildly
inconvenientor they can be catastrophic.
In some
cases,you might not even realize a software
program has a bug - this is becausethe bug has no
effect, or a very minimal effect, on the program's
functionality. ln other cases,a bug may cause
programsto crash- that is, stop working
altogether.In suchcases,the bug will resultin
considerableinconvenience
to the user.Evenmore
seriousthan this is the fact that bugscan cause
securityproblems,laying a systemopen to viruses.
There have been a number of caseswhere
computerbugs have had extremelyserious
consequences.
In some cases,these have been
financial.For example,a computerbug resultedin
the lossof the billion-dollarAriane 5 rocket in
1995.Fortunately,
this didn't resultin the lossof
life. However,a software bug in the Therac-25,a
radiationtherapy machine,is thought to have led
to a number of cancerpatientsbeing given
overdosesof radiation between 1985and 1987.
r15
D
Unit 1, Lesson4, Exercise
Lecture
5 601.10
Electronicmail, or e-mail,is a way of sendingand
in digital form via a computer.
receivingmessages
E-mailscan be sentthrough an organization's
network, known as an
internalcommunications
intranet,to which only membersof the
organization have access,or they can be sent
through the Internetto anyone,anywherein the
world.
So what are the advantagesof e-mailto the
user?Well, firstly,comparedto writing a letter; it's
very easy.You simply type a message,add the
e-mailaddressof the recipient,and press'send'.
And you can do all of this from your desk,or on
the move usingyour laptop or mobile phone.
e-mail is a very fast way to communicate:
Secondly,
will arrivewithin minutes
in most cases,messages
or sometimessecondsof being sent, whilst a letter
may take severaldaysto arrive. lt's also
comparativelycheap.You can attach large files
with different formats such as documents,photos
or video clipsto an e-mail.Finally,by setting up an
e-mailgroup, or typing multiple e-mailaddresses
into the addressbox, it's possibleto send the same
messageto severalpeopleat the sametime.
But of course,as with most things, there is a
downside.Yes,e-mail is usuallyfast, but it's
possiblefor an e-mailto get lost in the systemand
not arrive.Sendingindividuale-mailsis cheap,but
the set-up costscan be expensive:you need a
116
computerand an Internetconnection.There'salso
the problem of informationoverload- some
receiveso many e-mailseachday
businesspeople
that they hardly havetime to respondto them all
- this may resultin important e'mailsgoing
unnoticed.Another problem is'spam'or'junk
e-mail'.This is e-mailthat you haven'taskedfor
but which is sent out to advertiseproductsor
services.However,possiblythe biggest
disadvantageof e-mail is that it can be usedto
introducevirusesto a computer- the viruscan be
sent as an e-mail attachment which activatesitself
when the attachmentis opened,or it can be sent
within the e-mail itself.
g Cl t.t t
Unit 3, Lesson2, Exercise
Part1
OK. ls everyonehere?Good,then let'sbegin.
We've seen how ICTis used in pretty much all
areasof modern life - it helpsus learn,do our
work, communicatewith other people,spendour
leisuretime, stay healthyand manageour day-today lives.We appreciatebeing able to watch
satelliteTV,buy groceriesonline and communicate
with friendsand family around the world.
However,most people don't think about the
technologythat enablesus to do thesethings. In
today's lecture,we're going to look at ICTsystems,
specificallythe different typesof ICTsystems,the
componentsthat make up an ICTsystem,and the
functionsthat ICTsystemsperform.
There are basicallytwo types of ICTsystems:
embedded and general purpose.We'll start with
embedded systems.An embedded systemis one
which is fixed insidethe devicethat it controls.l'll
repeatthat: embeddedsystemsare found in all
sorts of everydaydevices,from the automated
teller machineoutsideyour bank,to the washing
machinein your kitchenand the car in your
garage.Embeddedsystemsare special-purpose
systemsthat are pre-programmedto perform
specifictasks.There is a big advantageto these
They are relativelyinexpensive
embeddedsystems.
to producebecause,unlike a PCor a laptop,they
are designedto perform a limited set of tasks.In
other words,embeddedsystemscan only do one
task or set of tasks.
Now let'shave a look at generalpurposesystems.
Theseare systemsthat can be set up to perform
different tasks.They includesupercomputers,
Think
mainframecomputersand microcomputers.
about your own laptop or PC.What are the
different things you useyour computerfor? Well,
Unit 3, Lesson
2, Exercise
c fi t.tz
Part2
In the first part of this lecture, I defined ICT
systemsas two different types:embedded systems
and general purposesystems.But they can also be
defined in terms of what they do. Broadly
speaking,ICTsystemsperform three functions.The
first is information storage and management. For
example,doctors often use information systemsto
store informationabout their patients.When a
patient comesinto the surgery,the doctor can call
up their record from a databaseand see what
problemsand treatmentsthe patient has had in
the past.
The secondfunction is control. What do control
systemsdo? Well, an ICTcontrol systemis an
electronicsystemwhich usesdata to manage or
regulatesomething;this could be a deviceor
another system.An example of a control systemis
the one found in your washingmachine.lt'sthe
systemthat allows you to wash clothesat different
temperaturesor use different programsby simply
pressinga button.
Finalfy,we have communicationssystems,which
transmitdata from one placeto another usinga
range of communicationchannelsincluding
telephonelines,cablesand satellite.All kindsof
data can be transmitted: not simply text
documents,but also pictures,sound and video
files.lf you have a mobile phone,the chancesare
that not only can you speakto your friendson it
you can also take and
and send text messages,
send picturesand short videos,pick up e-mailsand
listento the radio.
Of course,nothing is straightforward, particularly
in the world of lCT,and many ICTsystemsdon't
slot comfortably into just one category because
they perform one or more functions. Many of us
systems,compilers,networking systems,
performancemonitoring software and utility
programs.Applicationssoftwareis what enablesa
userto do something specificwith an ICTsystem,
i.e.,it allowsyou to do the things you want to do,
whether that is designinga new product,
organizingthe day-to-dayrunning of a company,
or playinga computergame.
8 infor'mation
9 em'bedded
10 'process
11 'database
12 'satellite
13'automated
14'function
g Cl t.t+
Unit 3, Lesson2, Exercise
Part4
So, to summarize,we can say that there are two
types of ICTsystem:embedded and general
purpose.ICTsystemscan also be defined by what
they do, for exampleinformationstorageand
managementsystems,control systemsand
communicationssystems.Systemsare composedof
hardware and software. The hardware refersto
the physicalcomponentsof the system,while the
software is the instructionswhich control what the
computer does.
OK, that's it for today. Next time we'll look at
how ICTsystemswork. Don't forget to do a bit of
researchon that before you come. Thanks.Seeyou
soon.
2, Exercise
f 6) t.ts
Unit 3, Lesson
1 Embeddedsystemsare not expensiveto
produce.
2 You can add new hardware and software
onto an embedded system.
3 ICTsystemscan perform more than one
function.
4 A personalcomputeris an exampleof an
embedded system.
5 ICTsystemshave two basichardware
components.
6 Operating systemsare examplesof
applicationssoftware.
15 'regulate
16 appli'cation
17 in'struction
18'system
4, Exercise
C 6) t.tZ
Unit 3, Lesson
Part1
OK. In the last lecture,we talked about different
types of ICTsystems,the functions of ICTsystems,
and the different partsthat make up an ICT
system,i.e.,software and hardware.
Todaywe're going to concentrateon what ICT
systemsdo, and we can break this down into
three stages:data capture,data processingand
data output. But before we think about the
different stages,it's important that you
understandthe difference between data and
information.Data is informationthat has no
meaningor context.For example,if you seethe
numbers281204written in a line, what do they
mean?Well, it could be an important date, a
price or a product code. We have no idea unless
we have a context. This is data. lf I tell you that
281207is your coursenumbel you have a
context, and the numbers become information.
Alternatively,if there was a small spacebetween
each pair of numbers,this could be a date - the
28thDecemben2007.And if there was another
set of numbers in bracketsin front of this string,
we might assumethat it is a telephonenumber.
5o we can saythat data + context = information.
Informationis data which has meaning,
somethingwe can use.
e 6) t.tO
3, Exercise
Unit 3, Lesson
1 e'lectrical
2 'management
3 co'mmunicate
4 com'ponent
5 'storage
6 'binary
7 con'trol
1it"
o 6) t.tA
Unit 3, Lesson4, Exercise
Part2
Right, let's have a look at the first stage now data capture.We can also call data capture data
input. /nput simplymeansputting data into a
system.5o how do we do this? Well, data can exist
in a number of forms, but all data that is input
2, Exercise
O 6&t.Zt
Unit 5, Lesson
Part 2
The computer is arguablythe most important
piece of technology in modern society,but it
actuallyhasa very long history,in fact going back
almost 5,000years.lt startswith the early
Babylonians,
who usedsimplearithmeticto count
and keep a recordof their goods.As their wealth
grew and they had more and more goodsto
record,it follows that they would try to develop
tools to make this work easier.A good exampleof
one of thesetools is the abacus,usedas a basic
calculator- in other words, a computer.What I
mean is that, as in a computer,data is input by
moving the beads.lt is stored by the position of
the beadsand the output or answerscan then be
read off. Five beadsper line are often used,just as
there are five fingerson a hand.Anyway,moving
aheadto the early 17thcentury,we find a different
type of computer.While the abacuswas developed
to speedup addition,Napier'sBoneswere created
to speedup multiplication.The Boneswere a
seriesof numberswritten on narrow stripsof
material,originallybone,which allowed large
numbersto be multipliedor dividedusingsimple
arithmetic.While they worked well, they appearto
have initiallybeen developedfor academicrather
than commercialuse.
Commercialrequirementswere the reasonfor
the developmentof one of the first mechanical
in
calculatorsby BlaisePascal,that's P-A-S-C-A-L,
France,in 1645.Calledthe Pascaline,
it was a
hand-poweredadding machinewhich could add
numbersup to eight figureslong. lt usedgears
and cogsto transferthe resultsof one wheel to
another,a very simpleand cleverprinciple,which
incidentallyis still usedtoday in electricityand
gas meters.
Therewere quite a few more calculators
invented after that, which I won't discusshere,
becauseI want to look at another type of
machinewhich was linkedto the developmentof
the computer.In 1801,Joseph-Marie
Jacquard,
that's J-A-C-Q-U-A-R-D,
developeda very special
type of weaving machineor loom, which was
controlledby a set of cardswith holesin them.
Usingthesepunch cards,the JacquardLoom
could producefabricswith very intricatedesigns
much more quicklyand efficientlythan by using
120
traditional hand-weavingtechniques.Thesecards
introducedthe principleof programmability,
which meant changingthe processby changing
the input. Thiswas very importantto the
developmentof modern computingand the
punchedcard was to remain in usefor well over
150 years.
By the early 19thcentury,more and more
calculationwas requiredto conductgovernment,
commerceand engineeringefficiently.
Logarithmictables,which allowed large numbers
to be multipliedand dividedusingaddition and
subtraction,were increasingly
usedto speedup
calculations.
CharlesBabbage,an English
mathematicianand philosopher;discoveredmany
errorsin existingtablesand felt that the
calculations
should be carriedout by machinefor
greater accuracy.He was given money by the
Britishgovernmentto designsucha machine.
Unfortunately,the designfor this machine,
which was calledthe DifferenceEnginewas very
complexand the engineersmaking the parts
were unableto manufacturethem with enough
precisionto make it work. In addition,the
governmentrefusedto continueprovidingthe
funds to allow him to overcomethesebarriers
and as a result,his DifferenceEnginewas never
fully built as he designedit.
lf the DifferenceEnginehad been built as
designedby Babbage,it would haveworked
perfectly.In 1991,a perfectlyfunctioning
DifferenceEnginewas constructedfrom
Babbage'soriginal plans.As a resultof his
design,Babbagehas been creditedwith
inventingthe first machinerecognizedas a
modern computeLand so he is calledthe father
of the computerby some people.In additionto
the DifferenceEngine,he alsodesignedan
AnalyticalEngine,a much more complicatedtype
of mechanicalcomputerwhich would use
punchedcardsto input programsto the machine
and which would be powered by steam.Despite
the fact that the AnalyticalEnginewas never
built, it had programswritten for it - by a
woman calledAda Lovelace.She is currently
recognizedas the world'sfirst programmerand
was honouredby havinga programming
language,Ada - that's A-D-A,named after her in
1983.
Incidentally,
in additionto his work with
computers,Babbagewas also a cryptographerwho
worked for the Britishgovernment.He broke - or
decoded- a number of codeswhich had been
consideredunbreakableup until then, giving the
Britishgovernmentconsiderable
advantagesin
g f0 l.Zf
Unit 5, Lesson
3, Exercise
Part 4
Now, we have seen how important the role of
computerswas during the SecondWorld War; but
it was not long after the end of the war that the
power of computingwas turned towards business
and administrativeproblems.The UNIVACwas the
first Americancommercialcomputer.ln addition, it
was the first computerto be specifically
designed
for businessratherthan scientificpurposes.lts
calculations
were performedusingvacuumtubes
and readingfrom magnetictapes,a new
technologywhich had been introducedfor storing
data. UNIVACI used5,200vacuumtubes and
weighed about 13 metrictons. lt could perform
around 2,000operationsper second.While
vacuumtubes offered a significantadvantageover
mechanicalcomputers,the technologywas limited
by cost,sizeand energyconsumptionin terms of
how big computerscould get. The developmentof
the transistorby the AmericanTelephoneand
TelegraphCorporation in 1947showed a way
around those limitations.Transistors
could be
made much more quicklyand cheaplyusinga very
simpleand widely availableingredient,sand.In
fact silicon,which is obtainedfrom sand,is the
materialfrom which all modern electronic
componentsare made.Transistors
alsoconsumed
very little power and were very smallcomparedto
vacuumtubes.Computerswhich contained
transistorsinsteadof vacuumtubes could be
smallerand still deliveras much,or more,
processingpower. With the arrival of the
transistor-basedcomputer,the modern era of
computinghad truly arrived.However... oh, dear
... sadly,I seethat we've run out of time. This
meansthat l'll haveto talk about the development
of the Internetnext time. In the meantime,l'd like
you to do some researchon what made it possible
for the Internetto developin the way it did. And
121
LrcruRrR:
And what elsedid you do?
Lrrm:We talked to the librarian.Shewas quite
helpful and showed us some bookswhich we used
to get some data.
Mereo:That'srubbish.Shewas obviouslyreally
bored and didn't want to talk to us,
Extract 3
LrcruRen:
Leila,can you give us an explanationof
your graph?
Lerm:Well, yes,it hasa verticaland a horizontal
axis:the horizontalaxisrepresentstime and the
vertical axisspeedand capacity.As you can see,
we've put some of the different elementsof
computercomponentson it.
LecrunrR:
What do the rest of you make of this?
Evie,what about you?
Evre:
Well, erm ... l'm not sure really.
Extract 4
Lrcrunrn:
Majed,can you explainhow you decided
which componentsto includeon your graph?
Mruro:Well, yes, it's basedon information the
techniciantold us.
Jncr: 5o it's secondary.
Extract 5
LecrunEn:
What do you mean by'secondary',Jack?
Evrr:[interrupting]Actually,that's primary.
Extract6
Lrcrunen:
Let'sgo back to this graph for the
moment to see how it can help with
understandingthe groMh of the Internet. Firstof
all, tell us about the tomponentsyou chose.
Extract 7
Part 1
C f) t.Zg
Unit 7, Lesson2, Exercise
Part2
As we haveseen in earliersessions,
the computing
processcan be thought of as the input of data to
the system,its processingby the computer
hardware and its output. As we knory the speed
or rate of processingis largely determined by the
processor
and memoryavailable.Now, another
term for the processorand memory is system
resources,
and a well-written piece of software
makesthe best possibleuse of the system
123
e fd t.f O
Unit 7, Lesson2, Exercise
Part3
Now, an important concept in software
developmentis defining userrequirements- the
need to ensurethat a statementof requirementsis
agreed with the client before any work starts.
What do I mean by client requirements?
Well, to
help you understandthis idea clearly,can you look
for a moment at the leaflet I havegiven you from
the SmallWeb DevelopmentCompany?As you can
see,the first stage is agreeing a statement of
requirements,after which there are severalstages
before a decisionis made on what web designwill
be produced.Lookingat it anotherway, it is only
when agreementhas been reachedwith the client
on the functionalityof the softwarethat the
developerscan begin to work. lt is also important
that the agreementon functionalityis clearly
documented,as otherwiseproblemscan occur
when more and more functionalityis addedto the
project at the requestof the client. In project
managementterms,this is called'feature creep',
where the projectgets bigger and bigger as the
client asksfor more and more functionsto be
added to the software. When a web development
companyproducesa number of mock-upsfor a
client,they are loweringthe riskthat the site
which is put into productionwill not meet the
client'srequirements.Let'slook at an exampleof
this. Saythe developersgo aheadand build a
websitewithout taking into accountall of the
They show it to the client
client'srequirements.
and he doesn'tlike it. The differencebetweenthe
costof the total developmentand the cost of
developinga prototype is likelyto be quite
significant.Why is agreeingclient requirementsso
important?Well, the point is that unlessthe
124
Unit 7, Lesson
2, Exercise
f Cdt.gt
Part4
Now... er... let'ssee... oh deal lsee we're
running short of time ... but perhapsI shouldjust
saysomethingabout modelsusedfor developing
software.
Thereare four main modelswhich I will outline.
To start with, model one is the waterfall model.ln
this type of model,eachstagedirectlyfollows the
other. lt is calleda waterfall model becauseeach
stageis dependenton the resultswhich flow on
from the previousstage.lt is particularlyusefulfor
simpleproblemswhich can be clearlydefined.The
iterative model adds functionality in stagesto
software. Examplesof this type of software are
things like end-userapplicationsor operating
systemversions.The first iterationusuallyprovides
the core functionalityfor the program,and each
successive
incrementadds new functionalityand
fixesanythingthat hasn'tworked properlyin the
previousiteration.
So the third model is called the prototyping
model. What's important about prototyping is that
clientshave an opportunityto seea model before
it is fully developed.lt sometimeshappensthat
clientsare not totally surewhat they want the
software to do, but they feel they will recognizeit
when they see it. lt is suitablefor projectswhich
are relativelysmall,suchas websitedevelopment.
The web developmentcompanywhose brochure
we looked at usesthis model. lt meansthat full
developmentonly goesaheadwhen the client can
seewhat the outcomewill be. At the sametime,
I think, of this systemis that the
the disadvantage,
designprocesscan take much longerthan with
other models.
Lastly,there is the spiral model. What's different
in the spiralmodel is that it combineselementsof
the waterfall and prototypingmodels.This means
that the overall project is broken down into
stages,as in the waterfall model. However,within
each of these stages,the prototyping model is
usedto produce prototype software. The spiral
model is particularlygood for large,expensiveand
complicatedprojects.
1 'concept
2 de'pendent
3 'spiral
4 'increment
5 documen'tation
6 'prototype
7 re'quirements
8 'features
9 re'sources
10 pro'prietary
11 specifi'cation
12 f unctio'nality
g fd Z.Z
Unit 7, Lesson3, Exercise
Part 5
l'm going to finish with somecommentson the
planningof softwareproduction- in other words,
schedulingas a part of projectmanagement.
Now the fact of the matter is, it's a highly
complextask to plan softwareproduction.The
reasonfor this is that planningdecisionsare based
on a wide variety of different factors- not to
mention the fact that some of these factors are
totally outside the control of the developer.Let's
take clients:a changein the client'scompanycan
causea change in the software requirements,
which of coursethe developercan't control.Plus
there's the fact that the development model used
for the software affectsthe way in which
production can proceed,as we've just seen.
OK. Where was l? Oh, yes ... So scheduling
meansworking out what the different processes
are, when they start, when they finish, et cetera,
in relation to other processes.
You've probably
heard about Gantt charts?lt was HenryGantt
who came up with a very simpleidea to help
with scheduling- the Gantt chart. Many
organizationsuse Gantt chartsto help with
organizingand planningthesetypesof software
development projects.The advantageof Gantt
charts is that they show what processes
are
happeningat any one time. In a projectwhich is
g fd Z.E
Unit 7, Lesson4, Exercise
Extract1
Now, as we know the decisionto make the
sourcecode of their productsopenly availableis
one of the most important decisionsthat
softwarecompanieshaveto make. I askedyou to
look at the caseof Netscape,
a companywhich
made the first successfulInternet browser.Why
did they do this?The productwas very
successful,
and though it was free to individual
users,it was generatinga large amount of
money from corporate customers.Also, there
were many risksrelatedto the decision.So, let's
have some views.
g 6i Z.S
Unit 9, Lesson2, Exercise
Part 1
Good morning,everyone.l'm going to talk to you
this morning about human-computerinteraction,
usuallyreferredto as HCl.The purposeof HCIas a
field of study is to optimizethe performanceof
humansand computerstogether as a system.In
particular,l'm going to talk about the two
different componentsof HCI- namely,the human
sciences
and the computersciences.
l'm going to
talk first about the human sciences,
and I will
outline someof the issuesin psychologyrelevant
to HCl.After l've describedthese,I will go on and
do the samefor the computingscience
components.I will alsogive you a summaryof how
they link together.
But before we begin I have a little story to tell
you ... I once spent six monthsworking on a
project, designingan interfacefor a new
manufacturingsystem.lt used state-of-the-art
technologyand made good useof colour graphics
to show the operatorwhat was happeningwith
eachof the machineson the productionline. Sadly,
when we cameto rolling it out, we hit a major
problem.On the factoryfloot the operator had to
wear protectiveclothing,with a specialface mask
which turned everythingto blackand white. He
wanted to be able to usethe interfacewithout
taking off the mask,which meant that he couldn't
seethe colour.Consequently,a lot of my six
months' work was wasted.The point of the story is
that it is reallyvery importantto considerall the
human aspectswhen designinga userinterfacein this case,the work environment.So ... to get
backto the main part of my lecture...
NoW it's pretty clear that in order to be
successful,
systemdesignersneed to pay attention
systems,namely,perceptual,cognitive and
motor systems.
8 So it should be clearthat tools and
techniqueswhich draw on the human
sciencesare essentialfor systemdesigners,
and in particularfor interfacedesigners.
129
Unit 9, Lesson
3, Exercise
O 6dZ.tO
Extract1
Let'sbegin then with heuristicevaluation,which is
perhapsthe most commonlyusedmethod. A
website called useit.comdefines heuristic
evaluationas "a method for finding the usability
problemsin a userinterfacedesign... by judging
its compliancewith recognizedusabilityprinciples
in other words,the heuristics."
Extract 2
By the way, I seethat someof you are usingthe
Cornellnote-takingsystem.That'svery good. Do
you all know about this? No? Right,well, if you
want to know more about it, I suggestyou look at
How to Study in College by Walter Pauk, the 9tn
edition, publishedin 2007.lt's very good, and it
should be in the universitylibrary.
Extract 3
Systemlogging can alsoshow any tasksthat the
userwas unableto complete.However,basic
systemlogging does not identifythe reasonfor
g 60Z.tg
Unit 11,Lesson
2, Exercise
Part1
Good morning.My name is Dr William Mitchell
and much of my work relatesto computer ethics
and professionalresponsibility.
I am here today
to give you an overview of issuesyou need to be
aware of when making decisionsin a
131
n E xe rci se
C G Z .t+
U n i t 1 1 ,L e s so 2,
Part 2
To start with, then, let's look at the different
need
typesof law which computerprofessionals
to be aware of. Thesefall into two main
categories- national lawsand international
laws.lt is particularlyimportant for computer
professionals
to have a good knowledgeof
which lawsare relevant,becausethey can then
be clearabout when they are within the law or
when they are at riskof breakingit. lf their
activitiescan be seenas breakingthe law, then
they will need to be in a positionto justify their
actions.They may defend themselvesby using
the principleof the 'greatestgood' - statingthat
more peoplewill benefit from their actionsthan
will sufferfrom them. Or they may want to rely
on their personalbeliefsand principlesof what
is right or wrong. Eitherway, it is importantthat
they have a knowledgeof the different
categoriesof law which can affect their decisionmaking.
Well, first let'slook at national legislation,passed
by countriesin responseto aspectsof computing
which were seenas harmful or problematic.The
passingof privacylaws in the US is a good
exampleof this. By the 1960s,computershad
becomesufficientlypowerful for many UScitizens
to begin to seethem as a potentialdanger.The
greatestfear initiallywas of a 'Big Brother'society,
that is to saya societyin which the government
Furnelland others,called"Dissecting
the 'Hacker
Manifesto',"givesan extremelygood insightinto
what actuallymotivatesthese individuals.
,:l
133
Unit 11,Lesson
2, Exercise
f 6) Z.tS
Extract 6
Publicconcernregardinggovernmentuse of
information from citizensgrew to the extent that
the PrivacyAct was passedin 1974.
134
Extract 7
The Act was criticized,howevel becauseit was
difficult to enforce and, not only that, but because
it excludedthe collectionof data by companies
and organizationsother than government.
Extract 8
Daniel Solovegivesa good descriptionof the
issuesaround this in his 2004 book on technology
and privacyin the informationage.
Extract 9
Briefly,in his chapteron information privacylaw, he
explainshow the many exemptionsand loopholes
in the Act meant that it did not fully addressthe
concernswhich had led to it being passed.
Extract 10
The EFFspokespersonwent on to say,in an article
on a news website called ZDNet news,that he has
no doubt that a countrywhich signsup to the
treaty is being asked,and I quote, "to spy on its
citizens".
Extract 11
The evidenceshowsthat this is especially
true with
respectto the US.
Extract 12
In my view,the Digital MillenniumCopyrightAct,
or DMCA,which was passedin the U5 in 1998,is a
casein point.
Unit 11,Lesson
3, Exercise
e 6) Z.tZ
'action
,disciplinary
'black,hat
i'dentity ,theft
de,nialof 'service
'software ex,ploit
,socialengi'neering
i,llegalac'tivities
'bulletin ,board
g 6dZ.tA
Unit 11,Lesson
3, Exercise
Part 3
Let'sturn now to the ways in which regulations,
as opposedto law can be usedto help in
As you will be aware,most
decision-making.
companieswill have a wide range of regulations.
Theseare designedto provideguidancein
decision-making
in areaswhere there may be
differencesof opinion.5o, how important is
complyingwith companyregulations?Firstof all,
there is no questionthat this is a good idea if
you want to keep your job. We have to accept,as
employees,that there are certainthings which
computerprofessionals
can and cannot do. But
the questionis, is it enough to follow company
rulesin order to ensurethat decisionsare
ethical?Somecomputerprofessionals
claimthat
they don't haveto worry about breaking
nationaland internationallaws if they follow an
employer'sinstructions.
But l'm afraid that just
quite
isn'ttrue. lt's
clearthat companiescan and
do do thingswhich are illegal.Research
into lT
companiesand the law hasshown that there are
instances
where companies'actionscan be seen
as breakingthe law. Evidenceto supportthis
comesfrom actuallegal cases.A companycalled
Logistep,for example,was found to have
infringedprivacylaws.Employeesposedas users
of a peer-to-peerservicein order to gather
evidenceof copyrightmaterialbeing
downloaded. A peer-to-peerservice- if you're
not familiar with this term - is a network of
computersfor sharingmaterialsuchas music,
film and computerprograms,without the need
for a central server.When the Logistep
employeesdemandedthe users'namesand
addresses
from their lSP,the judge found that the
companyhad breachedthe privacyto which
individualswere entitled.You can see,therefore,
why it was importantfor computerprofessionals
at Logistepto be able to show that their
decisionswere reasonable,
and within the law as
they understoodit.
A different aspectof this type of situation can
be seenin the purchaseof a'botnet'for a BBC
programmeon computersecurityin 2009.
Botnets,a shortenedversionof robot networks,
are groupsof computerson which hackershave
managedto installsoftwarewithout their
owners'consent.The computerscan then be used
by the hackersfor illegalactivities.Theseusescan
includespamming,denial of serviceattacksor as
a basefor further attackson other computers.
Apparently,botnetsare sometimesmade
13s
137
rsBN928-1-859 64-51
9-2
ar n e t
garneteducatio n.co m
vwfnw.