Tiếng Anh - Oxford English for infomation technology (tt)

pdf 107 trang vanle 5880
Bạn đang xem 20 trang mẫu của tài liệu "Tiếng Anh - Oxford English for infomation technology (tt)", để tải tài liệu gốc về máy bạn click vào nút DOWNLOAD ở trên

Tài liệu đính kèm:

  • pdftieng_anh_oxford_english_for_infomation_technology_tt.pdf

Nội dung text: Tiếng Anh - Oxford English for infomation technology (tt)

  1. UNIT 17 Computing Support STARTER Find out what the most common computing problems are for your classmates and how they get help with these problems. Use this form to record your results. Problems Sources of help viruses monitor problems mouse problems computer hangs printer problems computer crashes other Ask questions like these: 1 Have you ever had a problem with a virus? 2 Have you ever had a software problem? 3 What kind of problem? 4 What did you do about it? 5 How did you get help? LISTENING Study this form used by computing support staff in a help centre to record problems reported by phone. What questions would you ask to get this information? Compare your questions with your partner. Now listen to this recording of a computing support officer, David, advising a user. Complete the form to record the main details of the problem. Listen again to note the questions asked by David. How do they compare with the questions you produced in Task 2?
  2. 118 UNIT 17 Computing Support LANGUAGE WORK Diagnosing a fault ar Study this extract from the recording: In Unit 14, you studied these ways to advise It sounds as if you may have a driver fault. someone to do something. David is trying to identify the cause of the Using an imperative: problem. He's not completely certain. 1 Try to reinstall the sound drivers. Compare these versions: 1 It sounds as if you may have a driver fault. Using the modal verb should: 2 It sounds as if you have a driver fault. 2 You should reinstall the sound drivers. 3 You probably have a driver fault. 4 You must have a driver fault. Using recommend: 3 / recommend reinstalling the sound drivers. Each statement is more certain than the one before. You can use the expressions studied You can also use: in Unit 16 to show how certain you are. When 4 / recommend that you reinstall the sound you are sure you know the cause of the drivers. problem, you can use must as in example 4. 5 / advise you to reinstall the sound drivers. Study this further extract: Or phrases such as: You could try to reinstall the sound drivers. 6 The best thing to do is to reinstall the sound Here David is giving advice. Advice usually drivers. follows diagnosis. Study these steps to take before you phone for technical support. Rewrite each one using the clue given. 1 Reboot your PC to see if the problem recurs, (should) 2 Use your PC's on-board diagnostic and repair tools. (recommend) 3 Record the details of the problem so you can describe it accurately. (good idea) 4 Note your system's model name and serial number. (advise) 5 Keep a record of hardware and software you've installed along with any changes you've made to settings. (strongly recommend) 6 If you think hardware may be at fault, figure out how to open the case. (should) 7 Visit the vendor's website and check the FAQs. (best thing) 8 Avoid phoning in peak times. (never) 9 Have your system up and running and be near it when you call. (good idea) 10 When you reach a technician, tell him or her if you may have caused the problem. (advise)
  3. UNIT 17 Computing Support 119 Diagnose these faults and provide advice on each problem. 1 My laser printer produces very faint copies. 2 When I print, three or four sheets come through the printer at the same time. 3 My spreadsheet does not seem to add up correctly. 4 Everything I type appears in capitals. 5 My PC is switched on but the monitor screen is blank. 6 I tried to print a document but nothing came out of the printer. 7 My monitor picture is too narrow. 8 My monitor screen flickers. 9 My mouse responds erratically. 10 The time display on my computer is one hour slow. 11 When I print out a page, the first two lines are missing. 12 My computer sometimes stops and reboots itself. The lights dim at the same time. As a class, find out how many had problems with any of these items of hardware in the last twelve months. Calculate the percentages and compare results with these findings from a national survey. % of users reporting problems in the last 12 months Your class Other users Hard disk 17 CD-ROM drive 15 Modem 15 Mouse 13 Monitor 12 Motherboard 11 Sound card 7 Cooling fan 7 Floppy disk drive 7 Battery 7 Keyboard 6 Power supply 6 Memory 5 Graphics/Video 5 CPU 3
  4. 120 UNIT 17 Computing Support SPEAKING Work in pairs, A and B. Advise your partner on his/her computing problem. Ask for advice on your computing problem. Complete this form for your partner's problem. Student A Your problems and advice are on page 187. Student B Your problems and advice are on page 193. Fig 2
  5. UNIT 17 Computing Support 121 WRITING Study this brief report made from the completed form for Task 3. Then write your own report of one of the Task 8 problems using the form you completed for that task. Your report should have these sections: paragraph 1 user's hardware, software, network connections, etc. paragraph 2 description of the problem and the possible diagnosis paragraph 3 action taken Job No. E83905 The call was logged at 15. 22 on 26th June. The user has an Apricot LS 550 with a Pentium III processor and 128 MB of RAM. The operating system is Windows 2000. The machine is networked - Windows NT. It is under warranty. The machine is not playing MIDI sound files. This may be due to faulty sound drives. The client was advised to re-install the original sound drivers. If this does not solve the problem, new sound drivers will be sent. A visit is not required.
  6. 122 UNIT 17 Computing Support SPECIALIST READING Find the answers to these questions in the text and table below. Give two reasons why server computers often have connected hard drives. Why is RAID 0 particularly suited to imaging and scientific work? What is the advantage of using drive mirroring? To store data, RAID levels higher than 1 require: a At least double the disk space b Up to about a third more disk space c Less than half the disk space Where is the backup data stored in a RAID 5 system? Server manufacturers connect hard drives Which levels of RAID can reconstruct data to ensure that data is adequately protected lost in failed drives from the backup data and can be quickly accessed. Computer engineers call such an arrangement a spread across the remaining drives in the redundant array of inexpensive disks array? (RAID). By arranging drives in sets, users Which level of RAID is the fastest? hope to take advantage of the higher seek times of smaller drives. A special hard disk controller, called a RAID controller, ensures that the RAID array's individual drives are seen by the computer as one large disk drive. RAID schemes are numbered, with higher numbers indicating more elaborate methods for ensuring data integrity and fault tolerance (or a computer's ability to recover from hardware errors). Re-read the text and table to find the B answers to these questions. 1 Match the terms in Table A with the statements in Table B. Table A a RAID b RAID controller c An array d Striping e Mirroring f Check data ['Raid Technology Primer', PC Advisor, 4 January 1996; Windows Sources, April 1994]
  7. UNIT 17 Computing Support 123 RaidO Raidl Raid 2-4 Raids Fault tolerance? No Yes Yes Yes What does it do? Called disk striping, Called disk mirroring, RAID 2-4 are rarely Called striping with RAID 0 breaks data RAID 1 uses two used and simply parity, the popular into blocks that are identical drives: data enhance the striping RAID 5 writes error- spread across all written to the first is provided by other correcting, or parity, drives rather than duplicated on the RAID levels. data across available filling one before second. drives. writing to the next. What are the Improved disk I/O If either drive fails, 2 enhances 0 by If one drive fails, its advantages? throughput - the the other continues using additional contents are fastest of all RAID to provide drives to store parity recovered by configurations as it uninterrupted access data. 3 enhances 2 analysing the data on distributes read/write to data. by requiring only one the remaining disks operations across error-checking drive. and comparing it multiple drives. Good 4 builds on 3 by with the parity data. for imaging and using larger block scientific work where sizes, boosting speed is important. performance. What are the The failure of any Inefficient use of disk Uses dedicated disks Not as fast as RAID 0. disadvantages? single drive means space. to store the parity the entire array is data used to lost. reconstruct drive contents. Up to 30% more hard disk space needed than 1. Table B 2 Mark the following statements as True or False: i Information which is used to restore data if one of the RAID drives fail a Small disks tend to have lower seek times than large disks. ii A process of spreading data across a set b RAID controllers make one large hard disk of disks act like a set of small disks. iii Redundant array of inexpensive disks c In RAID systems, one disk is filled with data iv A set before the next disk is used. v A device for controlling a set of hard disks d A higher numbered RAID array uses a more elaborate system to protect the integrity of vi The technique of writing the same data. information to more than one drive e RAID 0 provides good data recovery. f Small file servers do not usually use RAID level 3.
  8. UNIT 18 Data Security 1 STARTER What stories do you think followed these headlines? Compare answers within your group. 1 Love bug creates worldwide chaos. 2 Hackers crack Microsoft software codes. 3 Web phone scam. What other types of computer crime are there? Make a list within your group. READING Study this diagram which explains how one type of virus operates. Try to answer these questions. 1 What is the function of the Jump instruction? 2 What are the main parts of the virus code? 3 What is the last act of the virus? UNINFECTED INFECTED PROGRAM PROGRAM ORIGINAL starting instruction JUMP instruction MISDIRECTION routine REPRODUCTION routine VIRUS CODE TRIGGER routine PAYLOAD routine original starting instruction, plus code to return control to Fig 1 the program as originally written How a virus infects a program
  9. Scan this text to check your answers to Task 3. Ignore any parts which do not help you with this task. THE ANATOMY OF A VIRUS A biological virus is a very small, simple organism that screen or it might do something more destructive such infects living cells, known as the host, by attaching as deleting files on the hard disk. itself to them and using them to reproduce itself. This When it infects a file, the virus replaces the first often causes harm to the host cells. instruction in the host program with a command that Similarly, a computer virus is a very small program changes the normal execution sequence. This type of routine that infects a computer system and uses its command is known as a JUMP command and causes resources to reproduce itself. It often does this by the virus instructions to be executed before the host patching the operating system to enable it to detect program. The virus then returns control to the host program files, such as COM or EXE files. It then copies program which then continues with its normal sequence itself into those files. This sometimes causes harm to the of instructions and is executed in the normal way. host computer system. To be a virus, a program only needs to have a When the user runs an infected program, it is loaded reproduction routine that enables it to infect other into memory carrying the virus. The virus uses a programs. Viruses can, however, have four main parts. common programming technique to stay resident in A misdirection routine that enables it to hide itself; a memory. It can then use a reproduction routine to infect reproduction routine that allows it to copy itself to other programs. This process continues until the other programs; a trigger that causes the payload to be computer is switched off. activated at a particular time or when a particular event The virus may also contain a payload that remains takes place; and a payload that may be a fairly harmless dormant until a trigger event activates it, such as the joke or may be very destructive. A program that has a user pressing a particular key. The payload can have a payload but does not have a reproduction routine is variety of forms. It might do something relatively known as a Trojan. harmless such as displaying a message on the monitor Now read the whole text to find the answers to these questions. 1 How are computer viruses like biological viruses? 2 What is the effect of a virus patching the operating system? 3 Why are some viruses designed to be loaded into memory? 4 What examples of payload does the writer provide? 5 What kind of programs do viruses often attach to? 6 Match each virus routine to its function. Routine Function 1 misdirection a does the damage 2 reproduction b attaches a copy of itself to another program 3 trigger c hides the presence of the code 4 payload d decides when and how to activate the payload 7 How does a Trojan differ from a virus?
  10. 126 UNIT 18 Data Security 1 LANGUAGE WORK What is the relationship between these ate or event occurs which makes the actions? trigger routine run. 1 A date or event occurs. Putting the events in sequence and using a 2 The trigger routine runs. causative verb. 3 The payload routine activates. 4 The hard disk is wiped. 3 The trigger routine runs, which activates the payload routine. These events form part of a cause and effect chain. We can describe the links between Using a when clause. each event in a number of ways: 4 When the trigger routine runs, the payload routine activates. Using cause + to V or make + V. 1 A date or event occurs which causes the trigger routine to run. Describe the effects of these viruses and other destructive programs. 1 logic bomb-example a A dismissed employee's name is deleted from the company's payroll. b A logic bomb is activated. c All payroll records are destroyed. 2 Form (Boot sector virus) a A certain date occurs. b A trigger routine is activated. c Keys beep when pressed and floppies are corrupted. 3 Beijing (Boot sector virus) a The operator starts up the computer for the one hundred and twenty-ninth time. b A trigger routine is activated. c The screen displays, 'Bloody! June 4,1989'. 4 AntiEXE a The infected program is run. b The boot sector is corrupted. c The disk content is overwritten. d Data is lost.
  11. UNIT 18 Data Security 1 127 5 Cascade (File virus - COM files only) a A particular date occurs. b The payload is triggered. c Characters on a text mode screen slide down to the bottom. 6 macro virus-example a An infected document is opened in the word processor. b The virus macro is executed. c The virus code is attached to the default template. d The user saves another document. e The virus code attaches to the saved document. f The saved document is opened in the wordprocessor. g The virus destroys data, displays a message or plays music. Some verbs beginning or ending with en have a causative meaning. Replace the words in italics in these sentences with the appropriate form of en verb from this list. enable encrypt ensure encode enhance brighten encourage enlarge widen 1 A MIDI message makes sound into code as 8-bit bytes of digital information. 2 The teacher is using a new program to give courage to children to write stories. 3 The new version of SimCity has been made better in many ways. 4 A gateway makes it possible for dissimilar networks to communicate. 5 You can convert data to secret code to make it secure. 6 Make sure the machine is disconnected before you remove the case. 7 Designers can offer good ideas for making your website brighter. 8 Electronic readers allow you to make the print size larger. 9 Programmers write software which makes the computer able to carry out particular tasks. 10 You can make the picture on your monitor wider.
  12. 128 UNIT 18 Data Security 1 PROBLEM-SOLVING Decide in your group what these kinds of computer crime are. Then match the crimes to the short descriptions which follow. 1 Salami Shaving 2 Denial of Service attack 3 Trojan Horse 4 Trapdoors 5 Mail bombing 6 Software Piracy 7 Piggybacking 8 Spoofing 9 Defacing 10 Hijacking a Leaving, within a completed program, an illicit program that allows unauthorised - and unknown - entry. b Using another person's identification code or using that person's files before he or she has logged off. c Adding concealed instructions to a computer program so that it will still work but will also perform prohibited duties. In other words, it appears to do something useful but actually does something destructive in the background. d Tricking a user into revealing confidential information such as an access code or a credit-card number. e Inundating an email address with thousands of messages, thereby slowing or even crashing the server. f Manipulating programs or data so that small amounts of money are deducted from a large number of transactions or accounts and accumulated elsewhere. The victims are often unaware of the crime because the amount taken from any individual is so small. g Unauthorised copying of a program for sale or distributing to other users. h Swamping a server with large numbers of requests. i Redirecting anyone trying to visit a certain site elsewhere. j Changing the information shown on another person's website.
  13. UNIT 18 Data Security 1 129 SPEAKING Work in pairs, A and B. You both have details of a recent computer crime. Find out from your partner how his/her crime operated and its effects. Take notes of each stage in the process. Student A Your computer crime is on page 187. Student B Your computer crime is on page 193. WRITING Using your notes from Task 9, write an explanation of the computer crime described by your partner. When you have finished, compare your explanation with your partner's details on page 187 or 193. WHEN YOU HAVE FINISHED THE READING SECTION ON THE FOLLOWING PAGES, COME BACK TO THESE ADDITIONAL EXERCISES 3 Mark each of the following statements with 4 Put the following sentences, about sending True or False: a secure email, in the correct order: a A message encrypted with a public key can a The message is decrypted with the be decrypted by anyone. recipient's private key. b To send a secure message you must know b The message is received by the recipient. the recipient's public key. c The message is encrypted with the c Secure messages are normally encrypted recipient's public key. using a private key before they are sent. d The message is sent by the sender. d A message can be reconstructed from its MAC. e Two message can often have the same MAC. f A digital certificate is sent to a client in an encrypted form. g A digital certificate should be signed by a trusted digital-certificate issuer. h A MAC is used to check that a message has not been tampered with.
  14. 130 UNIT 18 Data Security 1 SPECIALIST READING Safe Data Transfer Secure transactions across the Internet have Flnd the answers to these questions in the three goals. First, the two parties engaging in a B following text. transaction (say, an email or a business purchase) don't want a third party to be able to 1 What does data encryption provide? read their transmission. Some form of data a privacy encryption is necessary to prevent this. Second, b integrity the receiver of the message should be able to c authentication detect whether someone has tampered with it in transit. This calls for a message-integrity 2 A message encrypted with the recipient's scheme. Finally, both parties must know that public key can only be decrypted with they're communicating with each other, not an a the sender's private key impostor. This is done with user authentication. b the sender's public key Today's data encryption methods rely on a c the recipient's private key technique called public-key cryptography. 3 What system is commonly used for Everyone using a public-key system has a public encryption? key and a private key. Messages are encrypted 4 What is the opposite of 'encrypt'? and decrypted with these keys. A message 5 A message-digest function is used to: encrypted with your public key can only be decrypted by a system that knows your private a authenticate a user key. b create a MAC For the system to work, two parties engaging in c encrypt a message a secure transaction must know each other's 6 What information does a digital certificate public keys. Private keys, however, are closely give to a client? guarded secrets known only to their owners. When I want to send you an encrypted message, This shows the complex process that's required to send data three basic tenets of secure transfer: data encryption, securely across open communication lines while satisfying the interference prevention, and user authentification. Message- Message- Public digest authentication Sender function code 2 The sender encrypts the MAC 1 The sender takes a document and produces a message- with their private key. authentication code (MAC) using a message-digest function. 3 The sender attaches the encrypted MAC to the document 4 When the recipient receives the document, and encrypts both with the recipient's public key. they can decrypt it with their private key. Sender 5 The recipient produces a local copy of the document's MAC using the same message-digest function the sender used. Recipient Recipient 7 The recipient compares its local copy of the MAC to the sender's unencrypted MAC. If the two match, then the recipient 6 The recipient decrypts the sender's knows the document hasn't been tampered with and that only MAC using the sender's public key. the sender could have created the original message.
  15. UNIT 18 Data Security 1 131 I use your public key to turn my message into gibberish. I know that only you can turn the Re-read the text to find the answers to gibberish back into the original message, these questions. because only you know your private key. Public- B key cryptography also works in reverse - that is, 1 Match the functions in Table 1 with the keys only your public key can decipher your private in Table 2. key's encryption. To make a message tamper-proof (providing Table 1 message integrity), the sender runs each message through a message-digest function. This a to encrypt a message for sending function within an application produces a b to decrypt a received message number called a message-authentication code (MAC). The system works because it's almost c to encrypt the MAC of a message impossible for an altered message to have the d to encrypt the MAC of a digital signature same MAC as another message. Also, you can't take a MAC and turn it back into the original message. Table 2 The software being used for a given exchange i sender's private key produces a MAC for a message before it's encrypted. Next, it encrypts the MAC with the ii trusted issuer's private key sender's private key. It then encrypts both the iii the recipient's private key message and the encrypted MAC with the iv the recipient's public key recipient's public key and sends the message. When the recipient gets the message and decrypts it, they also get an encrypted MAC. The 2 Match the terms in Table A with the software takes the message and runs it through statements in Table B. the same message-digest function that the sender used and creates its own MAC. Then it Table A decrypts the sender's MAC. If the two are the same, then the message hasn't been tampered a Gibberish with. b Impostor The dynamics of the Web dictate that a user- c Decipher authentication system must exist. This can be done using digital certificates. d MAC A server authenticates itself to a client by e Tenets sending an unencrypted ASCII-based digital f Tamper certificate. A digital certificate contains information about the company operating the server, including the server's public key. The Table B digital certificate is 'signed' by a trusted digital- i Message-authentication code certificate issuer, which means that the issuer has investigated the company operating the ii Principal features server and believes it to be legitimate. If the iii Meaningless data client trusts the issuer, then it can trust the server. The issuer 'signs' the certificate by iv Person pretending to be someone else generating a MAC for it, then encrypts the MAC v Make unauthorised changes with the issuer's private key. If the client trusts the issuer, then it already knows the issuer's vi Convert to meaningful data public key. The dynamics and standards of secure transactions will change, but the three basic tenets of secure transactions will remain the same. If you understand the basics, then you're Additional exercises on page 129 already three steps ahead of everyone else. [Jeff Downey, 'Power User Tutor', PC Magazine, August 1998]
  16. UNIT 19 Data Security 2 STARTER Consider these examples of computer disasters. How could you prevent them or limit their effects? Compare answers within your group. 1 You open an email attachment which contains a very destructive virus. 2 Someone guesses your password (the type of car you drive plus the day and month of your birth) and copies sensitive data. 3 Your hard disk crashes and much of your data is lost permanently. 4 Someone walks into your computer lab and steals the memory chips from all the PCs. 5 Your backup tapes fail to restore properly. READING Study this table of security measures to protect hardware and software. Which measures would prevent or limit the effects of the disasters in Task 1? Control Access Implement Protect against to Hardware and Network Controls Natural Disasters Software * Install firewalls to * Install uninterruptible * Lock physical locations protect networks from power supplies and and equipment. external and internal surge protectors. attacks. * Install a physical security system. * Password-protect programs and data with * Monitor access 24 passwords which hours a day. cannot easily be cracked. * Monitor username and password use - require changes to passwords regularly. * Encrypt data. * Install a callback system. * Use signature verification or biometric security devices to ensure user authorisation.
  17. Find words or phrases in the table which mean: 1 copies of changes to files made to reduce the risk of loss of data 2 software available for a short time on a free trial basis; if adopted a fee is payable to the author 3 cannot be disrupted or cut 4 put at risk 5 deciphered, worked out 6 protect data by putting it in a form only authorised users can understand 7 a combination of hardware and software to protect networks from unauthorised users 8 observe and record systematically 9 measuring physical characteristics such as distance between the eyes 10 at regular intervals Backup Data and Separate and Protect against Programs Rotate Functions Viruses Make incremental If functions are Use virus protection backups, which are separate, then two or programs. copies of just changes more employees would Use only vendor- to files, at frequent need to conspire to supplied software or intervals. commit a crime. public domain or Make full backups, If functions are rotated, shareware products that which copy all files, employees would have are supplied by periodically. less time to develop services that guarantee To protect files from methods to they are virus-free. natural disasters such compromise a program as fire and flood, as or system. well as from crimes Perform periodic and errors, keep audits. backups in separate locations, in fireproof containers, under lock and key.
  18. 134 UNIT 19 Data Security 2 LANGUAGE WORK Cause and effect (2) links using allow and prevent What is the relationship between these What is the relationship between these events? events? 1 The scanner finds a match for your 4 The scanner does not find a match for your fingerprint. fingerprint. 2 The keyboard is unlocked. 5 The keyboard remains locked. 3 You can use the PC. 6 You cannot use the PC. 1 and 2 are cause and effect. We can link We can show that 4 and 5 are cause and them using the methods studied in Unit 18. effect using the methods studied in Unit 18. In addition we can use an if-sentence. Note We can also use therefore. that the tenses for both cause and effect are The scanner does not find a match for your the same. For example: fingerprint, therefore the keyboard remains If the scanner finds a match for your locked. fingerprint, the keyboard is unlocked. 5 prevents 6 from happening.We can link 5 2 allows 3 to happen. We can link 2 and 3 and 6 using prevent or stop. using allow or permit. The keyboard remains locked, preventing you The keyboard is unlocked, allowing/permitting (from) using the PC. you to use the PC. The keyboard remains locked, stopping you (from) using the PC. Put the verbs in brackets in the correct form in this description of how smart cards work. Smart cards prevent unauthorised users (access) systems and permit authorised users (have) access to a wide range of facilities. Some computers have smart card readers (allow) you (buy) things on the Web easily and safely with digital cash. A smart card can also send data to a reader via an antenna (coil) inside the card. When the card comes within range, the reader's radio signal (create) a slight current in the antenna (cause) the card (broadcast) information to the reader which (allow) the user, for example, (withdraw) money from an ATM or (get) access to a system.
  19. UNIT 19 Data Security 2 135 Decide on the relationship between these events. Then link them using structures from this and earlier units. 1 Anti-virus program a A user runs anti-virus software. b The software checks files for virus coding. c Coding is matched to a known virus in a virus database. d A message is displayed to the user that a virus has been found. e The user removes the virus or deletes the infected file. f The virus cannot spread or cause further damage. 2 Face recognition a You approach a high-security network. b Key features of your face are scanned. c The system matches your features to a database record of authorised staff. d Your identity is verified. e You can log on. f Your identity is not verified. g You cannot use the system. 3 Voice recognition a Computers without keyboards will become more common. b These computers are voice-activated. c The user wants to log on. d She speaks to the computer. e It matches her voice to a database of voice patterns. f The user has a cold or sore throat. g She can use the system. h Stress and intonation patterns remain the same.
  20. 136 UNIT 19 Data Security 2 PROBLEM-SOLVING Study these illustrations for two forms of security scanning. Write your own captions for each of the numbered points. Eye scanning Hand scanning Fig 1 Scanning technology
  21. UNIT 19 Data Security 2 137 SPEAKING Backups Work in pairs, A and B. You each have details of one form of backup. Explain to your partner how your form of backup works. Make sure you understand the form of backup your partner has. Ask for clarification if anything is unclear. Student A Your information is on page 188. Student B Your information is on page 194. WRITING Firewalls Study this diagram of a firewalled network system. Write a description of how it operates. You may need to do some research on firewalls to supplement the diagram. Your description should answer these questions: 1 What is its function? 2 What does it consist of? 3 How are the firewalls managed? 4 How does it control outgoing communications? 5 How does it prevent external attack? Web Server This management Module. Management Server Hides internal IP addresses and filters network traffic GUI Client Internet Router Intranet Firewalled gateway manages these Firewall Modules Internal Firewall Changes network Database protocol and Server filters network traffic that protect these networks. Fig 2 How a firewall works
  22. 138 UNIT 19 Data Security 2 Backup HSM and Media Choice Find the answers to these questions In the B following text Near-line and offline storage (often called Hierarchical Storage Management) is the modern 1 What factor determines which type of way of dealing with current storage needs. Hard storage is used to store a file in an HSM disks are becoming cheaper, but data storage system? requirements are higher, so it's better to plan for 2 Complete the following table using HSM than assume disks can continually be added information from the text. to systems. Storage Type Media Speed HSM is essentially the automatic movement of data between media, the media type used very fast with depending on when it was last accessed. Many quickest access software and hardware vendors have HSM speed solutions, and all are based on the same basic techniques. optical The most common HSM setup is where there's offline online storage (the hard disk), near-line storage (some sort of fast media from where a file can be 3 What happens to data that is not accessed quickly retrieved), and offline storage (slower for a long time? media that might take some time for files to be 4 How does the system record that a file is in recovered, but it is cheaper for a long-term storage). This arrangement is the major thrust of near-line storage? today's systems. Most of the time these systems 5 What happens when a user tries to access a will comprise optical media for near-line and file in near-line storage? tape media for offline storage. 6 What does the reference to a file in offline Data is automatically moved from the online storage contain? disk to the near-line optical media if it hasn't 7 To whom does the user send a request for been accessed for a definable period of time. the retrieval of a file from offline storage? This is typically three months (depending on 8 Name three types of magnetic tape your business). This near-line system is likely to mentioned in the text. be erasable optical disks in some form of jukebox. 9 Select the correct answers in the following: The system has to operate on the basis that a a How long can data be stored on tape? user won't know that a file has been moved into near-line storage. Therefore some marker is left i) 6 months ii) 2 years iii) 10 years in the directory structure on the disk so that the b Hard disks are usually used for which user can still see the file. If the user then tries to type of storage? open it, the file will automatically be copied i) offline ii) online iii) near-line from near-line to online storage, and opened for c Tape is normally used for which type of the user. All the user notices is a slight time storage? delay while the file is opened. i) offline ii) near-line iii) online Moving data from near-line to offline storage can d Files are automatically retrieved from be done using a similar mechanism, but more offline storage often the marker left in the directory for the user to see will just contain a reference. This gives i) always ii) sometimes iii) never the user the facility to request the file back from 10 What two factors determine the choice of the systems administrator, and could have storage media used? information like ' This file has been archived to 11 What items must you remember to maintain offline media' and a reference to the tape while data is stored? number that the file is on. This is then sent to the systems administrator and the file can be recovered from tape in the usual way. Some modern systems have the ability to keep multiple tapes in a tape changer or jukebox
  23. UNIT 19 Data Security 2 139 Re-read the text to find the answers to system, so retrieval from offline to online 0 these questions. storage can be automatic. However, it is more 1 Mark each of the following statements with likely that when a file goes into offline storage it will never be recovered, as it has probably been True or False: untouched for several months (again depending a Hard disks are still very expensive. on the business). Therefore the requirement to recover from offline to online is reasonably b Near-line storage needs to have a quick infrequent. access speed. c Near-line storage is usually some form of The choice of storage media type is a crucial aspect of HSM. The cheapest is undoubtedly tape jukebox. (be it digital, analogue or digital linear), so this d Offline storage needs to have a fast access tends to be used for offline storage. However, speed. tape has no guarantee of data integrity beyond e Users are aware that their files have been one or two years, whereas optical systems, such moved to near-line storage. as CDs, WORMs and MO disks, have much better f The movement of files between near-line and data integrity over a longer period of time. Depending on the precise application, archiving online storage is automatic. systems are usually based on the media type g The user sometimes has to request files that has the best integrity. The major suppliers from the systems administrator. within the HSM market are totally open about the h Files are frequently recovered from offline media that can be used with their software. storage. Current HSM systems support most hardware I Tape has much better data integrity than devices, so you can mix and match media to suit requirements. Given the fact that media choice optical media. depends on the length of time you want your j It is usually possible to use whatever media data to remain intact, and also the speed at you want in an HSM system. which you want to recover it, the choice for many system managers is as follows. Tape is used for backup systems where large amounts of data need to be backed up on a regular basis. Tape is cheap, integrity is good over the short to medium term, and retrieval from a backup can be made acceptable with good tape storage practices. Near-line storage should be based on erasable optical disks. This is because access is random, so the access speed to find and retrieve a particular file needs to be fast, and data integrity is also good. Archiving systems should probably be CD- or WORM-based, as again access speeds are good, media costs are reasonably cheap and, importantly, the integrity of the media over the medium to long term is good. One important thing to remember with archiving systems is the stored data's format. The data might be held perfectly for 10 or 15 years, but when you need to get it back, it's essential that you maintain appropriate hardware and software to enable you to read it. [Adapted from 'Backup HSM and media choice' by Phil Crewe, Tape Backup, PC Magazine, May 1996]
  24. UNIT 20 INTERVIEW ex-hacker STARTER Find the answers to these questions as quickly as you can. 1 Which group hacked into Hotmail? 2 Who was 'The Analyser' and what did he do? 3 Which hacker was sent to jail for fraud? 4 What was the effect of the 1996 raid on Scotland Yard? 5 Which of the cases reported here involved teenagers? 6 What did hackers do to the Yahoo! website? 7 What crime was Raphael Gray accused of? Kevin Mitnick is the hackers' hero. His latest Hotmail, Microsoft's free email service, was spell in jail was a 46-month sentence for fraud hacked into last September, exposing the relating to breaking into the systems of several correspondence of more than 40m users. A group multinational corporations. He was released on calling itself Hackers Unite posted a Web address condition that he did not have any contact with with details of how to access any Hotmail a computer. account. The service was shut down for five hours. In March 2000, a Welsh teenager allegedly stole The UK Department of Trade and Industry has information from more than 26,000 credit card twice been prey to hackers, once in 1996 and accounts across Britain, the US, Japan, Canada again in 2000 when a DTI computer was and Thailand, and published the details on the programmed to reroute email. The Home Office Internet. FBI agents and British police raided investigated nine cases of hacking last year, one of the home of Raphael Gray,18, and arrested him which was the leaking of a report on a murder. In and his friend. He has been charged with 10 counts of downloading unauthorised information. August 1996 hackers ran up a £lm phone bill for Scotland Yard but did not access flies. In 1998 Washington revealed that an Israeli In ] 997 hackers got into the Yahoo! website, hacker called 'The Analyser' was responsible for 'the most organised attempt to penetrate the replacing the homepage with a ransom note Pentagon's computer systems'. He turned out to demanding the release of their hero, Kevin be Ehud Tenenbaum, 18, who had planted a list of Mitnick. Unless the demand was met, the note his own passwords in the Pentagon system and said, a virus would be released in all Yahoo!'s passed them to other hackers. computers. The company dismissed the threat as a hoax, but the 'Free Kevin' slogan continued to appear on other hijacked sites. In 1997 the son of a fraud squad detective walked free from a court in London after charges of breaching the security of the US air force were dropped. Three years earlier Mathew Bevan, then 19, and a friend, Richard Pryce, 16, used the Internet to gain access to several US military bases. Pryce was fined £1,200 after admitting several other offences.
  25. LISTENING Think about these questions before you listen. 1 How could you hack into a system? 2 How could you stop people hacking into a system? Mow listen to Part 1 of the recording to check your answers to Task 2 and to find the answers to these questions: 1 What was Ralph arrested for? 2 What does he do now? 3 Why does he say people are too trusting? 4 What passwords does he suggest for trying to get into a system? 5 What does a firewall do? 6 What is the advantage of a callback system? 7 To prevent hacking, what sort of passwords should you avoid? 8 What do event logs show? Now listen to Part 2 of the recording and find the answers to these questions: 1 How did Ralph start thinking about computer security? 2 How did he find the most senior ID in the American company's system? 3 According to Ralph, why do people hack? 4 Why did he and his friend hack? 5 How did the police find him? 6 Why does he say companies should use his services? 7 Do hackers know each other? 8 What's the difference between Hollywood hackers and the real world? 9 How risky is credit card use on the Internet? 10 What advice does he give for people intending to use credit cards over the Internet?
  26. 142 UNIT 20 The ex-hacker Now listen to both parts again to find the answers to these questions: 1 What evidence did Ralph and his friend leave to show that they had hacked into the American company's system? 2 What is a 'white hat' hacker? 3 What two ways does Ralph give for hacking into a system? 4 What terms does Ralph use to describe someone obsessed by computers? 5 How does he maintain contact with the policeman who arrested him? 6 How does he describe his lack of enthusiasm for the Hollywood hacker? 7 What does he mean by 'It's the retailers who get done'? 8 What's the problem with using smart cards for Internet purchases? LANGUAGE WORK A phrasal verb is a verb + preposition One we can work out from the meaning of combination. For example, look up, take the two words separately: down, turn over. Phrasal verbs are common in She looked up at the roof. informal, spoken English. Sometimes they have a more formal one word equivalent, for A special meaning which does not easily example, work out = determine. relate to the separate meanings of the words: Often phrasal verbs have two meanings. She looked up a word in the dictionary. Study these phrasal verbs from the Task 1 texts and the recording: break into grow up throw away get into phone up log on hack into run up find out go about keep at track down set about shut down hand over keep ahead Now complete each blank with the appropriate phrasal verb in the correct form. In some cases, more than one answer is possible.
  27. 144 UNIT 20 The ex-hacker WORD STUDY Semantic groups Group these terms into the five headings, A to E, below. Viruses and other Data Communication Internet World Wide Web destructive protection systems programs . anti-virus software FTP passwords backups GPS router bandwidth IRC trigger routine browser ISP Trojan domain name hyperlink URL encryption logic bomb Usenet firewalls pagers XML SPEAKING Role play Work in pairs. Together make up your own questions on these prompts. Then play the parts of the interviewer and Ralph. 1 first interested in hacking 2 reason for being arrested 3 present job 4 ways to avoid hackers 5 views on Hollywood hackers 6 safe ways of paying for Internet shopping WRITING Write a news item like the short newspaper texts given in Task 1 about Ralph or about any other hacking case known to you.
  28. UNIT 20 The ex-hacker 145 Study this extract from a virus information database. Then make a flowchart to show each step in the method of infection for this virus. Steps 1 and 2 are done for you. Step 1 An infected .EXE file arrives as an email attachment. Step 2 The infected .EXE file is opened. Virus name W32/Magistr.@MM Risk assessment Medium Date discovered 12/3/01 Origin Sweden Length Varies, adds at least 24KB Type virus Sub-type worm Method of infection This is a combination of a files infector virus and an email worm. The virus arrives as an .EXE file with varying filenames. When you execute the attachment, your machine is infected and in turn is used to spread the virus. When first run, the virus may copy one .EXE file in the Windows or Windows System directory using the same name but with the final character of the filename decreased by a factor of 1. For example, EHGEDI57.EXE will become EHGEDI56.EXE, TCONTRACT.EXE will become TCONTRACS.EXE. This copy is then infected and a WIN.INI entry, or registry run key value may be created, to execute the infected file when the system starts up. This copied executable infects other 32 bit .EXE files in the Windows directory and subdirectories, when run. Five minutes after the file is opened, the email worm attempts a mailing routine. It creates a .DAT file hidden somewhere on the hard disk. This contains strings of the files used to grab email addresses from address books and mailboxes. The .DAT file name will be named after the machine name in a coded fashion. For example, y becomes a, x becomes b. Numbers are not changed. The worm uses mass mailing techniques to send itself to these addresses. The subject headings, text and attachments will vary. The text is taken from other files on the victim's computer. This worm may also alter the REPLY-TO email address when mailing itself to others. One letter of the address will be changed. This makes it difficult to warn the victim that their machine is infecting others as the message will be returned to sender.
  29. UNIT 20 The ex-hacker 143 1 Hackers try to passwords so they can penetrate a system. 2 Don't your password to anyone who asks for it. 3 The police Ralph by talking to his friends and acquaintances. 4 Some hackers systems to get commercially valuable information. 5 When you to a network, you have to provide an ID. 6 How do you hacking into a system? 7 Hackers may pretending to be from your company, and ask for your password. 8 Never your credit card receipts where someone can find them. 9 Ralph was a hacker as a teenager but he's now and become more responsible. 10 a system is strictly illegal nowadays. 11 It's a constant race to of the hackers. Replace the verb in italics with a phrasal verb of similar meaning. All the phrasal verbs required have been used in this book. 1 Don't discard your credit card receipts; they could help fraudsters. 2 Trying to penetrate computer systems is against the law. 3 The typical hacker is a young person who has not matured yet. 4 The best way to begin hacking into a system is to try to get hold of a password. 5 If someone telephones you and asks for your password, don't provide it. 6 Hackers closed Hotmail for five hours. 7 Hackers accumulated a telephone bill of £lm for Scotland Yard. 8 The difficult thing was to determine how the website would look. 9 So you won't forget, record the ID number the support technician gives you. 10 Examine the manufacturers' websites before you phone for help.
  30. 144 UNIT 20 The ex-hacker WORD STUDY I Semantic groups Group these terms into the five headings, A to E, below. Viruses and other Data Communication Internet World Wide Web destructive protection systems programs anti-virus software FTP passwords backups GPS router bandwidth IRC trigger routine browser ISP Trojan domain name hyperlink URL encryption logic bomb Usenet firewalls pagers XML SPEAKING Role play Work in pairs. Together make up your own questions on these prompts. Then play the parts of the interviewer and Ralph. 1 first interested in hacking 2 reason for being arrested 3 present job 4 ways to avoid hackers 5 views on Hollywood hackers 6 safe ways of paying for Internet shopping WRITING Write a news item like the short newspaper texts given in Task 1 about Ralph or about any other hacking case known to you.
  31. UNIT 20 The ex-hacker 145 Study this extract from a virus information database. Then make a flowchart to show each step in the method of infection for this virus. Steps 1 and 2 are done for you. Step 1 An infected .EXE file arrives as an email attachment. Step 2 The infected .EXE file is opened. Virus name W32/Magistr.@MM Risk assessment Medium Date discovered 12/3/01 Origin Sweden Length Varies, adds at least 24KB Type virus Sub-type worm Method of infection This is a combination of a files infector virus and an email worm. The virus arrives as an .EXE file with varying filenames. When you execute the attachment, your machine is infected and in turn is used to spread the virus. When first run, the virus may copy one .EXE file in the Windows or Windows System directory using the same name but with the final character of the filename decreased by a factor of 1. For example, EHGEDI57.EXE will become EHGEDI56.EXE, TCONTRACT.EXE will become TCONTRACS.EXE. This copy is then infected and a WIN.INI entry, or registry run key value may be created, to execute the infected file when the system starts up. This copied executable infects other 32 bit .EXE files in the Windows directory and subdirectories, when run. Five minutes after the file is opened, the email worm attempts a mailing routine. It creates a .DAT file hidden somewhere on the hard disk. This contains strings of the files used to grab email addresses from address books and mailboxes. The .DAT file name will be named after the machine name in a coded fashion. For example, y becomes a, x becomes b. Numbers are not changed. The worm uses mass mailing techniques to send itself to these addresses. The subject headings, text and attachments will vary. The text is taken from other files on the victim's computer. This worm may also alter the REPLY-TO email address when mailing itself to others. One letter of the address will be changed. This makes it difficult to warn the victim that their machine is infecting others as the message will be returned to sender.
  32. UNIT 21 Software Engineering STARTER Put these five stages of programming in the correct sequence. a Design a solution b Code the program c Document and maintain the program d Clarify the problem e Test the program To which stage do each of these steps belong? 1 Clarify objectives and users 2 Debug the program 3 Write programmer documentation 4 Do a structured walkthrough 5 Select the appropriate programming language LISTENING You are going to hear an interview between a systems analyst and a hotel owner who wants to introduce a better computer system. What questions do you think the analyst will ask? Make a list; then compare your list with others in your group. Listen to the recording to compare your list of questions with those asked by the analyst. Listen again to find the answers to these questions: 1 What system does the hotelier have at present? 2 What problem is there with the existing system? 3 What form of output does the hotelier want? 4 Who will use the new system? 5 Which members of staff will require the most training? 6 What concerns has the hotelier about the new system? 7 What kind of hardware will be required? 8 What is the next step?
  33. LANGUAGE WORK Revision: If X, then Y In this section, we will revise structures commonly used in programming. You have met these structures in earlier units but in different contexts. Study this decision table. It shows the rules CONDITIONS DECISION RULES that apply when certain conditions occur and what actions to take. Using it, we can make ] 2 rules like this: guest stays 3 nights Y Y 1 If a guest stays 3 nights in January and if one 1 night is Sunday Y N night is Sunday, then charge 2 nights at full price and 1 night at half-price. month is January Y N 2 If a guest stays 3 nights and one night is not Actions Sunday and it is not January, then charge 3 charge 3 nights at full price N Y nights at full price. charge 2 nights at full price Y N charge 1 night at half-price Y N Now make similar statements about this decision table. N N N N N N Y N N N N N N N N N N N N N N N N N N N N N N N N N N
  34. 148 UNIT 21 Software Engineering LANGUAGE WORK Do until, do while Study these extracts from a program flowchart. They show iteration or loop structures in which a process is repeated as long as certain conditions remain true. DO UNTIL Fig 1 Fig 2 Until loop While loop We can describe these structures like this: 2 Read in the employee records while there 1 Read in the employee records until there continues to be employee records. are no more employee records. Note that while links actions or states Note that until links an action and the limit happening at the same time. of that action. Link these statements with while or until, whichever is most appropriate. 1 Calculate all sales. There are no more sales. 2 Search for records containing the term. There are still records containing the term. 3 Total extra items. Extra items remain. 4 Search member records. There are no more records. 5 Print all addresses. There are still addresses available. 6 Display client names. There are no names remaining. 7 List all guests. There are no guests left. 8 Total monthly sales. There are no more sales for the current year.
  35. UNIT 21 Software Engineering 149 Flowcharts are sometimes used for designing parts of programs. Describe this extract from a program flowchart using the structures revised in this unit and the sequence expressions listed in Unit 2, Task 11. Fig 3 Hotel accommodation invoicing flowchart
  36. 150 UNIT 21 Software Engineering SPEAKING Work in pairs, A and B. You each have information about some programming languages. Together decide what would be the most appropriate language to use for each of these situations. 1 A schoolteacher wants his young pupils to learn some basic mathematics by controlling a simple robot. 2 The owner of a small business wants to create a simple database program to keep track of his stock. 3 An engineer wants to develop a program for calculating the stresses in a mechanical device. 4 A student wants to create webpages for a personal website. 5 A systems programmer wants to add some new modules to an operating system. 6 A programmer working for the US army wants to create a program for controlling a new type of weapon. 7 A finance company needs to process data from its branch offices on its mainframe computer. 8 A website designer wants to enable the data on his website to be easily processed by a number of different programs. 9 A student studying artificial intelligence wants to write some programs for a course project. 10 A college lecturer wants his students to learn the principles of programming. 11 A professional programmer wants to create and sell a program for use in language learning. 12 A website designer wants to password-protect a section of a website. Student A Your languages are on page 188. Student B Your languages are on page 194.
  37. UNIT 21 Software Engineering 151 WRITING Converting to a new system Write a paragraph describing each of these strategies for converting to a new computer system. Explain what its advantages and disadvantages are. The first strategy is described for you as an example. 1 Direct implementation: all-at-once change OLD SYSTEM 2 Parallel implementation: run at the same time OLD SYSTEM 3 Phased implementation: parts of the system are converted separately a gradually OLD SYSTEM b in groups 4 Pilot implementation: tried first in only one part of the company OLD SYSTEM NEW SYSTEM Fig 4 Strategies for converting to a new computer system 1 Direct implementation: Direct implementation means that the user simply stops using the old system and starts using the new one. The advantage is that you do not have to run two systems at the same time. The disadvantage of this approach is that if the new system does not operate properly, there is nothing to fall back on.
  38. 152 UNIT 21 Software Engineering SPECIALIST READING OBJECT-ORIENTED PROGRAMMING Find the answers to these questions in the One of the principal motivations for using OOP following text. is to handle multimedia applications in which D such diverse data types as sound and video can 1 What advantages of using object-oriented be packaged together into executable modules. programming are mentioned in the text? Another is writing program code that's more 2 What are the three key features of OOP? intuitive and reusable; in other words, code that shortens program-development time. 3 What multimedia data types are referred to in the text? Perhaps the key feature of OOP is encapsulation 4 List the different types of triangle mentioned - bundling data and program instructions into modules called 'objects'. Here's an example of in the text. how objects work. An icon on a display screen 5 What feature avoids the problem of deciding might be called ' Triangles'. When the user selects how each separate type of data is integrated the Triangles icon - which is an object composed and synchronized into a working whole? of the properties of triangles (see fig. below) and 6 What specific type of rectangle is named in other data and instructions - a menu might the text? appear on the screen offering several choices. The choices may be (1) create a new triangle and 7 What common properties of a rectangle are (2) fetch a triangle already in storage. The menu, mentioned in the text? too, is an object, as are the choices on it. Each 8 What features are made quicker by code time a user selects an object, instructions inside reusability? the object are executed with whatever properties or data the object holds, to get to the next step. For instance, when the user wants to create a ABOUT OBJECTS Objects can be classes, subclasses, or RECTILINEAR SHAPES instances. A class is at the highest level of the hierarchy. Classes are further STRAIGHT refined into subclasses. Instances are LINES INHERITANCE specific occurrences in a class or subclass. Properties in a class are inherited by their subclasses or instances. Thus, all rectilinear shapes are assumed to possess straight lines and no curves. RECTILINEAR SHAPES CLASS OR SUBCLASS RIGHT TRIANGLE CONTAINS INSTANCE RIGHT ANGLES PROPERTY
  39. UNIT 21 Software Engineering 153 triangle, the application might execute a set of instructions that displays several types of triangles - right, equilateral, isosceles, and so on. Re-read the text to find the answers to Many industry observers feel that the these questions. encapsulation feature of OOP is the natural tool B for complex applications in which speech and 1 Match the terms in Table A with the moving images are integrated with text and statements in Table B. graphics. With moving images and voice built into the objects themselves, program developers Table A avoid the sticky problem of deciding how each separate type of data is to be integrated and a OOP synchronized into a working whole. b Encapsulation A second key feature of OOP is inheritance. This c Object allows OOP developers to define one class of objects, say 'Rectangles', and a specific instance d Menu of this class, say 'Squares' (a rectangle with equal e Square sides). Thus, all properties of rectangles - 'Has 4 sides' and 'Contains 4 right angles' are the two f Polymorphism shown here - are automatically inherited by g Library Squares. Inheritance is a useful property in rapidly processing business data. For instance, consider a business that has a class called Table B 'Employees at the Dearborn Plant' and a specific i An OOP property that allows data and instance of this class, 'Welders'. If employees at the Dearborn plant are eligible for a specific program instructions to be bundled into benefits package, welders automatically qualify an object for the package. If a welder named John Smith is ii A list of choices later relocated from Dearborn to Birmingham, Alabama, where a different benefits package is iii An OOP property that enables different available, revision is simple. An icon objects to deal with the same instruction representing John Smith - such as John Smith's in different ways face - can be selected on the screen and dragged iv A reusable collection of objects with a mouse to an icon representing the Birmingham plant. He then automatically v A module containing data and program 'inherits' the Birmingham benefit package. instructions A third principle behind OOP is polymorphism. vi Object-Oriented Programming - This means that different objects can receive the vii A rectangle with equal sides same instructions but deal with them in different ways. For instance, consider again the triangles example. If the user right clicks the mouse on 2 Complete the following text using words 'Right triangle', a voice clip might explain the from the reading text: properties of right triangles. However, if the mouse is right clicked on 'Equilateral triangle' Encapsulation, and polymorphism are the voice instead explains properties of key features of programming. equilateral triangles. Encapsulation allows data and program The combination of encapsulation, inheritance instructions to be bundled together in and polymorphism leads to code reusability. called objects. Inheritance means that specific 'Reusable code' means that new programs can of a class of objects the easily be copied and pasted together from old programs. All one has to do is access a library of properties of the class of objects. Polymorphism objects and stitch them into a working whole. means that instructions are treated differently by This eliminates the need to write code from different The combination of these scratch and then debug it. Code reusability features of OOP means that program makes both program development and program code is reusable. This speeds up and maintenance faster. of programs. [Adapted from 'Understanding Computers Today and Tomorrow', 1998 edition, Charles S. Parker, The Dryden Press]
  40. UNIT 22 People in Computing STARTER What do the following people in computing do? Compare answers with your partner. 1 Webmaster 2 Help-desk troubleshooter 3 Applications programmer 4 Security specialist 5 Systems programmer READING Work in groups of three: A, B and C. Read your text and complete this table. You may not find information for each section of your table. B 1 job title 2 nature of work 3 formal qualifications 4 personal qualities 5 technical skills 6 how to get started 7 how to make progress How to become a programming expert The primary requirements for being a good So what specific skills are employers looking for? programmer are nothing more than a good The Windows market is booming and there's a memory, an attention to detail, a logical mind and demand for good C, C++, Delphi, Java and Visual the ability to work through a problem in a Basic developers. Avoid older languages such as methodical manner breaking tasks down into FORTRAN and COBOL unless you want to work smaller, more manageable pieces. as a contract programmer. However, it's not enough just to turn up for a job For someone starting out, my best advice would interview with a logical mind as your sole be to subscribe to the programming magazines qualification. An employer will want to see some such as Microsoft Systems Journal. Get one or two sort of formal qualification and a proven track of the low-cost 'student' editions of C++, Visual record. But if you can show someone an Basic and Delphi. Get a decent book on Windows impressive piece of software with your name on it, programming. If you decide programming is really it will count for a lot more than a string of for you, spend more money on a training course. academic qualifications.
  41. How to become a Computer Consultant The first key point to realise is that you can't will hopefully get you into a job where you can know everything. However you mustn't become learn something useful. Exams like Microsoft an expert in too narrow a field. The second key Certified Systems Engineer are well worth doing. point is that you must be interested in your The same goes for NetWare Certification. subject. The third key point is to differentiate However, this won't guarantee an understanding between contract work and consultancy. Good of the product, its positioning in the market, how contractors move from job to job every few it relates to other products and so on. That's months. A consultant is different. A consultant where the all-important experience comes in. often works on very small timescales - a few days Here's the road map. After leaving university you here, a week there, but often for a core collection get a technical role in a company and spend your of companies that keep coming back again and evenings and weekends learning the tools of your again. trade - and getting your current employer to pay There's a lot of work out there for people who for your exams. You don't stay in one company know Visual Basic, C++, and so on. And there are for more than two years. After a couple of hops lots of people who know it too, so you have to be like that, you may be in a good position to move better than them. Qualifications are important. into a junior consultancy position in one of the Microsoft has a raft of exams you can take, as larger consultancy companies. By the age of 30, does Novell, and in my experience these are very you've run big projects, rolled out major useful pieces of paper. University degrees are solutions and are well known. Maybe then it's useless. They merely prove you can think, and time to make the leap and run your own life. How to become an IT Manager IT managers manage projects, technology and experience in the industry. Most are between 30 people. Any large organisation will have at least and 45. Since IT managers have to take one IT manager responsible for ensuring that responsibility for budgets and for staff, employers everyone who actually needs a PC has one and look for both of these factors in any potential that it works properly. This means taking recruit. responsibility for the maintenance of servers and Nearly all IT managers have at least a first degree if the installation of new software, and for staffing a not a second one as well. Interestingly, many of help-desk and a support group. them don't have degrees in computing science. In Medium to large companies are also likely to have any case, the best qualification for becoming a an IT systems manager. They are responsible for manager is experience. If your personality is such developing and implementing computer software that you're unlikely to be asked to take that supports the operations of the business. responsibility for a small team or a project, then They're responsible for multiple development you can forget being an IT manager. You need to projects and oversee the implementation and be bright, communicative and be able to earn the support of the systems. Companies will have two trust of your teams. Most of this can't be taught, or three major systems that are probably bought so if you don't have these skills then divert your off the shelf and then tailored by an in-house career elsewhere. development team. Apart from basic hardware and software expertise, an IT manager will typically have over five years'
  42. 156 UNIT 22 People in Computing Now share information orally about your text with others in your group to complete the table for each of the occupations described. For which of the careers described are these statements true? More than one career may match each statement. 1 You may work for only a few days or a week for a company. 2 It's a good idea to buy books on languages such as C++. 3 You are responsible for developing and implementing the software a company needs to run its operations. 4 You need to be able to break down a problem into a number of smaller tasks. 5 It's worth paying for a training course if you get serious about this career. 6 Microsoft Certified Systems Engineer is a useful qualification for your career. 7 Your objective is to become self-employed. 8 It's important you have the right personality to lead a team. LANGUAGE WORK Requirements: need to, have to, must, be + essential, critical Note how we describe requirements for We can also treat need as a modal verb and particular jobs: use the negative form needn't: 1 You need to be able to empathise with the 7 You needn't have a degree in computing person at the other end of the phone. science. 2 IT managers have to take responsibility for budgets. Have to is an ordinary verb. Its negative form 3 You must be interested in your subject. is made in the usual way: 4 You must have worked for at least two 8 You don't have to be an expert in years in systems analysis. everything. 5 Experience with mainframes is essen tia I/critical. Mustn't has a quite different meaning. It means it is important not to do something. It We can describe things which are not is used for warnings, rules and strong advice. requirements like this: For example: 6 You don't need to have a degree in 9 You mustn't make unauthorised copies of computing science. software.
  43. UNIT 22 People in Computing 157 Fill in the blanks with the appropriate form of the verbs, need to, have to and must, to make sensible statements. More than one answer is possible in some examples. 1 Technical qualifications to be renewed at intervals to ensure they do not go out of date. 2 You become an expert in too narrow a field. 3 You to have good communication skills to become an IT Manager. 4 You be an expert in hardware to become a programmer. 5 You have worked with IBM mainframes for at least two years. 6 You be able to show leadership. 7 You have a degree but it be in computing science. 8 You 9 You 10 These days you Study these requirements for different jobs in computing advertised on the Internet. Then describe the requirements using the methods studied in this unit. 1 Systems Manager/Programmer I 2 Support Analyst: IBM 3 Programmer Mainframe MVS technical specialist 3 yrs exp. SAP Basic Technical min. 2 yrs work in systems IBM MVS support technician Environment programming 1 yr exp. of VTAM, NCP, SSP, team player with strong plus exp. of Netview/automation NPM, IBM 3745-900 hardware analytical and problem-solving design & support authorised to work in the EU skills ability to communicate issues and solutions and manage time effectively 4 Webmaster 5 Cisco Technician strong Unix experience CCNA qualified knowledge of NT and Netware able to use HTML, DHTML and excellent skills in the experience of ERP systems JavaScript surrounding technologies implementation knowledge of Shell Scripts min. 2 yrs work in support very strong managerial skills
  44. 158 UNIT 22 People in Computing PROBLEM-SOLVING Work in pairs. Study these job requirements. Then try to match the requirements to the list of jobs which follows. at least 5 years (2 at senior able to manage, lead and proven track record in the level) in: Unix, SYBASE or develop a team delivery of e-solutions in ORACLE, NT or Windows 2000, knowledge of C, C++, Delphi banking environment Terminal Server, TCP/IP, experience of object-oriented knowledge of Unix, NT and Internet. design within a commercial Oracle strong project management (2 environment willingness to travel years) ability to deliver software internationally willingness to travel abroad projects against agreed schedules and within agreed estimates minimum 4 years lifecycle minimum of 18 months experience of NT, Exchange, development experience commercial experience of Web SQL Server, Monitoring demonstrable skills using VB, development Software, Verta, TCP/IP SQL, RDBMS knowledge of HTML, Java, ASP solid grasp of networking able to develop core s/w full portfolio of URLs as 2 to 5 years experience in a excellent communication skills examples network environment a Visual Basic Developer b IT Engineer (Network & Database) c Web Developer d Network Support e E-commerce Consultant f Team Leader SPEAKING Work in pairs, A and B. Choose one of the computing careers from the list provided. Your partner must find out what your job is by asking only Yes/No questions. Your partner cannot ask 'Are you a programmer, etc?' Student A Your careers are on page 189. Student B Your careers are on page 195.
  45. UNIT 22 People in Computing 159 WRITING Study the c.v. of Paul who was interviewed in Unit 5. Then write your own c.v. in the same way. For the purpose of this task, you can invent experience and assume you have passed all your examinations! Paul W Cair Personal details 30/5/79 7 Linden Crescent, Stonebridge EH21 3TZ p.w.cair@btinternet.com Education Standard grades in Maths, English, Spanish, Computer Studies, Geography, Science, James High School HNC in Computing Maxwell College HMD in Computing Support Maxwell College Other qualifications Jan 2000 CTEC Work experience IT support consultant Novasystems Novasystems is an IT company that provides a complete range of computing services for its corporate clients. My experience includes: • advising clients on IT issues and strategies • 1st line customer telephone support • database design • configuration and installation of hardware and software to clients' specifications • network administration and implementation • PC assembly I have knowledge of these areas: • Windows 2000 Server/Professional • Office 97, 2000 • Sage Line 50 & 100 • Windows 95/98 • TCP/IP Networking • Windows NT4 Server/Workstation • Exchange Server 5.5 • Veritas Backup Exec for NT Hobbies and interests volleyball Referees Dr L. Thin, IT Department, Maxwell College Ms Y. Leith, Personnel Officer, Novasystems
  46. 160 UNIT 22 People in Computing Find the answers to these questions in the following text. Becoming What advice is given for someone who is stuck in a computing support job? What questions should you ask yourself if Certified you are thinking of getting extra training? What computer program is mentioned in the Suppose you're a support engineer. You're stuck text? in a job you don't like and you want to make a Name two ways of studying that are change. One way of making that change is to mentioned in the text. improve your marketability to potential employers What two factors will be affected by your by upgrading your skill-set. If you're going to train level of experience? yourself up however, whose training should you Why is it important to become used to undertake? If you need certificates, whose answering exam questions? certificates should they be? Even if you get those What factors help you decide whether the certificates, how certain can you be that your course will be suitable or cost effective? salary will rise as a result? One solution is the range of certifications on offer from Microsoft. What happens if you don't upgrade your certification? Microsoft offers a large array of certification programmes aimed at anyone from the user of a single program such as Microsoft Word, to someone who wants to become a certified support engineer. There are a myriad of certificates to study for too. If you're the proud holder of any of those qualifications, then you're entitled to call yourself a Microsoft Certified Professional (MCP). Once you've decided which track you want to take, you should consider just how qualified you already are in terms of experience and knowledge. Will you need to go and take some courses with a training company, or are you the type who can make good use of self-study materials? How much time do you genuinely have to devote towards this? Will your employer pay for your course? Will it grant you leave to go and do the course - assuming you can find one - on either a full-time or part-time basis? The key question here is experience. This will not only influence the amount of work you'll have to do to get up to speed for the exams, it could also mean the difference between passing or failing the exam. While you're busy learning all you need to know for your certification, the practice exams are an absolute godsend. They show you the type of questions you'll encounter, and they familiarise
  47. UNIT 22 People in Computing 161 you with the structure of the exam. This is essential if you want to pass: the exams have time Re-read the text to find the answers to limits, and you need to get used to answering the B these questions. requisite number of questions within the allotted 1 Which qualification would be most useful if time. It's as simple as that. you wanted to do each of the following: If you decide a training course will help you out, a be an operating system expert don't let the title of a course alone convince you that it will be suitable or cost effective. Find out b troubleshoot systems exactly what the course offers and whether there c teach computing are pre-requisites for attendants. You should also d design business solutions find out what the training company is prepared to do if attendants don't have the minimum 2 Mark the following statements as True or knowledge necessary to be on the course. False: As exams are replaced by 'updated' ones, you a Microsoft offers a large range of certification need to upgrade your certification to stay current. programmes to study. Ultimately it's your responsibility to make sure you b You must get an advanced certificate before stay up to date. If you don't, you lose your you can call yourself a Microsoft Certified certification until you take an update. Professional. As a support engineer, you get the satisfaction of c All Microsoft training courses involve a knowing that you passed a tough test, and the period of full-time study. happy knowledge that your network manager is d Practice exams allow you to become familiar sweating a bit over the fact that you could be with the structure of the exams. head-hunted at any time. e You can decide on the suitability of a course by its title. f It is your responsibility to make sure that * your certification is kept up to date. g Gaining a certificate is likely to make you MCSEs design, install, support and troubleshoot more attractive to other employers. information systems. MCSEs are network gurus, support technicians and operating system experts. • MCSDs use development tools and platforms to create business solutions. • MCPSes know all about at least one Microsoft operating system. Some also specialise in other Microsoft products, development tools or desktop applications. * MCTs teach others about Microsoft products using the Microsoft Official Curriculum at Microsoft Authorised Technical Education Centres. [Adapted from 'Becoming Certified' by David Moss, Network Pro Section of PC Pro Magazine, November 1997]
  48. UNIT 23 Recent Developments in IT STARTER Study these predictions of developments in Information Technology from 1997. Which, if any, have come true? How likely are the others to come true? Give reasons for your decisions and compare answers with your partner. Electronic newspaper Hydraulic chair for VR games Visual computer personalities on screens health monitor 2005 Robotic pets Artificial brain implants Robotic devices within blood vessels Intranets dominate ove 2010 Internet Multiple channels of >100 Gigabits per second 2005 on single fibre Terabits per second on Fire fighting robots that optical fibres over distance can find and rescue people READING Study the texts on recent developments in one area of Information Technology, A, B or C, as your teacher directs and make brief notes on the main points in each of the two texts. A Domestic appliances B Avatars C Robotics
  49. Licence to chill Barcodes in the packaging of groceries will soon many households, life revolves around the kitchen. be replaced with radio-frequency tags that can be This is the assumption Electrolux made in read at a distance and with greater reliability. As designing the Screenfridge. The same screen is a well as indicating what the product is, the data in messaging centre. Since the fridge is equipped the tags will include additional information such with a microphone, speaker and video-camera, as the 'best before' date and even nutritional data. you're not limited to textual information. The Now, imagine that a fridge could read these tags fridge is connected to the Internet, so it can be and keep track of the items placed there. used to send and receive email or you could surf the Web to find a new recipe. If an item is about to exceed its 'use by' date, the fridge tells you, and you can either use it or Many people have a TV in the kitchen, but if throw it out. Fancy something different for you already have a screen on the fridge, why dinner? No problem, ask the fridge to suggest clutter up the work surface with a TV? Call the some menus based on the ingredients it knows Screenfridge's TV mode and watch your favourite you have in stock. Or tell the fridge the menu you programme on the fridge. The Screenfridge can be require and it will provide you with a interfaced to a surveillance camera to check out shopping list of the items you don't have or order visitors or to keep an eye on the children. the items via email. This is the Screenfridge from Finally, the Screenfridge can perform some of the Electrolux. household management tasks normally associated with a PC. For example, it has a diary, address pad But why 'Screenfridge'? On the door is a and a notepad. touch-sensitive panel or screen that provides a means of communicating with the users. For Talking to the washing A washing machine that can communicate with will be joined by Leon@rdo, a touch-screen the Internet using its own built-in mobile phone kitchen computer. All the machines will has been launched by Ariston. communicate through the house's ring main, and The margherita2000.com washing machine will to the Web through the washing machine's mobile be able to send breakdown reports for repair and phone. download new washing cycles from its own Mr Caio believes he can sell 30 to 50,000 website. And the householder will be able to washing machines each year in Europe. But he control the washing cycle remotely using a mobile must leap some big hurdles before the system can phone or by logging on to the machine's own become widely accepted. WRAP is a proprietary website. Merloni standard, and people are unlikely to buy But the importance of the machine is that it is if locked in to Ariston for other networked the first of a line-up of Web-connected domestic appliances. Caio claims the standard is open to appliances that will be able to talk to each other other manufacturers to adopt but so far none have using a new open communication system called signed up, whereas the huge Japanese WRAP - Web-Ready Appliances Protocol. manufacturers are adopting rival systems. The Ariston will be launching a dishwasher, fridge main obstacle is the cost - the and oven using WRAP early next year according to margherita2000.com will .cost much more than a Francesco Caio, head of Ariston's parent traditional washing machine. company Merloni Elettrodomestici. Eventually it
  50. 164 UNIT 23 Recent Developments in IT Dawn of the cyberbabes Stratumsoft are developing the first electronic from data banks. virtual assistant, or EVA. If EVAs live up to the Each EVA can be programmed with developers' claims, they could provide the illusion information such as a product catalogue, answers of personal service without the cost. Call centres, to frequently asked questions or an online online advertisers and Internet service providers encyclopaedia. It is also equipped with a search are among the initial targets. Eighty per cent of engine to interpret customer requests made in call centre requests could, Stratumsoft argues, be colloquial language. Queries are typed in and dealt with by an EVA. E-commerce is another answered via on-screen text boxes. application. 'The best experience you can have as a If the EVA does not have an answer, it will shopper is personal contact, and EVA is designed interrogate the questioner, record the response, to give that', says Stratumsoft's director of and add the answer to its database for future marketing. enquiries. EVAs are not fully animated to imitate The technology behind EVA combines two human features but they can be programmed to global trends in website design. One, developed gesture and imitate different moods. An EVA is out of the computer animation and gaming run via a Java applet - a small, self-contained industry, is the ability to give Web images the program coded to download on to any type of impression of three dimensions. The other is the personal computer rather than being transmitted use of dynamic database skills and artificial over the Internet. intelligence-style searching to retrieve information Ananova Ananova is the world's first digital newsreader. She graphics. This ensures that the virtual newscaster was created to front an Internet 24 hours a day can be on top of the news as it breaks, with very news service by Digital Animations Group, a little delay at all. People using the service can also Scottish 3D digital entertainment company and tailor their own news bulletins by using search PA New Media. words to hear the latest information on their Mark Hird, Director of PA New Media said, chosen subjects. 'We have given her a full range of human Mr Hird believes the invention will characteristics after researching the personality dramatically change the role of the traditional most people want to read news and other newscaster, 'In 20 years time we could be seeing information. Ananova has been programmed to that type of job being replaced by computer- deliver breaking news 24 hours a day via the generated images.' But not everyone agrees. Internet, and later on mobile phones, televisions Professor Bill Scott said that people prefer people and other digital devices.' to teach them things and in a world where The Ananova character fronts a computer information was increasingly important, an system which is constantly updated with news, established face was important in terms of public sport, share prices, weather and other information. trust. 'You don't get that confidence with This is converted into speech while another computer characters.' program simultaneously creates real-time animated
  51. UNIT 23 Recent Developments in IT 165 The rise of the robots Japan produced the first commercially available between animal and robot but between man and robotic pet, called Aibo, a small electronic dog that machine. Quadriplegics and paraplegics have been several owners on Aibonet.com describe as part of testing computer connections for some time to the family. Aibo is not alone. Dr Thomas Consi of bypass injured nerves, but Professor Kevin MIT has produced the 'robolobster' which is Warwick, head of the Department of Cybernetics capable of imitating lobsters' abilities to sense at the University of Reading, is currently chemicals in the water surrounding them. conducting experiments which could lead to more Researchers at Edinburgh's Mobile Robot Group of us becoming cyborgs. have made the world's first cyber-cricket. Professor Warwick has previously had a chip These machines are important because they fitted into his arm which could activate sensors in demonstrate that simple processes can result in doors and computers as he approached. He will complex behaviours. The robots use 'neural nets', soon have another transponder surgically connected processors that have an input level implanted in his arm to record electrical signals associated with each processor. When an input controlling his movements, which can be played signal exceeds a certain value, the processor 'fires' a back so that he is then controlled by a signal to other processors as output. Because prerecorded self. He predicts that such a neural nets can recognise patterns in data, they technology could, one day, enable us to interact can be 'trained' with samples of data which are with machines in a completely different way. For then revised to improve the response. example, we could soon be driving cars without The most important crossover, however, is not steering wheels. Sporting robots Each year teams take part in an international will start as soon as there are sufficient two-legged football competition. The teams are organised into players. The organiser of the Robocup is confident five leagues and the prize is a cup. Not just any in the future of robotics, 'By mid-21st century, a cup, but the Robocup, for the players are all team of fully autonomous humanoid soccer robots. They don't play on turf but the objective is players will win a soccer game, complying with the the same, to hit a ball into a goal. The aim behind official rules of FIFA, against the winner of the the Robocup is to promote the development of most recent World Cup.' robots which can work together. Football is a Other sporting events for robots exist. For good test of co-operation for any team and the example, The British Association for the robots are no exception. Although robot Advancement of Science organises a two-a-side footballers are poor competition for a human event called Robot Volley Ball. The players' task is team, each year their performance gets better and simply to return a ball within 60 seconds of its each year the standards expected are raised so that being served. The objective again, is to promote competitors must constantly develop better the development of robots which can work co- hardware and software. operatively. The advantages of having robots The top league is the Sony legged robot which can tackle a range of tasks together rather division. They use modified versions of the well- than constructing single expensive robots designed known Sony robodog AIBO. A humanoid league for one task only are obvious.
  52. 166 UNIT 23 Recent Developments in IT Work in groups of three, A, B and C. Play these roles in rotation: Speaker, Reporter and Judge. The Speaker explains the main points of one text using only their notes. The Reporter listens carefully and reports back to the Speaker a summary of the main points. The Judge listens carefully to both Speaker and Reporter and points out any mistakes, main points omitted or additions the Reporter has made. Repeat this activity until you have played all three roles and all of your texts have been covered. List the predictions, if any, in the articles you have read. Have any of them already taken place since the article was written? How likely are the others to happen in the near future? Discuss your answers with others who have read the same texts. Text Predictions
  53. UNIT 23 Recent Developments in IT 167 LANGUAGE WORK Study these ways to describe ability: specific occasion.This table summarises their 1 Swarming robots can work together to uses: perform searches. Ability 2 Washing machines will be able to report any breakdowns for repair. present can be able to 3 Imagine being able to send music files to future will be able to your MP3 player without a wire present perfect X has/have been connection. able to 4 Professor Warwick had a chip fitted into his arm which could activate sensors in -ing form being able to doors and computers as he approached. past (specific action) X was/were able 5 Marconi was able to send a radio signal to from Britain to Newfoundland. past (general and with We use can and be able to to describe ability verbs of sensation) could X in the present but can is more common. We use could for general abilities in the past but For past negatives and questions both verbs was/were able to describe an ability on a are possible. For example: Early computers could not/were not able to operate at high speeds. Could they/were they able to store much data? Complete the blanks in this text using the correct form of can or be able to. In some cases there is more than one possible answer. Imagine open doors and switch on computers as you approach them. Professor Warwick because he had an electronic chip fitted into his arm for a month. He demonstrate to the press how computers would greet him with, 'Good morning, Professor Warwick' as he walked past. Next he wants to record the signals from his brain to his arm to see if he program a computer to operate his arm. In the long term, this may help people who use their limbs. His wife too will have a chip implanted. They hope feed messages into each other's brains. According to the Professor, one day we communicate directly with machines. If he is right, we drive a car from the passenger seat and we operate a computer without using a mouse or keyboard. However, there is also the alarming prospect that someone hack into your brain.
  54. 168 UNIT 23 Recent Developments in IT Use an appropriate certainty expression from the list studied in Unit 16 to complete these predictions from the Task 2 texts. More than one answer is possible in some cases. Barcodes soon be replaced with radio-frequency tags. People are to buy if locked in to Ariston for other networked appliances. If EVAs live up to the developers' claims, they provide the illusion of personal service without die cost. Mr Hird believes the invention will dramatically change the role of the traditional newscaster, 'In 20 years' time we be seeing that type of job being replaced by computer- generated images.' We soon be driving cars without steering wheels. Professor Warwick is currently conducting experiments which lead to more of us becoming cyborgs. By mid-21st century, a team of fully autonomous humanoid soccer players win a soccer game against the winner of the most recent World Cup. A virtual world populated by virtual humans become a very tangible reality. PROBLEM-SOLVING In groups, choose a domestic appliance and decide what functions an in-built computer would allow it to perform in addition to its basic function. Consider also how it could be marketed. Present your ideas to the rest of the class.
  55. UNIT 23 Recent Developments in IT 169 SPEAKING Search for the latest developments in the area of Information Technology you read about in Task 2. Make a summary of your findings to report to the rest of the class. In addition to journals, magazines and newspapers, you can try these websites: Domestic appliances www.electrolux.co.uk www.merloni.com www.margherita.com www.aristonchannel.com www.zanussi.co.uk www.sony.co.uk Avatars www.pulse3d.com www.kiwilogic.com www.softimage.com www.ananova.com www.biovirtual.com www.i-dtv.com www.bt.com/talkzone www.digimask.com www.channel5.co.uk Robotics www.aibo-europe.com www.honda.co.jp/english/technology/robot www.robotbooks.com/Mitsubishi-robots.htm WRITING Convert your notes for Task 8 into a written report. Your report should have these sections: 1 Area of IT-definition 2 Technology involved - hardware and software 3 Applications 4 Possible future developments
  56. 170 UNIT 23 Recent Developments in IT SPECIALIST READING Find the answers to these questions in the following text. B As portable computing devices get smarter and 1 What frustrating problem does Bluetooth more capable, connectivity frustrations increase. solve? This is where Bluetooth comes in. The brainchild 2 Who first developed Bluetooth? of Ericsson, IBM, Intel, Nokia and Toshiba, 3 In what ways is Bluetooth particularly suited to portable systems? Bluetooth is a microwave high-speed wireless link 4 What do Bluetooth devices share with system that's designed to work with portable microwave ovens? equipment. To that end, it's low power, very small 5 List some devices that are suitable for use and very low cost. It uses the same frequencies as with Bluetooth. existing radio LANs (and, incidentally, microwave 6 Why is Bluetooth suitable for use on ovens) to create a secure 1 Mbit/s link between aeroplanes? devices within 1 Om of each other. These devices 7 What factors provide security for Bluetooth can be laptops, PDAs, cellphones, wired communications? telephone access points, even wristwatch devices, 8 How is the output power level of the headphones, digital cameras and so on. With transmitter set? them, your notebook PC will be able to access 9 Why is there no collision detection in the your cellular phone — and thus the Internet — Bluetooth specification? without your having to take the phone out of your 10 Why are all devices on a piconet pocket. Files can be exchanged and synchronised and controlled by a master communications set up for voice and data device? between just about any device capable of handling 11 What are the consequences of Bluetooth the information. having the following characteristics? a It is good at avoiding conflicting signals Bluetooth operates in the unlicensed SM from other sources. (Industrial, Scientific and Medical) band at b The transmitter output level is kept as 2.45GHz, which is globally available for products. low as possible. There's 89MHz of bandwidth allocated here, and c It uses power-saving modes when since Bluetooth is very low power, it actually devices aren't transmitting. radiates less than most national and international standards allow non-transmittinpo devices to leak as part of their normal operation. This is key, as it allows the technology to operate without restriction on aircraft. As befits their status as radio frequency experts, Ericsson and Nokia developed the RF side of Bluetooth. The link works in a similar way to the IEEE 802.11 wireless networking system, with a O J packet-switching protocol based on fast-frequency hopping direct sequence spread spectrum. In other words, it constantly switches channel to avoid interference. It changes frequency 1,600 times a second through 79 frequency bands. It's expected that this will be so good at avoiding conflicting signals from other sources that the transmission power can be kept very low.