Sei sulla pagina 1di 420

Doretta Ardu • Maria Grazia Bellino • Giuseppina Di Giorgio

BIT BY BIT
English for Information
and Communications Technology

Teacher’s Book

Bit By Bit.indb 1 19/03/18 08:30


Bit by Bit • Teacher’s Book
Realizzazione editoriale:
– Progetto e consulenza: Manuela Barbero
– Revisione linguistica: Annabel Pope
– Direzione grafica: Manuela Piacenti
– Progetto e impaginazione: Studio Pagina32 - Napoli
– Revisione testi: Lunella Luzi
– Registrazione audio: Ivano Atzori
Contributi: la sezione “Didattica inclusiva e BES” è opera di Nadia Sanità.

In linea con le disposizioni di legge e le indicazioni ministeriali, si attesta che l’opera è realizzata in “forma
MISTA”, cartacea e digitale. L’Editore mette a disposizione gratuitamente sul proprio sito diverse risorse
didattiche online: materiali extra per attività di approfondimento e di esercitazione in parte ad accesso
libero e in parte riservati al docente.

L’opera è altresì disponibile in edizione DIGITALE per gli studenti diversamente abili e i loro docenti. L’Editore mette
a disposizione degli studenti non vedenti, ipovedenti, disabili motori o con disturbi specifici di apprendimento i
file pdf in cui sono memorizzate le pagine di questo libro. Il formato del file permette l’ingrandimento dei caratteri
del testo e la lettura mediante software screen reader.

Copyright © Edisco Editrice, Torino


10128 Torino – Via Pastrengo, 28
Tel. 011.547880
e-mail: info@edisco.it • sito web: www.edisco.it

Tutti i diritti riservati. I diritti di elaborazione in qualsiasi forma o opera, di memorizzazione anche digitale su
supporti di qualsiasi tipo (inclusi magnetici e ottici), di riproduzione e di adattamento totale o parziale con
qualsiasi mezzo (compresi i microfilm e le copie fotostatiche), i diritti di noleggio, di prestito e di traduzione sono
riservati per tutti i Paesi. L’acquisto della presente copia dell’opera non implica il trasferimento dei suddetti diritti
né li esaurisce.

Le immagini del testo (disegni e fotografie) che rappresentano nomi, marchi o prodotti commerciali hanno un
valore puramente didattico di esemplificazione. L’autore e l’editore non intendono cioè sostenere che i prodotti
fotografati siano migliori o peggiori di altri, né indirettamente consigliarne o sconsigliarne l’acquisto. Peraltro non
esiste alcun rapporto di nessun genere con i relativi produttori: Nomi e marchi sono generalmente depositati o
registrati dalle rispettive case produttrici.

L’Editore è a disposizione degli aventi diritto con i quali non gli è stato possibile comunicare, nonché per eventuali
omissioni e inesattezze nella citazione delle fonti dei brani, illustrazioni e fotografie riprodotti nel presente volume.

Stampato per conto della Casa editrice presso


La Grafica, Boves (CN), Italia

Printed in Italy

Ristampe
5 4 3 2 1 0
INDICE

INTRODUZIONE .................................................... 5 • Altri tipi di Bisogni Educativi


Speciali....................................................................... 56
OBIETTIVI DEL TESTO .................................. 5
• Suggerimenti e modelli per la
STRUTTURA DEL TESTO ............................ 6 valutazione ........................................................... 59

MATERIALE DEL TESTO PROGRAMMAZIONE DIDATTICA ..... 85


• Audio .......................................................................... 7
MAPS and DIAGRAMS ................................... 91
• Digitale ...................................................................... 7
REAL-LIFE TASKS ............................................... 115
• Esame di stato ................................................... 7
• Test ................................................................................ 7 UNIT TESTS
• BES ................................................................................ 8 Unit 1 ................................................................................... 125
 Unit 2 ................................................................................... 131
• Certificazioni ....................................................... 8
Unit 3 ................................................................................... 137
• Recupero e potenziamento ................... 10
 Unit 4 ................................................................................... 143
• Scuola e Lavoro ................................................ 10
 Unit 5 ................................................................................... 149
GLI ISTITUTI TECNICI  Unit 6 ................................................................................... 155

• L’identità degli Istituti Tecnici ............ 11  Unit 7 ................................................................................... 164


 Unit 8 ................................................................................... 170
• La scuola e il mondo del lavoro ...... 12
 Unit 9 ................................................................................... 176
• Alternanza scuola-lavoro ........................ 13
Unit 10 ................................................................................ 182
LE ABILITÀ LINGUISTICHE ...................... 14 Unit 11 ................................................................................. 188
 Unit 12 ................................................................................ 197
CLIL  Unit 13 ................................................................................ 204
• Il profilo del docente CLIL .................... 17  Unit 14 ................................................................................ 210
• Iniziative dell’Unione Europea  Unit 15 ................................................................................ 216
per supportare l’apprendimento  Unit 16 ................................................................................ 223
attraverso le lingue ....................................... 17  Unit 17 ................................................................................ 229
• Il percorso normativo in Italia ........... 17 KEYS • UNIT TESTS ................................................... 235
PROGETTARE PER COMPETENZE ... 18 MODULE TESTS
 Module 1 ............................................................................ 267
TERMINOLOGIA UTILE ................................ 19
 Module 2 ............................................................................ 275
DIDATTICA INCLUSIVA E BES .............. 25  Module 3 ............................................................................ 283
• Normativa e inquadramento  Module 4 ............................................................................ 289
scolastico ................................................................. 27  Module 5 ............................................................................ 295

• Dislessia, didattica e inglese ............... 35  Module 6 ............................................................................ 303

• Didattica inclusiva e resilienza ......... 49 KEYS • MODULE TESTS ......................................... 309

Bit By Bit.indb 3 19/03/18 08:30



STUDENT’S BOOK ANSWER KEYS Unit 11 ......................................................................... 370
AND AUDIOSCRIPTS ....................................... 327 Unit 12 ........................................................................ 373
• Module 1 ................................................................. 329 Vocabulary ....................................................................... 376
Unit 1 ........................................................................... 329 Grammar ........................................................................... 377
Unit 2 ........................................................................... 331 Listening ............................................................................ 377
Unit 3 ........................................................................... 334 Speaking ............................................................................ 378
Vocabulary ....................................................................... 337 Writing ................................................................................ 378
Grammar ........................................................................... 338 FILM .................................................................................... 379
Listening ............................................................................ 338
• Module 5....................................................................... 381
Speaking ............................................................................ 339
Unit 13 ........................................................................ 381
Writing ................................................................................ 340
Unit 14 ........................................................................ 383
FILM .................................................................................... 340
Unit 15 ........................................................................ 387
• Module 2 ..................................................................... 341 Vocabulary......................................................................... 391
Unit 4 ........................................................................... 341 Grammar............................................................................. 391
Unit 5 ........................................................................... 343 Listening.............................................................................. 391
Unit 5 ........................................................................... 346 Speaking.............................................................................. 392
Vocabulary......................................................................... 349 Writing.................................................................................. 393
Grammar............................................................................. 349 FILM .................................................................................... 393
Listening.............................................................................. 350
Speaking.............................................................................. 350 • Module 6 ..................................................................... 394
Writing.................................................................................. 350 Unit 16 ........................................................................ 394
FILM .................................................................................... 351 Unit 17 ........................................................................ 398
Vocabulary ....................................................................... 400
• Module 3 ..................................................................... 352
Grammar ........................................................................... 400
Unit 7 ........................................................................... 352
Listening ............................................................................ 400
Unit 8 ........................................................................... 355
Speaking ............................................................................ 401
Unit 9 ........................................................................... 359
Writing ................................................................................ 401
Vocabulary......................................................................... 363
FILM .................................................................................... 401
Grammar............................................................................. 364
Listening.............................................................................. 364 KEYS • APPENDICES ................................................. 403
Speaking.............................................................................. 364 ESAME DI STATO
Writing.................................................................................. 365 • Proposte di domande
FILM .................................................................................... 365 per la prova orale ........................................... 408
• Module 4 ..................................................................... 366 • Proposte di griglie di valutazione
Unit 10 ........................................................................ 366 di prove orali ....................................................... 414
INTRODUZIONE
Bit by Bit è un corso d’inglese rivolto in particolare agli studenti degli Istituti
Tecnici del Settore Tecnologico, indirizzo Informatica e Telecomunicazioni,
articolazione Informatica e articolazione Telecomunicazioni, e del Settore
Economico, indirizzo Amministrazione Finanza e Marketing, articolazione
Sistemi informativi aziendali, e più in generale a tutti coloro che operano
nel settore dell’informatica e delle telecomunicazioni, in quanto finalizzato
all’acquisizione di competenze specifiche del settore.
L’acquisizione progressiva e flessibile di tali abilità contribuisce
significativamente alla costruzione delle competenze generali richiamate
nelle indicazioni nazionali. A questo proposito deve anche essere sottolineato
il fatto che le stesse competenze costituiscono elemento selezionante per la
partecipazione a progetti UE e risultano anche utili per la preparazione dell’esame
EUCIP Core e per l’assegnazione di work placements all’interno delle attività di
Alternanza Scuola-Lavoro.

OBIETTIVI DEL TESTO 


La finalità educativa generale del testo è quella di fornire una sintesi che integri
al suo interno competenze di carattere comunicativo e pratico-operativo con
elementi culturali. Bit by Bit pone l’accento sull’apprendimento autonomo
fornendo materiali di facile consultazione e utilizzo finalizzati all’acquisizione
non solo di contenuti, ma anche di strategie di apprendimento. Nello specifico,
gli obiettivi che ci si propone di raggiungere sono i seguenti:
• formare un tecnico che possa lavorare nel settore dell’informatica e delle
telecomunicazioni o nella gestione di sistemi informativi aziendali;
• offrire un percorso sistematico, ma allo stesso tempo flessibile e
personalizzabile, in grado di soddisfare i diversi bisogni di docenti e studenti
del settore;
• sviluppare la consapevolezza di un sapere unico: le competenze culturali
trasversali, soprattutto nel settore dell’informatica e delle telecomunicazioni,
sono indispensabili per operare nel settore;
• favorire l’acquisizione di specifiche abilità orali e scritte di comprensione e
produzione;
• proporre un lessico specifico ampio e moderno che tenga anche conto della lingua
del web;
• favorire l’autonomia linguistica e operativa;
• sviluppare strategie per il lavoro in team e stimolare la soluzione di problemi;
• offrire spunti per moduli e percorsi trasversali;
• proporre materiali fruibili anche da allievi BES.

Bit By Bit.indb 5 19/03/18 08:30


STRUTTURA DEL TESTO
Bit by Bit è diviso in sei Moduli, ognuno dei quali è ripartito in quattro sezioni:
1. FLOWCHARTING (Contents Section) – Divisa in Unità, contiene testi
e attività che riguardano in contenuti specifici della specializzazione già
affrontati in L1. Ogni unità è suddivisa in brevi Capitoli su due pagine –
teoria ed esercizi – per favorire non solo uno studio più parcellizzato, ma
anche la scelta antologica da parte dell’insegnante. I testi vengono affrontati
in modo graduale, attraverso esercizi di warm-up, esplorazione del lessico
specifico, comprensione scritta e orale, globale e specifica, reimpiego
dei termici tecnici e produzione scritta e orale. Brevi box permettono
di ampliare le conoscenze sugli argomenti:
• approfondimenti generali • analisi di dati e fatti
• curiosità • approfondimenti culturali
• finestre umoristiche.

Un ricco apparato iconografico correda i brani di lettura, per ognuno dei quali
è previsto un esauriente glossario.
2. DEBUGGING – Si occupa dei contenuti della disciplina ponendo particolare
attenzione all’arricchimento lessicale e strutturale.
3. UPDATING – Offre testi e attività di consolidamento dei contenuti appresi
per sviluppare le abilità di Listening, Speaking e Writing.
4. UPGRADING – Propone una mappa concettuale (Mapping your Mind),
strumento utile per rappresentare la rete di relazioni tra i vari argomenti del
Modulo a partire da quello di partenza, e clip di opere cinematografiche
che offrono spunti di riflessione e svago su aspetti contenutistici del Modulo.

Il testo contiene inoltre tre Appendici:


1. BIZ BITS – Offre testi e attività relativi al mondo del commercio e
dell’economia, con particolare riferimento al settore dell’informatica e delle
telecomunicazioni.
2. CAREERS – Descrive le varie fasi della ricerca di un lavoro, come ad
esempio il Curriculum Vitae e il colloquio di lavoro, e analizza diversi profili
lavorativi nel settore del ICT.
3. HOW TO – Contiene schede pratiche su come scegliere un computer o fare
l’upgrading e come risolvere i problemi più frequenti.

Bit By Bit.indb 6 19/03/18 08:30


MATERIALE DEL TESTO
Audio
Per le tracce audio viene proposto un elevato numero di attività di ascolto
in tutte le Unità; il contesto è prevalentemente collegato agli argomenti
trattati nella sezione. La lunghezza e la complessità sono diversificate e gli
audioscripts sono tutti riportati nel Teacher’s Book. Dal punto di vista lessicale
gli ascolti riprendono i vocaboli chiave dell’unità, inseriti in contesti reali e
di vita professionale con l’utilizzo di registri linguistici diversi, da informale e
familiare a più formale, e accenti di diversa provenienza geografica.

Digitale
Disponibili sul sito www.edisco.it:
– file audio formato MP3 con la registrazione delle attività di ascolto
– numerosi materiali per attività di approfondimento e di esercitazione.
Un’ampia sezione di risorse online è collegata al testo. I vari materiali
proposti possono essere utilizzati in modo flessibile: possono offrire spunti per
altre attività, anche di gruppo, e offrono la possibilità di impostare percorsi
personalizzati e in armonia con il livello di competenza raggiunto da ogni
singolo allievo.
Le sezioni della parte online del testo sono organizzate in:
– 
attività extra per recupero e approfondimento
– 
agganci letterari
– 
esercitazioni Eucip Core
– 
esercizi di Reading Comprehension tipo FCE e IELTS.

Esame di Stato
La struttura dell’Esame di Stato è in corso di definizione da parte del MIUR.
Si prevede che a partire dall’anno scolastico 2018/19 venga abolita la terza
prova, che ha sempre previsto una sezione relativa alla Lingua Straniera. In
ogni caso viene fornita una lista di quesiti con alcuni modelli di risposte e
indicazioni su come affrontare il colloquio orale, unitamente ad esempi di
griglie di valutazione.

Test
Il Teacher’s Book contiene test formativi (due per ogni singola unità) e test
sommativi (due per ogni singolo Modulo). Ciascun test propone diverse
tipologie di esercizi ed è molto ricco di attività che esercitano le quattro abilità
di base; può essere dunque adattato alle diverse esigenze dei docenti a seconda
degli studenti con cui si trovano a lavorare.
I test sommativi sono disponibili in una versione adattata BES (e quindi con
caratteristiche di layout secondo le linee guida per studenti con DSA). Ogni test

Bit By Bit.indb 7 19/03/18 08:30


è anche disponibile in formato editabile per poter garantire al docente la scelta
della lunghezza della verifica, l’eventuale ulteriore riduzione del numero degli
item/esercizi e la scelta della tipologia di esercizi da proporre.
Le chiavi di ogni test sono disponibili all’interno del Teacher’s Book.

BES
Bit by Bit comprende attività adatte o progettate anche per allievi con Bisogni
Educativi Speciali:
• la grafica del testo tende a tener conto delle difficoltà di lettura di alcuni
DSA e le pagine chiuse che caratterizzano il libro possono anch’esse
rappresentare una risorsa perché facilmente consultabili per lo studio e nei
momenti di verifica;
• il libro di testo in formato digitale può favorire il lavoro in classe e a casa;
• le mind maps ed il glossario possono rientrare nelle misure compensative
suggerite nella maggior parte dei casi per lo svolgimento delle prove in classe;
• le tipologie di attività, sia del testo che dei test, sono molto spesso adatte a
studenti con problematiche di dislessia o difficoltà di apprendimento: Bit by
Bit è molto ricco di esercizi a risposta chiusa, quali vero/falso, abbinamento,
scelta multipla e riconoscimento – attività generalmente suggerite per le
prove d’esame;
• i test per il docente sono forniti in formato editabile per facilitarne la
personalizzazione a seconda delle esigenze particolari di ciascun studente,
in conformità con le misure dispensative o compensative individuate.

Per ulteriori informazioni si può consultare la normativa di riferimento


composta dalla Legge n. 170/2010 e dai Decreti Attuativi n. 5669 del 12 luglio
2011 con le relative Linee Guida.

Certificazioni
In un mondo in continua evoluzione e sempre più dipendente dalle tecnologie
informatiche e dagli auditing esterni, diventa sempre più importante approfondire
le proprie conoscenze, trasformarle in competenze e soprattutto certificarle.
Di seguito, una breve lista delle certificazioni internazionali che si possono
proporre agli studenti dell’Istituto Tecnico Economico – indirizzo SIA e Istituto
Tecnico Industriale – indirizzo Informatica per consentire una specializzazione
spendibile e oggettiva.
• La Patente Europea del Computer (ECDL)  rappresenta a livello nazionale
e internazionale lo standard riconosciuto per la computer literacy. La famiglia
ECDL mette oggi a disposizione una biblioteca costituita da numerosi moduli:
una gamma di scelta che dà al candidato la possibilità di avviare un percorso
di acquisizione di competenze digitali organico e completo, tarato sui suoi
interessi e sul suo curriculum di studi e professionale. I moduli si articolano
nelle categorie Base, Standard, Advanced e Specialised. 

Bit By Bit.indb 8 19/03/18 08:30


• EUCIP Core è una certificazione rivolta a tutti i professionisti informatici
(e a chi intende diventarlo) che lavorano nell’ambito della funzione ICT di
organizzazioni di grandi dimensioni o presso fornitori di servizi e prodotti
informatici. Verifica il possesso di quello che è il “body of knowledge” che
dovrebbe essere comune a tutti i professionisti informatici, qualunque siano
le specializzazioni e le attività svolte. Il Sillabo è articolato in tre knowledge
area che coprono tutti gli ambiti fondamentali del ciclo di vita dei sistemi
ICT e precisamente:

– Area Plan
È connessa ai processi gestionali e alla definizione delle necessità
aziendali in ambito ICT inquadrate in una prospettiva strategica.
Elementi importanti all’interno di quest’area sono ad esempio le
nozioni di organizzazione aziendale, ritorno d’investimento, analisi dei
processi, finanziamenti, rischi, pianificazione, etc.

– Area Build
Comprende i processi di specifica, sviluppo e acquisizione di sistemi
ICT. Il nodo centrale dell’area è costituito dagli aspetti dello sviluppo
di sistemi informatici, implementazione e integrazione.

– Area Operate
Riguarda l’installazione, la supervisione e la manutenzione di sistemi
informatici. Include aspetti quali la gestione reti, la gestione di
aggiornamenti e ampliamenti, il supporto agli utenti, e così via.

• ePMQ (european Project Management Qualification)  è un programma di


formazione certificata che attesta le conoscenze alla base delle metodologie
di project planning e le capacità relative all’utilizzo di strumenti di project
management. Quindi, richiede al Candidato le conoscenze di base tecnico
metodologiche e inoltre l’utilizzo di un software di gestione progetti per
elaborare la programmazione di progetto e i successivi controlli, compresa
la pianificazione e gestione di tempi, costi, attività e risorse. La necessità
di competenze di project management ad ausilio delle attività di quadri,
responsabili o manager, per un supporto alla loro attività, è sempre più
richiesta.

• Cambridge IGCSE ICT è una qualifica internazionale rilasciata


dall’Università di Cambridge e riconosciuta dalle migliori università e
aziende in tutto il mondo. Combina aspetti pratici e teorici che riguardano
l’utilizzo dei software più diffusi per la risoluzione di problemi e la capacità
di analizzare, progettare, realizzare e testare sistemi informatici.

Bit By Bit.indb 9 19/03/18 08:30


Recupero e potenziamento
Il testo è strutturato in modo tale che sia possibile organizzare attività di
revisione da gestire in classe come recupero in itinere e/o autonomo; le sezioni
Debugging e Updating propongono infatti attività di ripresa delle strutture
grammaticali, del lessico e dei contenuti specifici. All’interno delle pagine
Upgrading gli studenti potranno ampliare la conoscenza dei contenuti di settore
attraverso approfondimenti culturali.

Scuola e Lavoro
All’interno del libro sono presenti numerose tipologie di attività orientate
all’ingresso nel mondo del lavoro, sia per l’argomento trattato sia per le
strategie utilizzate. Sono previste inoltre, all’interno del Teacher’s Book, sei
schede denominate Real-Life Tasks. Queste esercitazioni propongono attività sul
campo per la realizzazione di projects e sono intese a sviluppare quelle abilità
trasversali e di team working che saranno richieste una volta inseriti nel mondo
del lavoro.

10

Bit By Bit.indb 10 19/03/18 08:30


GLI ISTITUTI TECNICI
L’identità degli Istituti Tecnici
I nuovi ordinamenti del secondo ciclo del sistema educativo di istruzione e
formazione di cui al decreto legislativo n. 226/05 e che ebbero attuazione
dall’anno scolastico 2010/11, sono fondati sul principio dell’equivalenza
formativa di tutti i percorsi con il fine di valorizzare i diversi stili di
apprendimento degli studenti e dare una risposta articolata alle domande
del mondo del lavoro e delle professioni. La diversificazione dei percorsi
di istruzione e formazione ha proprio lo scopo di valorizzare le diverse
intelligenze e vocazioni dei giovani, anche per prevenire i fenomeni di
disaffezione allo studio e la dispersione scolastica, ferma restando l’esigenza
di garantire a ciascuno la possibilità di acquisire una solida ed unitaria cultura
generale per divenire cittadini consapevoli, attivi e responsabili.
Nel quadro sopra delineato, il rilancio dell’istruzione tecnica si fonda sulla
consapevolezza del ruolo decisivo della scuola e della cultura nella nostra
società non solo per lo sviluppo della persona, ma anche per il progresso
economico e sociale; richiede perciò il superamento di concezioni culturali
fondate su un rapporto sequenziale tra teoria/pratica e sul primato dei saperi
teorici.
Agli istituti tecnici è affidato il compito di far acquisire agli studenti non solo
le competenze necessarie al mondo del lavoro e delle professioni, ma anche
le capacità di comprensione e applicazione delle innovazioni che lo sviluppo
della scienza e della tecnica continuamente produce. Per diventare vere
“scuole dell’innovazione”, gli istituti tecnici sono chiamati ad operare scelte
orientate permanentemente al cambiamento e, allo stesso tempo, a favorire
attitudini all’autoapprendimento, al lavoro di gruppo e alla formazione
continua.
In questo quadro, orientato al raggiungimento delle competenze richieste
dal mondo del lavoro e delle professioni, le discipline mantengono la loro
specificità, ma è molto importante che i docenti scelgano metodologie
didattiche coerenti con l’impostazione culturale dell’istruzione tecnica
che siano capaci di realizzare il coinvolgimento e la motivazione
all’apprendimento degli studenti. Sono necessari, quindi, l’utilizzo di metodi
induttivi, di metodologie partecipative, una intensa e diffusa didattica
di laboratorio, da estendere anche alle discipline dell’area di istruzione
generale, con l’utilizzo, in particolare, delle tecnologie dell’informazione
e della comunicazione, di attività progettuali e di alternanza scuola-lavoro
per sviluppare il rapporto col territorio e le sue risorse formative in ambito
aziendale e sociale.

11

Bit By Bit.indb 11 19/03/18 08:30


La scuola e il mondo del lavoro
Soprattutto negli istituti tecnici, che offrono un’ampia possibilità, dopo il diploma,
di intraprendere subito un percorso professionale, è auspicabile che gli studenti
imparino il prima possibile ad elaborare le acquisizioni che la scuola propone loro
attraverso lo studio delle discipline, arricchendole e integrandole con esperienze
che li mettano in grado di confrontarsi con crescente autonomia con le richieste
dal mondo del lavoro e delle professioni, per mettere in relazione questi dati con
gli interessi e le aspirazioni personali. Nel rispetto dell’autonomia organizzativa
e didattica di ciascuna istituzione scolastica, è auspicabile infine che l’impegno
della scuola si concentri prevalentemente su principi che sviluppino gli aspetti
educativi più intimamente connessi con la dimensione della progettualità
personale, in funzione di una facilitazione oggettiva delle scelte degli studenti.
Si tratta di valorizzare le potenzialità di ciascun allievo, soddisfare le aspettative
di crescita e di miglioramento e individuare percorsi rispondenti ai bisogni degli
studenti. In altre parole, promuovere un orientamento che sostenga l’esplorazione
delle possibilità di sviluppo personale e professionale, che valorizzi la dimensione
orientativa delle discipline, che favorisca il collegamento e l’interazione della
scuola con il territorio e il mondo produttivo, soprattutto attraverso gli stage
e l’alternanza e che proponga agli studenti attività coinvolgenti, utilizzando
diffusamente metodologie attive e contesti applicativi.
Per svolgere questo delicato compito, gli istituti tecnici possono contare su
alleanze consolidate, a livello locale, regionale e nazionale, con le istituzioni e
le associazioni professionali e imprenditoriali.
L’apertura della scuola al mondo del lavoro e delle professioni è, tra l’altro,
un’opportunità, unanimemente riconosciuta, per prevenire e contrastare la
dispersione scolastica, oltre che per favorire l’occupabilità. Per mantenere
elevati i livelli di occupazione occorre puntare su livelli di istruzione più elevati,
ma anche sull’apertura a esperienze e linguaggi diversi: contenuti specialistici
e suddivisioni disciplinari tendono ad una crescente interdipendenza e
contaminazione tra i saperi. Per far fronte alle nuove sfide dell’educazione,
l’Unione Europea raccomanda ai paesi membri di rinnovare i sistemi educativi
nazionali in modo da superare la contrapposizione tra cultura generale e
cultura tecnica e professionale, creare nuovi ponti tra scuola, società e impresa,
considerando quest’ultima anche come ambiente formativo, per garantire ai
cittadini e ai lavoratori un apprendimento lungo l’intero corso della vita.
In questo contesto sono sempre più necessari l’interazione e il dialogo, in
forme non episodiche, tra le imprese, che per sopravvivere e svilupparsi devono
divenire “fabbriche di conoscenza”, e le scuole, tradizionali “fabbriche della
conoscenza e della cittadinanza”.
L’impianto del nuovo ordinamento accentua la rilevanza dell’istruzione tecnica come
canale formativo dotato di una propria identità culturale e pedagogica, fondata
sulla filiera scientifica e sulle tecnologie che caratterizzano gli indirizzi di studio.

12

Bit By Bit.indb 12 19/03/18 08:30


Alternanza scuola-lavoro

ESTRATTO DEL D.L. 15 APRILE 2005, N. 77

Art. 1
Ambito di applicazione
Il presente decreto disciplina l’alternanza scuola-lavoro, di seguito denominata:
«alternanza», come modalità di realizzazione dei corsi del secondo ciclo, sia nel
sistema dei licei, sia nel sistema dell’istruzione e della formazione professionale, per
assicurare ai giovani, oltre alle conoscenze di base, l’acquisizione di competenze
spendibili nel mercato del lavoro. Gli studenti che hanno compiuto il quindicesimo
anno di età, salva restando la possibilità di espletamento del diritto-dovere con il
contratto di apprendistato ai sensi dell’articolo 48 del decreto legislativo 10 settembre
2003, n. 276, possono presentare la richiesta di svolgere, con la predetta modalità e
nei limiti delle risorse di cui all’articolo 9, comma 1, l’intera formazione dai 15 ai 18
anni o parte di essa, attraverso l’alternanza di periodi di studio e di lavoro, sotto la
responsabilità dell’istituzione scolastica o formativa.
1. I percorsi in alternanza sono progettati, attuati, verificati e valutati sotto
la responsabilità dell’istituzione scolastica o formativa, sulla base di apposite
convenzioni con le imprese, o con le rispettive associazioni di rappresentanza,
o con le camere di commercio, industria, artigianato e agricoltura, o con gli enti
pubblici e privati, ivi inclusi quelli del terzo settore, disponibili ad accogliere
gli studenti per periodi di apprendimento in situazione lavorativa, che non
costituiscono rapporto individuale di lavoro. Le istituzioni scolastiche e formative,
nell’ambito degli ordinari stanziamenti di bilancio, destinano specifiche risorse alle
attività di progettazione dei percorsi in alternanza scuola-lavoro.
(…)

Art. 2
Finalità dell’alternanza
Nell’ambito del sistema dei licei e del sistema dell’istruzione e della formazione
professionale, la modalità di apprendimento in alternanza, quale opzione
formativa rispondente ai bisogni individuali di istruzione e formazione dei giovani,
persegue le seguenti finalità:
a. attuare modalità di apprendimento flessibili ed equivalenti sotto il profilo
culturale ed educativo, rispetto agli esiti dei percorsi del secondo ciclo, che
colleghino sistematicamente la formazione in aula con l’esperienza pratica;
b. arricchire la formazione acquisita nei percorsi scolastici e formativi con
l’acquisizione di competenze spendibili anche nel mercato del lavoro;
c. favorire l’orientamento dei giovani per valorizzarne le vocazioni personali, gli
interessi e gli stili di apprendimento individuali;
d. realizzare un organico collegamento delle istituzioni scolastiche e formative con
il mondo del lavoro e la società civile, che consenta la partecipazione attiva dei
soggetti di cui all’articolo 1, comma 2, nei processi formativi;
e. correlare l’offerta formativa allo sviluppo culturale, sociale ed economico del
territorio.

13

Bit By Bit.indb 13 19/03/18 08:30


LE ABILITÀ LINGUISTICHE
Le quattro abilità linguistiche fondamentali (lettura, ascolto, scrittura e parlato)
possono essere divise in due gruppi:
1) abilità ricettive o di input (lettura e ascolto) vs. abilità produttive o di output
(scrittura e parlato);
2) abilità orali (ascolto e parlato) vs. abilità scritte (scrittura e lettura).

La prima distinzione nasce dalla consapevolezza che nella comunicazione


sono coinvolte due distinte sfere (e quindi capacità) che, pur influenzandosi a
vicenda, si sviluppano secondo meccanismi differenti.
Quando si studia una lingua, infatti, è frequente trovare studenti che possono
mostrare più difficoltà in entrambe le abilità linguistiche dello stesso gruppo.
È probabile che uno studente che non riesce ad esprimersi compiutamente
quando cerca di comunicare nella lingua straniera abbia problemi anche quando
scrive in quella lingua oppure quando deve capire che cosa ha detto un parlante
madrelingua, mentre è meno probabile che riscontri tali problemi quando legge.
Ciò può naturalmente variare da individuo a individuo e/o con il passaggio
da un livello linguistico all’altro; potenziando le abilità più carenti o facendo
leva sulla language skill più sviluppata all’interno dello stesso gruppo, è infatti
possibile equilibrare il livello delle varie abilità.

Ascolto (Listening)
È la prima language skill che mettiamo in pratica nella vita. Implica
l’identificazione di suoni, accenti, inflessioni, intonazioni, ecc. e la
comprensione di parole e frasi a livello orale per recepire un messaggio. Di
solito ci sono due tipi di situazioni in cui possiamo ritrovarci a utilizzare questa
abilità linguistica: situazioni interattive e situazioni non-interattive. Le prime
sono rappresentate da conversazioni faccia a faccia o al telefono e comportano
un’interazione con un altro parlante, a cui possiamo chiedere spiegazioni,
chiarimenti o semplicemente di ripetere e parlare più lentamente. Le seconde,
invece, sono costituite da tutte quelle situazioni in cui l’ascolto è “passivo”:
radio, televisione, registrazioni, conferenze, ecc. In questi casi non abbiamo
l’opportunità di interagire con il parlante e pertanto esse richiedono solitamente
uno sforzo maggiore.
È importante che lo studente non si scoraggi e pertanto è importante che
capisca che il raffinamento di questa abilità richiede esercizio costante, che
l’insegnante provvederà a fornire. Si deve insistere sulla concentrazione,
nel caso di ascolto di test registrati, poiché gli stimoli non uditivi possono
distrarre dal task. Inoltre, l’insegnante provvederà ad incoraggiare gli studenti
a riconoscere parole/segmenti chiave della registrazione e li inviterà a non
preoccuparsi eccessivamente di stringhe linguistiche non funzionali alla
comprensione in oggetto.

14

Bit By Bit.indb 14 19/03/18 08:30


Parlato (Speaking)
È strettamente legato alla capacità di ascolto, in quanto insieme rappresentano
il fulcro primario della comunicazione. Parlare, così come scrivere, implica
tante altre micro-abilità che permettono di veicolare al meglio un messaggio:
ad esempio, il tono, il registro, la pronuncia, il ritmo, l’intonazione, ecc.
Tutte queste caratteristiche sono parte integrante di questa abilità linguistica
e, di conseguenza, la mancanza di anche una sola di tali caratteristiche può
compromettere l’efficacia comunicativa del messaggio che vogliamo veicolare.
Anche in questo caso, l’insegnante offrirà uno stimolo/pretesto per la
comunicazione, preferibilmente basato sugli interessi personali o le curiosità
disciplinari degli studenti. L’insegnante, inoltre, incoraggerà gli studenti al
raggiungimento della comunicazione orale attraverso frasi non complesse ed
alla ricerca di equivalenti comunicativi per veicolare concetti troppo complessi
o al ricorso ad esempi per raggiungere lo scopo comunicativo.
Lettura (Reading)
È una delle skills che, anche nella propria lingua madre, richiede formazione
e pratica. Oltre al riconoscimento dei caratteri, la lettura necessità anche la
comprensione del significato delle varie parole codificate in quei caratteri
e delle frasi che a loro volta queste formano. È importante incoraggiare gli
studenti ad acquisire metodi di lettura selettiva come lo skimming (leggere
velocemente un testo per estrapolarne un’idea generale – general gist) o
lo scanning (andare alla ricerca selettiva dell’informazione richiesta dalla
consegna) attraverso un esercizio alternato e costante di entrambi. Un’ottima
attività introduttiva alla lettura di testi tecnici e quindi piuttosto specializzati
linguisticamente, consiste in un’attività introduttiva di brainstorming su parole/
concetti chiave che si incontreranno nel testo. Questo consente agli studenti di
affrontare la lettura dotati di un minimo di pre-conoscenze.
Scrittura (Writing)
Pur sottostando a quasi tutte le norme che regolano il parlato, l’ascolto e la
lettura, ha peculiarità proprie, specialmente in L2 poiché le regole stilistiche
e la strutturazione della frase non sono sovrapponibili a quelle della lingua
madre. È importante innanzitutto che gli studenti siano consapevoli dei
diversi tipi di testo scritto (lettera, riassunto, relazione, messaggio, email,
ecc.) e dei relativi registri (formale/informale) che si realizzano attraverso
l’impiego di strutture linguistiche e lessico diversificati. Pertanto sarà cura
dell’insegnante offrire esempi e modelli di tali testi ed evidenziarne le
peculiarità. I testi scritti dovranno preferibilmente aderire ad una traccia,
inizialmente più dettagliata e via via più generica. È importante anche
determinare la lunghezza del testo richiesto, segnalando le parole, da un
minimo ad un massimo. Cura particolare nella correzione degli elaborati
andrà nel tentativo di distinguere il tipo di errore (vocabulary, word order,
punctuation, grammar, appropriacy, ecc.)

15

Bit By Bit.indb 15 19/03/18 08:30


CLIL
Content and Language Integrated Learning (CLIL), o Apprendimento Integrato
di Lingua e Contenuto, è un approccio educativo centrato su due obiettivi in
cui una seconda lingua viene usata per insegnare ed imparare sia lingua che
contenuti.
Fu introdotto da David Marsh e Anne Maljers nel 1994. Il CLIL è una
metodologia di insegnamento che si è sviluppata in diversi Paesi Europei a
partire dalla metà degli anni ’90; in questo periodo, anche in Italia, grazie allo
sviluppo di progetti europei organizzati da varie istituzioni e Università, alcune
scuole hanno attivato sperimentazioni di insegnamenti di contenuti disciplinari
in lingua straniera.
Il CLIL è diventato un’innovazione che implica la costruzione di competenza
linguistica e comunicativa contestualmente allo sviluppo ed acquisizione
di conoscenze ed abilità disciplinari; non è apprendimento di lingua ma
nemmeno di una materia, bensì una fusione di entrambe. L’approccio CLIL
comprende sempre un duplice obiettivo in quanto in una lezione CLIL si presta
contemporaneamente attenzione sia alla disciplina insegnata sia alla lingua
straniera veicolare.
Grazie al suo approccio a doppia focalizzazione, il CLIL offre un contesto
più naturale per lo sviluppo della lingua che porta immediatezza, rilevanza
e valore aggiunto al processo di apprendimento della stessa, sviluppando
competenze sia nella disciplina non linguistica sia nella lingua straniera in cui
questa è insegnata. Conseguire questo duplice obiettivo richiede lo sviluppo
di uno speciale approccio integrato sia all’insegnamento sia all’apprendimento
e richiede che gli insegnanti dedichino attenzione speciale non solo a come
insegnare la lingua, ma anche al processo educativo più in generale. Il CLIL
si dimostra efficace in tutti i settori dell’istruzione, dalla scuola primaria fino
all’istruzione degli adulti ed istruzione accademica.
Gli insegnanti che lavorano con il CLIL normalmente parlano fluentemente
la lingua obiettivo, oppure sono bilingui o madrelingua. In molte istituzioni
gli insegnanti di lingua lavorano in collaborazione con altri dipartimenti che
offrono il CLIL in diverse materie. Il fattore chiave è che il discente acquisisce
nuove conoscenze su una materia che non implica di per sé l’insegnamento
della lingua, ma in realtà usa ed impara una lingua straniera. Le metodologie e
le strategie usate sono spesso legate all’area della materia di riferimento, in cui
sono i contenuti che guidano le attività. Inoltre, il CLIL permette alle lingue di
essere insegnate in modo relativamente intenso senza richiedere una eccessiva
parte dell’orario scolastico.

16

Bit By Bit.indb 16 19/03/18 08:30


Il profilo del docente CLIL
Il profilo del docente CLIL della scuola secondaria di secondo grado è
caratterizzato da:
• competenze linguistico-comunicative nella lingua straniera veicolare di
livello C1 del Quadro Comune Europeo di Riferimento per le lingue (QCER)
• competenze metodologico-didattiche acquisite al termine di un corso di
perfezionamento universitario del valore di 60 CFU (Credito Formativo
Universitario) per i docenti in formazione iniziale e di 20 CFU per i docenti
in servizio.

Iniziative dell’Unione Europea per supportare l’apprendimento attraverso le lingue


Data la sua efficacia e l’abilità di motivare i discenti, il CLIL è indicato come
un’area prioritaria nel Piano d’Azione per l’Apprendimento delle Lingue e la
Diversità Linguistica (Sezione 1 1.2). Il Simposio Europeo su “La classe europea
che cambia – il Potenziale dell’Istruzione Plurilinguistica”, che si tenne nel
marzo 2005, ribadì il bisogno di assicurare che alunni e studenti partecipino al
CLIL a differenti livelli dell’istruzione scolastica. Fu anche enfatizzato il fatto
che gli insegnanti dovrebbero ricevere una speciale formazione per il CLIL.
In quello stesso anno, l’Unione Europea pubblicò uno studio approfondito su
come il CLIL si stava svolgendo nelle scuole in tutta Europa. L’Unione Europea
ha anche supportato molti progetti CLIL insieme allo sviluppo di un network
europeo per Classi di Contenuto e Apprendimento Integrato.

Il percorso normativo in Italia


La Legge 53 del 2003 ha riorganizzato la Scuola Secondaria di Secondo Grado
e i Regolamenti Attuativi del 2010 hanno introdotto l’insegnamento di una
disciplina non linguistica (DNL) in una lingua straniera nell’ultimo anno
dei Licei e degli Istituti Tecnici e di due discipline non linguistiche in lingua
straniera nei Licei Linguistici a partire dal terzo e quarto anno.
La Legge 107 del 2015, all’articolo 7, definisce come obiettivi formativi prioritari
“la valorizzazione e il potenziamento delle competenze linguistiche, con
particolare riferimento all’italiano nonché alla lingua inglese e ad altre lingue
dell’Unione Europea, anche mediante l’utilizzo della metodologia CLIL”. Il Piano
per la Formazione dei docenti 2016-2019, nel punto 4.4 Competenze di lingua
straniera, evidenzia che i percorsi di metodologia CLIL sono fondamentali per:
• attuare pienamente quanto prescritto dai Regolamenti del 2010
• ampliare l’offerta formativa attraverso contenuti veicolati in lingua straniera
in tutte le classi delle scuole primarie e delle scuole secondarie di primo e
secondo grado.

Il nostro è il primo paese dell’Unione Europea a introdurre il CLIL in modo


ordinamentale nella Scuola Secondaria di Secondo Grado.

17

Bit By Bit.indb 17 19/03/18 08:30


PROGETTARE PER COMPETENZE
I saperi e le competenze, articolati in conoscenze e abilità, con l’indicazione
degli assi culturali di riferimento, sono descritti nel documento tecnico allegato
al regolamento emanato con decreto del Ministro della Pubblica Istruzione n. 139
del 22 agosto 2007. La certificazione dei saperi e delle competenze acquisite dagli
studenti nell’assolvimento dell’obbligo di istruzione è prevista all’art. 4, comma
3, del citato regolamento, in linea con le indicazioni dell’Unione europea, con
particolare riferimento al Quadro Europeo dei titoli e delle qualifiche EQF.
“COMPETENZA: comprovata capacità di usare conoscenze, abilità e capacità
personali, sociali e/o metodologiche, in situazioni di lavoro o di studio e nello
sviluppo professionale e/o personale”.
(European Qualifications Framework - Quadro europeo delle Qualifiche e dei Titoli).

La certificazione delle competenze è uno strumento utile per sostenere e orientare


gli studenti nel loro percorso di apprendimento sino al conseguimento di un
titolo di studio o, almeno, di una qualifica professionale di durata triennale
entro il diciottesimo anno di età e si configura come «espressione dell’autonomia
professionale propria della funzione docente, nella sua dimensione sia individuale
che collegiale, nonché dell’autonomia didattica delle istituzioni scolastiche»
(articolo 1, comma 2, del D.P.R. 22 giugno 2009, n. 122). I consigli di classe
utilizzano le valutazioni effettuate nel percorso di istruzione di ogni studente in
modo che la certificazione descriva compiutamente l’avvenuta acquisizione delle
competenze di base, che si traduce nella capacità dello studente di utilizzare
conoscenze e abilità personali e sociali in contesti reali, con riferimento alle
discipline/ambiti disciplinari che caratterizzano ciascun asse culturale. Questo
significa che l’insegnamento si deve slegare progressivamente dal nozionismo e
far sì che l’allievo sappia utilizzare in modo autonomo, originale e consapevole
quanto appreso in ambito scolastico. Quindi, è possibile apprezzare precise
competenze solo in azione per affrontare e risolvere situazioni problematiche
in cui occorre mobilitare conoscenze, abilità e disponibilità all’agire. Secondo le
Linee Guida, la competenza si può «accertare facendo ricorso a compiti di realtà»
che devono essere autentici e rispettare alcuni parametri:
• proporre tematiche che possono essere affrontate nel mondo reale, personale
o professionale;
• offrire l’occasione di esaminare i problemi da diverse prospettive teoriche e
pratiche;
• permettere più soluzioni alternative;
• fornire l’occasione di collaborare;
• estendere i loro risultati al di là di specifiche discipline;
• essere strettamente integrati con la valutazione;
• sfociare in un prodotto finale completo autosufficiente.

18

Bit By Bit.indb 18 19/03/18 08:30


TERMINOLOGIA UTILE

LEMMI DEFINIZIONI
Abilità Le capacità di applicare conoscenze e di utilizzare know-how per portare
a termine compiti e risolvere problemi. Nel contesto del Quadro europeo
delle qualifiche le abilità sono descritte come cognitive (comprendenti
l’uso del pensiero logico, intuitivo e creativo) o pratiche (comprendenti
l’abilità manuale e l’uso di metodi, materiali, strumenti).
Alternanza Modalità di realizzazione dei corsi del secondo ciclo, sia nel sistema
scuola-lavoro dell’istruzione secondaria superiore, sia nel sistema dell’istruzione e della
formazione professionale, per assicurare ai giovani, oltre alle conoscenze
di base, l’acquisizione di competenze spendibili nel mercato del lavoro.
Apprendimento in Apprendimento che si realizza in un contesto organizzato e strutturato
contesto formale (per esempio, in un istituto d’istruzione, o di formazione o sul
lavoro), appositamente progettato come tale (in termini di obiettivi di
apprendimento e tempi o risorse per l’apprendimento). L’apprendimento
formale è intenzionale dal punto di vista del discente e di norma sfocia
in una convalida e/o in una certificazione.
Apprendimento in Apprendimento risultante dalle attività della vita quotidiana legate al
contesto informale lavoro, alla famiglia o al tempo libero. Non è strutturato (in termini di
di apprendimento, di tempi o di risorse) e di norma non sfocia in una
certificazione. L’apprendimento informale può essere intenzionale, ma
nella maggior parte dei casi non lo è (ovvero è “fortuito” o casuale).
Apprendimento Apprendimento che si realizza nell’ambito di attività pianificate non
in contesto non specificamente concepite come apprendimento (in termini di obiettivi,
formale di tempi o di sostegno all’apprendimento). L’apprendimento non formale
non sfocia di norma in una certificazione. L’apprendimento non formale,
a volte denominato “apprendimento semi-strutturato”, è intenzionale dal
punto di vista del discente.
Apprendimento Qualsiasi attività di apprendimento intrapresa nelle varie fasi della vita
permanente al fine di migliorare le conoscenze, le capacità e le competenze in una
prospettiva personale, civica, sociale e/o occupazionale.
Area di istruzione Area di istruzione comune a tutti i percorsi degli istituti tecnici che
generale degli ha l’obiettivo di fornire ai giovani la preparazione di base, acquisita
istituti tecnici attraverso il rafforzamento e lo sviluppo degli assi culturali che
caratterizzano l’obbligo di istruzione (asse dei linguaggi, matematico,
scientifico-tecnologico, storico-sociale).
Aree di indirizzo Le aree di indirizzo hanno l’obiettivo di far acquisire agli studenti sia
degli istituti tecnici conoscenze teoriche e applicative spendibili in vari contesti di vita,
di studio e di lavoro, sia abilità cognitive idonee a risolvere problemi,
sapersi gestire autonomamente in ambiti caratterizzati da innovazioni
continue, assumere progressivamente anche responsabilità per la
valutazione e il miglioramento dei risultati ottenuti.

19

Bit By Bit.indb 19 19/03/18 08:30


LEMMI DEFINIZIONI
Asse culturale Gli assi culturali costituiscono il “tessuto” per la costruzione di percorsi
di apprendimento orientati all’acquisizione delle competenze chiave
che preparino i giovani alla vita adulta e che costituiscano la base
per consolidare e accrescere saperi e competenze in un processo di
apprendimento permanente, anche ai fini della futura vita lavorativa.
Gli assi culturali che caratterizzano l’obbligo di istruzione sono quattro:
asse dei linguaggi, matematico, scientifico-tecnologico, storico-sociale.
Certificazione Rilascio di un certificato, un diploma o un titolo che attesta
dei risultati di formalmente che un ente competente ha accertato e convalidato un
apprendimento insieme di risultati dell’apprendimento (conoscenze, know-how,
abilità e/o competenze) conseguiti da un individuo rispetto a uno
standard prestabilito. La certificazione può convalidare i risultati
dell’apprendimento conseguiti in contesti formali, non formali o
informali.
Cittadinanza e Acquisizione, nel primo e nel secondo ciclo di istruzione, delle
Costituzione conoscenze e delle competenze relative a «Cittadinanza e Costituzione»,
nell’ambito delle aree storico-geografica e storico-sociale e del monte ore
complessivo previsto per le stesse. Negli istituti tecnici, le attività e gli
insegnamenti relativi a “Cittadinanza e Costituzione” coinvolgono tutti
gli ambiti disciplinari e si sviluppano, in particolare, in quelli di interesse
storico-sociale e giuridico-economico.
Classificazione Standard di classificazione internazionale e analisi comparata dei vari
ISCED livelli dei sistemi di istruzione creato dall’UNESCO, approvata dalla
(International International Conference on Education (Ginevra, 1975)
Standard
Classification of
Education)
Classificazione Standard internazionale di classificazione per il mondo del lavoro e delle
ISCO (International professioni. È redatto da ILO (International Labour Organization – in
Standard italiano OIL) e serve per classificare le occupazioni in gruppi/settori
Classification of secondo le mansioni espletate sul posto di lavoro.
Occupations)
CLIL (Content Approccio metodologico che prevede l’insegnamento di una disciplina
and Language non linguistica in lingua straniera veicolare al fine di integrare
Integrated l’apprendimento della lingua e l’acquisizione di contenuti disciplinari,
Learning) creando ambienti di apprendimento che favoriscano atteggiamenti
plurilingui e sviluppino la consapevolezza multiculturale.
Comitato Struttura innovativa di cui possono dotarsi gli istituti tecnici,
tecnico-scientifico nell’esercizio della loro autonomia didattica e organizzativa, con
funzioni consultive e di proposta per l’organizzazione delle aree di
indirizzo e l’utilizzazione degli spazi di autonomia e flessibilità.
È composto da docenti e da esperti del mondo del lavoro, delle
professioni e della ricerca scientifica e tecnologica.

20

Bit By Bit.indb 20 19/03/18 08:30


LEMMI DEFINIZIONI
Competenze Comprovata capacità di utilizzare conoscenze, abilità e capacità
personali, sociali e/o metodologiche, in situazioni di lavoro o di studio
e nello sviluppo professionale e personale. Nel contesto del Quadro
Europeo delle Qualifiche, le competenze sono descritte in termini di
responsabilità e autonomia.
Competenze chiave Otto competenze, da acquisire al termine dell’obbligo d’istruzione, che
di cittadinanza costituiscono il risultato che si può conseguire – all’interno di un unico
processo di insegnamento/apprendimento – attraverso la reciproca
integrazione e interdipendenza tra i saperi e le competenze contenuti
negli assi culturali.
Competenze chiave Combinazione di conoscenze, abilità e attitudini appropriate al contesto.
per l’apprendimento Le competenze chiave sono quelle di cui tutti hanno bisogno per la
permanente realizzazione e lo sviluppo personale, la cittadinanza attiva, l’inclusione
sociale e l’occupazione.
Conoscenze Risultato dell’assimilazione di informazioni attraverso l’apprendimento.
Le conoscenze sono un insieme di fatti, principi, teorie e pratiche relative
ad un settore di lavoro o di studio. Nel contesto del Quadro Europeo delle
Qualifiche, le conoscenze sono descritte come teoriche e/o pratiche.
Dipartimenti Strutture di cui possono dotarsi gli istituti, nell’esercizio della loro
autonomia didattica, organizzativa e di ricerca, quali articolazioni
funzionali del collegio dei docenti, per il sostegno alla didattica e alla
progettazione formativa.
 CVET (European
E Sistema europeo di crediti per l’istruzione e la formazione professionale
Credit System inteso ad agevolare il trasferimento, il riconoscimento e l’accumulo dei
for Vocational risultati comprovati dell’apprendimento delle persone interessate ad
Education and acquisire una qualifica.
Training)
EQARF (European Quadro europeo di riferimento per la garanzia della qualità
Quality Assurance dell’istruzione e della formazione professionale. Strumento di
Reference riferimento destinato ad aiutare gli Stati membri a promuovere e a
Framework) seguire il miglioramento continuo dei loro sistemi di istruzione e
formazione professionale sulla base di riferimenti europei comuni, il
quale si basa sul QGCQ (quadro comune di garanzia della qualità) e lo
sviluppa ulteriormente. Il quadro di riferimento dovrebbe contribuire
a migliorare la qualità dell’istruzione e formazione professionale e
ad accrescere la trasparenza e la coerenza delle politiche degli Stati
membri in materia di istruzione e formazione professionale, favorendo
così la fiducia reciproca, la mobilità dei lavoratori e degli studenti e
l’apprendimento permanente.
EQF (European Quadro Europeo delle Qualifiche per l’apprendimento permanente.
Qualification Strumento di riferimento per confrontare i livelli delle qualifiche dei
Framework) diversi sistemi delle qualifiche e per promuovere sia l’apprendimento
permanente sia le pari opportunità nella società basata sulla conoscenza,
nonché l’ulteriore integrazione del mercato del lavoro europeo,
rispettando al contempo la ricca diversità dei sistemi d’istruzione
nazionali. Il termine qualifica si riferisce a titoli di studio e qualifiche
professionali.

21

Bit By Bit.indb 21 19/03/18 08:30


LEMMI DEFINIZIONI
Identità degli L’identità degli istituti tecnici è connotata da una solida base culturale
istituti tecnici a carattere scientifico e tecnologico in linea con le indicazioni
dell’Unione Europea. Costruita attraverso lo studio, l’approfondimento,
l’applicazione di linguaggi e metodologie di carattere generale e
specifico, tale identità è espressa da un numero limitato di ampi
indirizzi, correlati a settori fondamentali per lo sviluppo economico e
produttivo del Paese.
Indagine OCSE- PISA – Programme for International Student Assessment: Indagine
PISA statistica standardizzata basata sul programma OCSE per la valutazione
internazionale degli studenti quindicenni sviluppato congiuntamente
dai paesi aderenti. In particolare, vengono accertati i livelli ottenuti
nelle competenze relative alla lettura, alla matematica e alle scienze.
L’indagine ha periodicità triennale.
Linee guida degli Il passaggio al nuovo ordinamento è definito da linee guida a sostegno
istituti tecnici dell’autonomia organizzativa e didattica delle istituzioni scolastiche,
anche per quanto concerne l’articolazione in competenze, conoscenze e
abilità dei risultati di apprendimento.
Livelli EQF Il Quadro Europeo delle Qualifiche e dei titoli EQF definisce otto
livelli articolati in conoscenze, abilità e competenze. Ciascuno degli
8 livelli è definito da una serie di descrittori che indicano i risultati
dell’apprendimento relativi alle qualifiche a tale livello in qualsiasi
sistema delle qualifiche. Le competenze sono progressivamente
differenziate in relazione all’acquisizione, da parte dello studente, di
gradi diversi di autonomia e responsabilità.
Obbligo di Istruzione obbligatoria, impartita per almeno dieci anni, finalizzata
istruzione al conseguimento di un titolo di studio di scuola secondaria superiore
o di una qualifica professionale, di durata almeno triennale, entro il
diciottesimo anno di età, con il conseguimento dei quali si assolve il
diritto/dovere di cui al decreto legislativo 15 aprile 2005, n. 76.
L’obbligo di istruzione si assolve anche nei percorsi di istruzione e
formazione professionale di cui al Capo III del decreto legislativo
17 ottobre 2005, n. 226, e, sino alla completa messa a regime delle
disposizioni ivi contenute, anche nei percorsi sperimentali di istruzione
e formazione professionale.
Opzioni Ulteriore articolazione delle aree di indirizzo degli istituti tecnici,
negli spazi di flessibilità previsti, in un numero contenuto incluso
in un apposito elenco nazionale. Ambiti, criteri e modalità sono definiti,
previo parere della Conferenza Stato, Regioni e Province autonome
di cui al decreto legislativo 28 agosto 1997, n. 281, con successivo
decreto del Ministro dell’Istruzione, dell’Università e della Ricerca di
concerto con il Ministro dell’Economia e delle Finanze.
Organizzazione Associazione di organizzazioni nazionali, anche, ad esempio, di datori di
settoriale lavoro e organismi professionali, che rappresenta gli interessi di settori
internazionale nazionali.

22

Bit By Bit.indb 22 19/03/18 08:30


LEMMI DEFINIZIONI
Quadro comune Strumento di riferimento del Consiglio di Europa per lo sviluppo e
europeo di l’implementazione di politiche d’educazione linguistica trasparenti e
riferimento coerenti. Il Quadro fornisce parametri e criteri per la validazione delle
per le lingue competenze linguistiche definite secondo una scala di misurazione
(Common European globale che si sviluppa in 6 livelli ascendenti di riferimento (dal livello
Framework of A1, il più basso, al livello C2, il più alto). La scala viene utilizzata, a
Reference for livello europeo, anche per definire il livello di padronanza linguistica
Languages) raggiunto da un apprendente.
Qualifica Risultato formale di un processo di valutazione e convalida, acquisito
quando l’autorità competente stabilisce che i risultati dell’apprendimento
di una persona corrispondono a standard definiti.
Riconoscimento Il processo in cui sono attestati i risultati dell’apprendimento
dei risultati di ufficialmente conseguiti attraverso l’attribuzione di unità o qualifiche.
apprendimento
Risultati Descrizione di ciò che un discente conosce, capisce ed è in grado di
dell’apprendimento realizzare al termine di un processo di apprendimento. I risultati sono
definiti in termini di conoscenze, abilità e competenze.
Settore Raggruppamento di attività professionali in base a funzione economica,
prodotto, servizio o tecnologia principale. Il Regolamento degli istituti
tecnici prevede due ampi settori: “Economico” e “Tecnologico”.
Spazi di flessibilità Possibilità di articolare in opzioni le aree di indirizzo di cui agli Allegati
B) e C) del Regolamento degli istituti tecnici per corrispondere alle
esigenze del territorio e ai fabbisogni formativi espressi dal mondo
del lavoro e delle professioni, con riferimento all’orario annuale delle
lezioni: entro il 30% nel secondo biennio e il 35% nell’ultimo anno.
La flessibilità è utilizzata nei limiti delle dotazioni organiche assegnate
senza determinare esuberi di personale.
Ufficio tecnico Ufficio di cui sono dotati gli istituti tecnici del settore tecnologico, con
il compito di sostenere la migliore organizzazionee funzionalità dei
laboratori a fini didattici e il loro adeguamento in relazione alle esigenze
poste dall’innovazione tecnologica, nonché per la sicurezza delle
persone e dell’ambiente.
Unità di risultati Elemento della qualificazione costituito da una serie coerente di
di apprendimento conoscenze, abilità e competenze suscettibili di essere valutate e
convalidate. Nel sistema ECVET, un’unità è la più piccola parte di una
qualificazione che può essere valutata, trasferita, convalidata e, ove
possibile, certificata. L’unità di risultati di apprendimento può essere
propria di una sola qualificazione o comune a più qualificazioni.

23

Bit By Bit.indb 23 19/03/18 08:30


03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 25

DIDATTICA INCLUSIVA E BES

Suggerimenti per la programmazione e la valutazione


di Nadia Sanità

1. Normativa e inquadramento scolastico


2. Dislessia, didattica e inglese
3. Didattica inclusiva e resilienza
4. Altri tipi di Bisogni Educativi
5. Suggerimenti e modelli per la valutazione
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 26
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 27

1. NORMATIVA E INQUADRAMENTO SCOLASTICO

1.1 Introduzione
La presente sezione non ambisce a fornire un’illusoria ricetta di didattica miracolosa ai
docenti, ma, nella pletora dei testi sul medesimo argomento, si impegna a chiarire
alcuni punti e a fornire suggerimenti orientativi a quegli insegnanti di lingua inglese
che sempre più intendono riuscire ad “includere” tutti gli studenti nelle proprie lezioni.
La prima parte sarà dedicata alla normativa quadro che ci consente di categorizzare e
definire il fenomeno – normativa intesa dunque come risorsa e non come qualcosa di
noioso e astratto; si cercherà poi di inquadrare meglio il fenomeno della dislessia,
poiché la lingua inglese, non essendo trasparente fonologicamente (cioè non avendo
corrispondenza tra scritto e parlato come in larga misura sono l’italiano e il tedesco),
causa notevoli problemi di decodifica agli studenti affetti da tale disturbo; infine, scopo
ambizioso di tale pubblicazione sarà anche quello di tentare di contribuire a superare
lo schema “misure compensative e dispensative”, provando a suggerire una didattica
qualitativamente diversa da inserire in un Piano Didattico Personalizzato che recepisca
pienamente la CM n. 8 del 6/3/2013 e che diventi davvero adatta a tutta la classe:
«Il piano Didattico Personalizzato non può più essere inteso come mera
esplicitazione di strumenti compensativi e dispensativi per gli alunni con DSA».

1.2 La normativa inclusiva italiana: breve excursus


La normativa inclusiva italiana ha visto i propri albori negli anni Settanta, con
l’inserimento degli alunni con disabilità nelle scuole statali e si è ampliata con la
legge 62/2000 che sancì il diritto all’integrazione degli alunni con disabilità anche
nelle scuole paritarie. Precedentemente, l’obbligo scolastico era esteso solo ai ciechi e
ai sordi (Riforma Gentile del 1923). In seguito, l’istruzione speciale prevedeva classi
differenziali per gli allievi con lievi ritardi, ospitate nei plessi scolastici ordinari e
scuole speciali per sordi, ciechi e “anormali psichici” ospitati in plessi distinti.
I casi più gravi venivano separati dalle famiglie per lunghi periodi e ospitati in istituti
speciali. Le classi differenziali, tuttavia, erano destinate anche agli allievi con problemi
di condotta o disagio sociale o familiare. Talvolta il disagio familiare consisteva nel
parlare esclusivamente un dialetto del sud. Si deve attendere il 1971 con la legge 118
per superare la logica della separazione in cui il disabile veniva percepito come un
malato e come potenziale elemento di disturbo. Tale legge però non accennava
minimamente né alla didattica speciale, né allo sviluppo potenziale o alle risorse da
impegnare. Con la legge 104/1992 si giunge, invece, ad una legge quadro che non si
concentra solo sull’assistenza, ma anche sull’integrazione e sui diritti dei disabili al
fine di promuoverne la massima autonomia individuale, specificando che
l’integrazione deve avvenire in ogni ciclo, università compresa, nelle classi comuni.

27
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 28

Negli altri paesi europei, invece, si era diffusa una normativa inclusiva che
riguardava alunni con difficoltà di apprendimento non dovute a cause sanitarie ma
a svantaggi socioculturali, ambientali, familiari e/o personali. Tali alunni venivano
considerati alunni con SEN (Special Educational Needs), di cui l’acronimo italiano
BES è la traduzione. L’apertura a questo nuovo approccio è stata la traduzione
italiana degli ICF1 (International Classification of Functioning, Disability and Health)
dell’Organizzazione Mondiale della Sanità. Il modello diagnostico degli ICF
considera la persona in modo olistico, in una prospettiva globale – dunque
biologica, psicologica e anche sociale – prendendo quindi in considerazione la
totalità e la complessità dei funzionamenti delle persone e non solo gli aspetti bio-
strutturali. La direttiva ministeriale 27 del dicembre del 2012 basa, quindi, il
concetto di bisogno educativo speciale proprio sugli ICF:
«Gli alunni con disabilità si trovano inseriti all’interno di un contesto sempre più
variegato, dove la discriminante tradizionale – alunni con disabilità/alunni senza
disabilità – non rispecchia pienamente la complessa realtà delle nostre classi. Anzi,
è opportuno assumere un approccio decisamente educativo, per il quale
l’identificazione degli alunni con disabilità non avviene sulla base della eventuale
certificazione, che certamente mantiene utilità per una serie di benefici e di
garanzie, ma allo stesso tempo rischia di chiuderli in una cornice ristretta. A questo
riguardo è rilevante l’apporto, anche sul piano culturale, del modello diagnostico
ICF (International Classification of Functioning) dell’OMS, che considera la persona
nella sua totalità, in una prospettiva bio-psico-sociale. Fondandosi sul profilo di
funzionamento e sull’analisi del contesto, il modello ICF consente di individuare i
Bisogni Educativi Speciali (BES) dell’alunno prescindendo da preclusive
tipizzazioni. In questo senso, ogni alunno, con continuità o per determinati periodi,
può presentare Bisogni Educativi Speciali: o per motivi fisici, biologici, fisiologici o
anche per motivi psicologici, sociali, rispetto ai quali è necessario che le scuole
offrano adeguata e personalizzata risposta».
Nel 2007, quindi diversi anni prima della direttiva ministeriale di cui sopra, la
Regione Piemonte emise una delibera in cui si parlava di EES (Esigenze Educative
Speciali). Successivamente, alcuni confusero i due acronimi, immaginando che
fossero la stessa cosa. In realtà i BES (Bisogni Educativi Speciali) non devono
essere intesi come una nuova categoria, ma come una macro-categoria, un
termine-ombrello che comprende al suo interno tre sottocategorie:
• la prima fascia, corrispondente alla disabilità
• la seconda fascia, riguardante i disturbi evolutivi specifici e a sua volta divisa
in DSA (Disturbi Specifici di Apprendimento) e EES (per la Regione Piemonte)
• la terza fascia, comprendente le difficoltà che nascono da uno svantaggio
socio/economico, linguistico e culturale.
Di seguito, una tabella riepilogativa aiuterà a comprendere il quadro normativo di
riferimento.

1. https://www.reteclassificazioni.it/portal_main.php?portal_view=public_custom_page&id=25

28
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 29

FASCIA NORMATIVA OGGETTO PUNTI CHIAVE


Prima L. 104/92 Legge quadro per Tratta della certificazione di disabilità e invita a una lettura
l’assistenza, l’integrazione equa dei bisogni. Il Profilo Dinamico Funzionale e il Piano
sociale e Educativo sono, per tale legge quadro fondamentale, i
i diritti delle persone momenti concreti in cui si esercita il diritto all’istruzione e
handicappate all’educazione dell’alunno con disabilità.
L. 17/1999 Integrazione e modifica Garantisce agli studenti handicappati iscritti all’università
della legge quadro 104/1992 sussidi tecnici e didattici specifici.
L. 62/2000 Norme per la parità Stabilisce che le scuole paritarie, svolgendo un servizio
scolastica e disposizioni pubblico, devono accogliere chiunque, compresi gli alunni e
sul diritto allo studio e gli studenti con handicap.
all’istruzione
DM 185 del Regolamento recante Prevede che ai fini della individuazione dell’alunno come
23/02/2006 modalità e criteri per soggetto in situazione di handicap, le Aziende Sanitarie
l’individuazione dispongano, su richiesta documentata dei genitori o degli
dell’alunno come soggetto esercenti la potestà parentale o la tutela dell’alunno, appositi
in situazione accertamenti collegiali, documentati attraverso la redazione di
di handicap un verbale che rechi l’indicazione della patologia accertata
con riferimento alle classificazioni internazionali dell’OMS.
Nota MIUR Linee guida Le direttive mirano ad innalzare il livello qualitativo degli
del sull’integrazione degli interventi formativi ed educativi sugli alunni portatori di
4/08/2009 alunni con disabilità disabilità fisiche, psichiche e sensoriali, a garanzia di una più
piena conformità ai principi dell’integrazione da parte di tutti
gli operatori nel mondo della scuola. La prima parte consta di
una panoramica sui principi generali (norma costituzionale del
diritto allo studio, DPR 275/1999, Convenzione ONU per i
diritti delle persone con disabilità, L. 18/2009) ribadendo il
modello sociale della disabilità. La seconda parte entra nelle
pratiche scolastiche, riconoscendo la responsabilità educativa
di tutto il personale della scuola e ribadendo la necessità della
corretta e puntuale progettazione individualizzata per l’alunno
con disabilità, in accordo con gli Enti Locali, l’ASL e le
famiglie. La terza parte prende in considerazione la
dimensione inclusiva della scuola: il POF è inclusivo quando
prevede nella quotidianità azioni da compiere per dare risposte
precise ad esigenze educative individuali e non concepisce
nella pratica scolastica la presenza dei disabili come un
“incidente di percorso” da affidare al docente di sostegno.
D. L.ivo Norme per la promozione Il decreto aggiorna, riorganizza e razionalizza i provvedimenti
66 del dell'inclusione scolastica vigenti in materia, tenendo conto della nuova prospettiva
13/04/2017 degli studenti con nazionale ed internazionale dell’inclusione scolastica,
disabilità riconosciuta quale identità culturale, educativa e progettuale
del sistema di istruzione e formazione in Italia.
Seconda L. 170/2010 Norme in materia di Tratta della diagnosi del disturbo, della personalizzazione e
Disturbi Specifici di relativa necessità di flessibilità. Riconosce la dislessia, la
Apprendimento in ambito disgrafia, la disortografia e la discalculia quali disturbi
scolastico specifici dell’apprendimento, “che si manifestano in presenza
di capacità cognitive adeguate, in assenza di patologie
neurologiche e di deficit sensoriali, ma [che] possono
costituire una limitazione importante per alcune attività della
vita quotidiana”. Stabilisce inoltre misure educative
e didattiche di supporto (strumenti compensativi e dispensativi). ➤

29
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 30

FASCIA NORMATIVA OGGETTO PUNTI CHIAVE


Seconda DM Linee guida per il diritto Fornisce precisazioni sulle lingue straniere, invitando le
5669/2011 allo studio degli alunni e istituzioni scolastiche ad attuare ogni strategia didattica
degli studenti con per consentire agli studenti con DSA l’apprendimento delle
Disturbi Specifici di lingue straniere (valorizzazione delle modalità attraverso
Apprendimento cui il discente meglio può esprimere le sue competenze e
dell’espressione orale, strumenti compensativi e misure
dispensative). “In sede di esami di Stato, conclusivi del
primo e del secondo ciclo di istruzione, modalità e
contenuti delle prove orali – sostitutive delle prove scritte
– sono stabiliti dalle Commissioni, sulla base della
documentazione fornita dai consigli di classe.
I candidati con DSA che superano l’esame di Stato
conseguono il titolo valido per l’iscrizione alla scuola
secondaria di secondo grado ovvero all’università. […]
Solo in casi di particolari gravità del disturbo di
apprendimento, anche in co-morbilità con altri disturbi o
patologie, risultanti dal certificato diagnostico, l’alunno o
lo studente possono – su richiesta delle famiglie e
conseguente approvazione del consiglio di classe – essere
esonerati dall’insegnamento delle lingue straniere e
seguire un percorso didattico differenziato. In sede di
esami di Stato, i candidati con DSA che hanno seguito un
percorso didattico differenziato e sono stati valutati dal
consiglio di classe con l’attribuzione di voti e di un credito
scolastico relativi unicamente allo svolgimento di tale
piano, possono sostenere prove differenziate, coerenti con
il percorso svolto, finalizzate solo al rilascio
dell’attestazione di cui all’art. 13 del DPR n. 323/1998.”

Nota MIUR Diagnosi alunni con DSA Stabilisce che gli alunni e gli studenti con diagnosi di DSA
3573 del precedente all’entrata in redatta anteriormente all’entrata in vigore della Legge 8
26/05/2011 vigore della L. 170/2010 ottobre 2010 n. 170 potranno regolarmente usufruire degli
strumenti compensativi e delle misure dispensative previsti,
sia nella normale attività didattica sia nell’ambito degli Esami
di Stato.

Dir. Min. Strumenti di intervento Delinea e precisa la strategia inclusiva della scuola italiana.
27/2012 per alunni con Bisogni Estende il campo di intervento e di responsabilità di tutta la
Educativi Speciali e comunità educante all’intera area dei Bisogni Educativi
organizzazione Speciali, comprendente: “svantaggio sociale e culturale,
territoriale per disturbi specifici di apprendimento e/o disturbi evolutivi
l’inclusione scolastica specifici, difficoltà derivanti dalla non conoscenza della
cultura e della lingua italiana perché appartenenti a culture
diverse”. Stabilisce la redazione del Piano Didattico
Personalizzato, strumento in cui si potranno includere
“progettazioni didattico-educative calibrate sui livelli
minimi attesi per le competenze in uscita, e strumenti
programmatici utili in maggior misura rispetto a
compensazioni o dispense”.

30
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 31

FASCIA NORMATIVA OGGETTO PUNTI CHIAVE


Seconda CM 8/2013 Indicazioni operative Ribadisce il nucleo fondante della Direttiva, aggiungendo che
(esplicativa alunni con BES per gli alunni in possesso di una diagnosi di DSA rilasciata da
della DM una struttura privata, si devono adottare le misure della 170
27/2012) nelle more del rilascio della certificazione da parte di
strutture sanitarie pubbliche o accreditate. Richiama inoltre
l’attenzione sul fatto che ogni alunno può manifestare
Bisogni Educativi Speciali anche in modo temporaneo e che
essi devono essere suffragati da elementi oggettivi. Per gli
alunni stranieri è possibile attivare percorsi individualizzati
e personalizzati, nonché strumenti compensativi e
dispensativi. Rammenta infine che le due ore di
insegnamento della seconda lingua comunitaria nella
secondaria di primo grado possono essere utilizzate per
potenziare l’insegnamento della lingua italiana.

Nota MIUR Strumenti di intervento Richiama l’attenzione sulla distinzione tra ordinarie difficoltà
2563 del per alunni con Bisogni di apprendimento, gravi difficoltà e disturbi di
22/11/2013 Educativi Speciali. apprendimento che hanno carattere permanente e base
Chiarimenti neurobiologica. La scuola può intervenire nella
personalizzazione in tanti modi diversi, informali o
strutturati, secondo i bisogni e la convenienza; pertanto la
rilevazione di una mera difficoltà di apprendimento non
dovrebbe indurre all’attivazione di un percorso specifico con
la conseguente compilazione di un Piano Didattico
Personalizzato.

Terza Dir. Min. Strumenti di intervento Identifica l’area dello svantaggio, e chiarisce la responsabilità
27/2012 per alunni con Bisogni pedagogico-didattica versus delega biomedica: “[o]ve non sia
Educativi Speciali e presente certificazione clinica o diagnosi, il consiglio di
organizzazione classe o il team dei docenti motiveranno opportunamente,
territoriale per verbalizzandole, le decisioni assunte sulla base di ben
l’inclusione scolastica fondate considerazioni pedagogiche e didattiche;
ciò al fine di evitare contenzioso.” (CM 6/03/13).
Vedi sopra.

CM 8/2013 Indicazioni operative Vedi sopra.


alunni con BES

Nota MIUR Strumenti di intervento Vedi sopra.


2563 del per alunni con Bisogni
22/11/2013 Educativi Speciali.
Chiarimenti

31
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 32

1.3 Bisogni Educativi Speciali: inquadramento scolastico


Per cercare di semplificare quanto attiene ai Bisogni Educativi Speciali, seguono un paio
di tabelle riepilogative circa le varie tipologie, i vari gruppi/organi interessati e gli
adempimenti didattico-burocratici che vedono il coinvolgimento del consiglio di classe a
tutela del diritto allo studio e all’inclusione di tutti gli studenti.

BISOGNI EDUCATIVI SPECIALI (BES)


FASCIA Prima Seconda Terza

DEFINIZIONE Disabilità Disturbi evolutivi specifici Svantaggio socio-economico,


linguistico, culturale

CERTIFICAZIONE Sì No No

DIAGNOSI2 Sì Sì No

TIPOLOGIE • Minorati psicofisici EES • Difficoltà derivanti da


• Minorati vista Esigenze Educative elementi oggettivi
• Minorati udito Speciali (segnalazione servizi
• Disturbi del linguaggio sociali, per esempio)
• Disturbi delle abilità non oppure
verbali (disturbo
• Fondate considerazioni
visuospaziale)
psico-pedagogiche e
• Disturbi della didattiche rilevate dal
coordinazione motoria/ Consiglio di Classe
disprassia
• Disturbi da deficit di
attenzione/iperattività
(ADHD)3
• Disturbo
da comportamento
dirompente
• Disturbi d’ansia,
disturbi dell’umore
• Disturbo evolutivo
specifico misto4
• Funzionamento
cognitivo limite
(o borderline)

2. La diagnosi deve essere a cura delle ASL (o dalle Aziende Ospedaliere e Universitarie e dalle IRCSS, ossia Istituti di Ricovero e Cura a Carattere
Scientifico) o di un medico privato in attesa di quella dell’ente pubblico.
3. Nel caso di alunni con iperattività all’interno di un quadro clinico grave, anche per co-morbilità con altre patologie, può venire assegnato il docente
di sostegno.
4. Qualora sia lieve e non rientri nelle previsioni della L. 104/1992.

32
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 33

DSA
Disturbi Specifici
dell’Apprendimento
• Dislessia (disturbo che
impedisce la decodificazione
del testo scritto)
• Disortografia (disturbo
specifico della scrittura che
riguarda l’ortografia)
• Discalculia (disturbo
che riguarda il sistema
numerico e i calcoli)
• Disgrafia (disturbo
specifico della scrittura che
riguarda il tratto grafico)

DIRITTI • Insegnante di sostegno • Personalizzazione del • Personalizzazione del


• PEI percorso di studio percorso di studio

DOCUMENTAZIONE PEI (Piano Educativo PDP (Piano Didattico PDP (Piano Didattico
DA PRODURRE Individualizzato): Personalizzato): documento Personalizzato): documento non
DA PARTE documento obbligatorio obbligatorio redatto dal obbligatorio ma consigliato
DEL CONSIGLIO (redatto congiuntamente consiglio di classe entro tre redatto dal consiglio di classe
DI CLASSE dalla scuola e dai servizi mesi dalla ricezione della entro tre mesi dalla ricezione di
socio-sanitari che hanno in diagnosi da parte dell’istituto. eventuali relazioni di esperti
carico l’alunno in Include: da parte dell’istituto o dalla
collaborazione con la – la tipologia del disturbo rilevazione dell’area di
famiglia) e parte integrante – le attività didattiche svantaggio. Include:
della programmazione personalizzate – la problematica rilevata
educativo-didattica di classe. – gli strumenti compensativi – le attività didattiche
Le azioni definite nel PEI – le misure dispensative personalizzate
sono coerenti con le – le modalità di verifica e – gli strumenti compensativi
indicazioni espresse nella valutazione personalizzate – le misure dispensative
Diagnosi Funzionale e nel e comprende tutti i supporti e – le modalità di verifica e
Profilo Educativo Funzionale le strategie che possono portare valutazione personalizzate
(documenti predisposti dalla al successo formativo e comprende tutti i supporti e
Neuro-psichiatria Infantile) e dell’alunno. Le azioni in esso le strategie che possono portare
descrivono annualmente: definite devono essere al successo formativo dell’alunno.
– obiettivi educativi e didattici coerenti con le indicazioni Deve tenere conto di eventuali
– metodi e criteri di espresse nella diagnosi relazioni cliniche, di esperti o
valutazione. consegnata alla scuola. educatori consegnate alla scuola.

TITOLI DI • Attestato di credito • Diploma • Diploma


STUDIO formativo, nel caso di • Attestazione, nel caso
CONSEGUIBILI allievo con percorso di studenti DSA con
AL didattico differenziato (art. esonero totale delle
TERMINE DELLA 13, DPR 323/98) lingue straniere5
SCUOLA • Diploma, nel caso di allievo
SECONDARIA con programma ad obiettivi
SUPERIORE differenziati (DPR 323/98)

5. Vedi tabella normativa, DM 5669/2011.

33
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 34

ACRONIMO SIGNIFICATO NORMA FUNZIONE


CTS Centri CM 6/03/13 Interfaccia fra l’Amministrazione e le scuole, e tra le scuole
Territoriali di stesse e rete di supporto al processo di integrazione, allo
Supporto sviluppo professionale dei docenti e alla diffusione delle
migliori pratiche.

CTI Centri L. 35/2012 Definire, per ciascuna istituzione scolastica, “un organico per
Territoriali per l’autonomia, funzionale all’ordinaria attività didattica,
l’Inclusione educativa, amministrativa, tecnica e ausiliaria, alle esigenze
di sviluppo delle eccellenze, di recupero, di integrazione e
sostegno agli alunni con bisogni speciali e di programmazione
dei fabbisogni di personale”. Si occupano anche della
costituzione di reti di scuole, della prevenzione dell’abbandono
scolastico e di contrasto alla dispersione scolastica e formativa
e al bullismo.

GLI Gruppo di Lavoro Istituito dalla Rilevazione dei BES presenti nella scuola, raccolta e
per l’Inclusione L. 104/92 e documentazione degli interventi didattico-educativi posti in
ripreso nella essere; focus/confronto sui casi, consulenza e supporto ai
CM 8/2013 colleghi sulle strategie e metodologie di gestione delle classi;
rilevazione, monitoraggio e valutazione del livello di inclusività
della scuola; raccolta e coordinamento delle proposte formulate
dai singoli GLHI.

GLIP o GLH Gruppo Istituito dalla Il GLIP è composto da operatori della scuola e delle altre
di Lavoro L. 104/92 e Istituzioni che operano sul territorio. Svolge funzioni di
Interistituzionale definito nel consulenza alle scuole per quanto riguarda l’integrazione
e Provinciale DM 216/1992 e promuove la piena attuazione del diritto allo studio.

GLHI o GLIS Gruppo L. 104/92, Consulenza e proposta al Dirigente scolastico regionale e alle
di Lavoro art. 15 singole scuole, collaborazione con enti locali e unità sanitarie
e di Studio locali per la conclusione e la verifica dell’esecuzione degli
d’Istituto accordi di programma per l’impostazione e l’attuazione dei piani
educativi individualizzati, nonché per qualsiasi altra attività
inerente all’integrazione degli alunni in difficoltà di apprendimento.

GLHO Gruppo di Lavoro L. 104/92 Per ogni alunno con disabilità certificata, in genere, viene
per l’Handicap costituita un’equipe di lavoro, composta dal Dirigente scolastico,
Operativo da almeno un rappresentante degli insegnanti di classe,
dall’insegnante specializzato sul sostegno, dall’assistente
educatore eventualmente presente, dagli operatori della ASL o
ente privato convenzionato che si occupano del caso, dai genitori
o dai facenti funzione e da qualunque altra figura significativa che
operi nei confronti dell’alunno. Per esercitare le sue funzioni di
competenza, il gruppo elabora il Profilo Dinamico Funzionale e
formula il Piano Educativo Individualizzato.

PAI Piano Istituito dalla Formulare, da parte del GLI, un’ipotesi globale di utilizzo
Annuale per L. 122/2010 funzionale delle risorse specifiche, istituzionali e non, per
l’Inclusività incrementare il livello di inclusività generale della scuola.
È riferito a tutti gli alunni con BES e si deve redigere al termine
di ogni anno scolastico.

34
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 35

2. DISLESSIA, DIDATTICA E INGLESE

2.1 Dislessia: una breve analisi


La dislessia non è una malattia, ma una neuro-diversità, cioè uno sviluppo neurologico
atipico che è espressione della varianza della popolazione. Lo sviluppo atipico interessa i
processi di apprendimento impliciti che non sono facilmente identificabili in maniera
isolata e che partecipano alla costruzione dei macro-apprendimenti, tra cui quelli scolastici.
La Classificazione internazionale ICD101 (International Statistical Classification of Diseases
and Related Health Problems) dell’Organizzazione Mondiale della Sanità registra i disturbi
specifici di apprendimento nell’asse F81. Si tratta di disturbi evolutivi specifici delle abilità
scolastiche, disordini in cui le normali modalità di acquisizione delle competenze sono
disturbate fin dai primi stadi di sviluppo. Ciò, però, non in diretta conseguenza di una
mancata opportunità di apprendimento, non come risultato di un ritardo mentale e non in
conseguenza di alcuna forma di trauma cerebrale o di deficit.
Tali disturbi, che possono occorrere tutti insieme perché vi è spesso comorbilità, sono:

F81.0 – Disturbo specifico della lettura


F81.1 – Disturbo specifico della compitazione
F81.2 – Disturbo specifico delle abilità aritmetiche
F81.3 – Disturbi misti delle abilità scolastiche
F81.8 – Altri disturbi evolutivi delle abilità scolastiche
F81.9 – Disordine evolutivo di abilità scolastiche non meglio specificato.

Leggere vuol dire decodificare, ossia dover fare continue traduzioni, ma se la


corrispondenza tra grafemi e fonemi non è stabilizzata, come nel caso della dislessia, le
lettere vengono invertite, le desinenze dimenticate, la frase
“Whatyouthinkdyslexialookslike” diventa “whatewtinhkdyxlesiaklooslke”. La metafora che
si usa più frequentemente è quella delle lettere che galleggiano2.
Lo sviluppo delle tecniche di neuroimaging ha dato un contributo notevole alla ricerca
sulla dislessia, arrivando a identificare un’elaborazione fonologica disfunzionale dei
soggetti nella regione perisilviana, ossia tutta l’area intorno alla scissura laterale fra il lobo
temporale e il lobo parietale. Sulla base dei risultati delle ricerche condotte sui task di
discriminazione visiva, i sostenitori di tale ipotesi ritengono che le difficoltà correlate alla
dislessia si manifestino a causa di una impossibilità di filtrare contemporaneamente i vari
input e, pertanto, a categorizzare le informazioni in modo da distinguere i dati sensoriali
importanti da quelli meno rilevanti.
Alternativa a tale ipotesi è quella del deficit fonologico, la Rapid auditory processing
theory, in base alla quale il deficit principale risiede nella percezione di brevi e rapidi suoni

1. Cfr. http://www.who.int/classifications/apps/icd/icd10online/
2. Si consiglia la visione del seguente filmato: http://indy100.independent.co.uk/article/this-website-shows-what-its-like-to-
read-when-you-have-dyslexia—bkvKwiQlJW

35
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 36

e nella valutazione dell’ordine temporale, fenomeno che spiegherebbe la difficoltà nel


percepire, decodificare o riprodurre i suoni nella giusta posizione.
Per quanto concerne l’apprendimento della lingua inglese, si è sviluppato un filone di
ricerche su studenti di nazionalità diverse che ha messo in luce come, nelle lingue in cui la
dimensione grafica e quella fonetica è “trasparente”3, l’incidenza delle difficoltà
fonologiche derivanti dalla dislessia sia inferiore.
Secondo tali ricerche, tre fattori principali concorrono allo sviluppo delle attività di
lettura. Il primo è costituito dalla disponibilità di diverse unità fonologiche pre-esistenti
alla lettura; il secondo è rappresentato dalla coerenza nelle associazioni tra dimensione
fonetica e dimensione grafica; il terzo è la granularity, per cui il numero di unità
ortografiche da imparare è maggiore del numero di unità fonologiche utilizzate. Un
sistema viene considerato completamente trasparente quando a ogni suono corrisponde
un segno, cioè, nei sistemi cosiddetti alfabetici, quando a ogni fonema corrisponde una
lettera (rapporto 1:1). Il grado di trasparenza si riduce quando la trascrizione ortografica
di un fonema richiede più di una lettera e il rapporto fra fonemi e lettere non è più 1:1,
ma diventa 1:2, come, per esempio, per il fonema che si riproduce con 2 lettere (il
digramma GN in italiano, per esempio). Questa differenza di “granularità” dipende dalla
difformità fra il numero di fonemi di una lingua e il numero di lettere di ciascun alfabeto.
Per esempio, per l’italiano ci sono circa 30 fonemi, che devono essere trascritti con 21
lettere, anche se nella pratica sono utilizzate altre 5 lettere di origine non-latina (j, k, w,
x, y). Il grado di trasparenza non può quindi essere perfetto perché il numero di lettere
dovrebbe essere uguale a quello dei fonemi, tuttavia non c’è paragone con la lingua
inglese: la regolarità dell’italiano è notevolmente maggiore di quella della lingua inglese,
che ha circa 44 fonemi, ma solo 26 lettere a disposizione per la loro trascrizione.
Sulla base di questo criterio, è stata costruita la teoria della dimensione della granularità
in base alla quale:
• nei sistemi ortografici ad alta regolarità la scrittura viene acquisita in tempi più rapidi;
• nei sistemi regolari la didattica di insegnamento della lettura e della scrittura più consona è
quella sillabico/alfabetica, in quanto la segmentazione e la fusione fonemica risultano
molto facili e si prestano a una transcodifica assemblativa (il metodo fonico-sillabico);
• nei sistemi regolari sia la lettura sia la scrittura vengono acquisite in tempi più rapidi
che nei sistemi meno regolari;
• i bambini che imparano con i sistemi regolari commettono meno errori ortografici e di lettura
di quelli che apprendono un sistema ortografico irregolare come quello inglese.

Secondo tale approccio, la lettura dipenderebbe quindi dall’astrazione di mappe ottimali


tra unità grafiche e fonologiche della lingua e l’organizzazione lessicale, così come le
strategie che servono a processare le parole al fine di leggere sarebbero fortemente
influenzate dai limiti imposti dai diversi sistemi di scrittura. L’apprendimento di una lingua
seconda, inoltre, non è inconscio come quello della lingua madre quindi non vi è solo la
difficoltà dell’aspetto decifrativo, ma anche quello della fatica cosciente richiesta che è

3. V. Introduzione, p. 27.

36
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 37

necessaria per apprendere una seconda lingua, come l’inglese, con divergenze notevoli ma
non omogenee e regolari tra pronuncia e resa grafica.
La letteratura scientifica attesta che le abilità di codifica (produzione in forma scritta e
orale) e decodifica (comprensione di forme scritte e orali) richieste e quelle necessarie per
processare l’aspetto fonologico-ortografico hanno bisogno di una motivazione molto forte che,
nel caso dei dislessici, può essere pregiudicata dal basso livello di successo percepito e che
quindi deve essere accresciuta con stimoli che rendano piacevole un apprendimento così ostico.

2.2 Dislessia: le difficoltà principali


Si elencano ora una serie di difficoltà che possono presentare gli studenti dislessici, con
l’avvertenza, tuttavia, che esse potrebbero essere presenti solo in parte o solo in alcuni, o
che, ancora, potrebbero essere già state compensate nell’età che qui si prende in
considerazione (ossia quella degli alunni della scuola secondaria di primo e secondo
grado), poiché gli alunni dislessici non rappresentano una popolazione scolastica
omogenea – li accomuna la difficoltà di lettura, ma le differenze soggettive possono essere
decisamente consistenti:
• lentezza nell’apprendere e nello stabilizzare la corrispondenza tra le lettere e i suoni
nella lingua straniera
• difficoltà con parole funzionali (preposizioni, congiunzioni, ecc.)
• tendenza a non ricordare le elencazioni (nomi, cose, numeri, ecc.), specie se in sequenza
• la comprensione in lettura potrebbe essere compromessa per via della poca accuratezza,
velocità e scorrevolezza di lettura
• difficoltà nell’indicare destra o sinistra, l’ordine dei giorni della settimana, dei mesi, ecc.
• difficoltà nella sintassi e nella punteggiatura
• difficoltà a riassumere e a sintetizzare
• difficoltà a prendere appunti o a copiare dalla lavagna
• difficoltà nell’uso del dizionario
• lentezza nel rispondere alle domande, soprattutto quelle aperte che richiedono una
risposta articolata
• lentezza nel memorizzare.

In particolare, in inglese, i problemi di decodifica più frequenti sono:


• il cosiddetto spoonerism, ossia lo scambio di iniziali di due termini, ad esempio: fips
and chish per fish and chips
• d per b, ad esempio dog al posto di bog
• confusione tra m e w
• parole lette al contrario (tip per pit)
• parole scambiate (home per house)
• confusione tra sequenze di lettere (ad esempio soiled per solid; left per felt)
• spelling incoerente: dolls/dols, thanks/thinks, natulal/natural
• conversione fonema/grafema: ajsrink (icerink), distroyd (destroyed)
• addizione/sottrazione di lettere: ekspresioning (expressing), stoy (story)
• scelte non interpretabili: witol (vehicle), endangires (endangered).

37
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 38

2.3 Qualche suggerimento operativo di facile attuazione


STRUMENTI COMPENSATIVI
• Uso di organizzatori anticipati per gli argomenti complessi, ossia schemi o mappe
• Possibilità di registrare le lezioni per uso personale
• Possibilità di usare il computer o il tablet
• Uso dei programmi di sintesi vocale
• Uso di dizionari elettronici
• Uso di calcolatrice, formulari e tabelle
• Uso di programmi di videoscrittura con correttori automatici

MISURE DISPENSATIVE
• Dispensa dalla lettura ad alta voce
• Dispensa dallo scrivere sotto dettatura
• Dispensa dal prendere appunti
• Dispensa dal copiare dalla lavagna
• Dispensa dalla scrittura alla lavagna
• Dispensa dallo studio mnemonico (es. poesie, forme verbali, sequenze…)
• Dispensa di un eccessivo carico di compiti con riadattamento e riduzione delle pagine
da studiare mantenendo gli stessi obiettivi

VERIFICHE E VALUTAZIONI
• Interrogazioni programmate e/o concordate
• Dispensa dalle prove scritte in lingua straniera
• Prove orali equipollenti in sostituzione delle prove scritte
• Utilizzo di schemi/mappe/formulari durante le verifiche scritte
• Utilizzo di schemi/mappe/formulari durante le verifiche orali
• Valutazione attenta più ai contenuti che alla forma
• Diminuzione del numero di item per esercizio
• Tempi più lunghi nelle verifiche scritte
• Verifiche su porzioni ridotte di programma
• Utilizzo prevalente di domanda a risposta chiusa
• Lettura delle consegne degli esercizi
• Fornitura delle prove su supporto digitalizzato
• Consegne in italiano delle verifiche di lingua straniera
• Peso maggiore delle verifiche orali rispetto alle prove scritte di lingua straniera
• Tempi più lunghi ai fini del recupero
• Possibilità di utilizzare il dizionario bilingue cartaceo o su supporto informatico

38
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 39

LEZIONI
• Chiarire esplicitamente il piano della lezione e, a ogni passaggio a fase successiva,
ricordare il piano
• Se si usa la LIM o un proiettore, fornire alla fine della lezione i file allo studente
• Prevedere esercizi di discriminazione fonologica (ad esempio distinzione tra fonemi
dell’inglese che in italiano non hanno valore distintivo /n/ e /ŋ/)
• Ricordarsi di spiegare agli studenti che per motivi storici la lingua inglese è molto “opaca”
e quindi…
– Una lettera, diversi fonemi: that’s the problem!
O → 17 fonemi
A → 10 fonemi
E → 9 fonemi
– Una lettera → nessun fonema
gave, castle, subtle
– Un grafema multi-lettera → diversi fonemi
EA → lead, meadow, sea
– Grafemi diversi → uno stesso fonema
Be, chief, key
– Omografi non omofoni
Pear/pair
– Omofoni non omografi
Right, rite, wright, write

Quest’ultimo è un problema per tutti gli apprendenti, non solo per i dislessici.
Sottolineare le difficoltà dovute alla scarsa “trasparenza” della lingua è molto importante,
così come far conoscere agli studenti le seguenti percentuali di errori nella decifrazione
delle parole al termine del primo anno di scolarità nel Regno Unito rispetto agli altri paesi
europei la cui lingua è più “trasparente”:
Regno Unito: 67% – Germania: 7% – Spagna: 6% – Italia: 5%

2.4 Qualche accorgimento nella didattica quotidiana


Spesso, purtroppo, nonostante i numerosi corsi di aggiornamento e le pubblicazioni su
questo argomento – per tacere dell’ottimo e corposo materiale pubblicato online e
dell’impegno dell’Associazione Italiana Dislessia – l’associazione tra dislessia e pigrizia è
ancora molto frequente.
Gli studenti affetti da tale disturbo, talvolta, oltre a essere visti come problematici e
trattati con malcelata insofferenza, vengono anche definiti svogliati, a riprova del fatto che
il misoneismo – ossia il timore di ciò che è nuovo e scardina, o anche solo intacca,
abitudini e stili di insegnamento, convincimenti e mode didattiche – è ancora molto
diffuso.

39
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 40

Limitarsi infatti ad applicare misure compensative e dispensative in modo meccanico,


senza invece pensare a una didattica inclusiva ad ampio raggio, per poi concludere che
sono gli studenti DSA a non voler vedere applicate le misure o le strategie suggerite, non è
forse la strada migliore da intraprendere per chi ha a cuore i propri studenti.
Sapere di dover svolgere la verifica in modo diverso dagli altri, per esempio, molte volte
spinge gli adolescenti a non avvalersi delle misure compensative e dispensative proposte
perché vengono intese come marcatori di differenza. Usare il tablet o un notebook quando i
compagni usano il foglio protocollo, non è concepito come una strategia strumentale
equiparabile a mettersi gli occhiali se non si vede la lavagna. E queste differenze, seppur
minime, possono avere conseguenze serie per gli apprendenti.
Come osserva Giacomo Stella4: “Alla scuola superiore il problema viene accentuato
dal rifiuto da parte degli studenti di utilizzare strumenti compensativi e misure
dispensative per non essere identificati come ‘diversi’”. Quindi, oltre ai fattori di rischio
di insuccesso, ci sono anche fattori di rischio psicosociale e psicopatologico. “Ci
vorrebbe”, sempre secondo Stella, “una scuola completamente diversa, basata
sull’apprendimento e non sull’insegnamento. Questo significa non valutare unicamente le
risposte alle nozioni, ma far crescere gli studenti agendo sulle loro potenzialità, senza
diversificare chi necessita di computer o di tavola pitagorica da chi non ne ha la
necessità. Inoltre, è necessario un nuovo contratto educativo in cui ciascuno viene
riconosciuto per quello che può dare e superare, almeno alla primaria, l’attuale modello
classificatorio. È importante una scuola senza compiti, ma con attività di potenziamento
e di allenamento diversificate condotte all’interno della scuola, anche se affidate ad
agenzie diverse. Insomma, una scuola amica che consideri l’apprendimento
un’opportunità per tutti e non una punizione per alcuni.”
Chi vive quotidianamente la realtà scolastica, che si sa essere fatta non solo di didattica
ma anche di burocrazia, edilizia, sicurezza, arredi e programmazioni talvolta eccessivi e/o
inadeguati, potrà considerare quanto sopra utopico, se non la solita aria fritta, ma, come si
spera di poter dimostrare con alcuni esempi, basta estendere alcuni accorgimenti a tutta la
classe per creare un ambiente inclusivo a costo zero.
La dislessia, da “problema” che affatica la vita dei docenti e la riempie di ulteriori e
lunghi documenti e doppi lavori, che stigmatizza gli studenti in “diversi” e “difficili”, può
trasformarsi in “opportunità”, occasione di dare una svolta al proprio metodo di
insegnamento, riuscendo finalmente a trasformare la propria didattica, talvolta cattedratica,
monodiscente e frontale, in una didattica più personalizzata, ricca e coinvolgente, a misura
di ogni studente.
Gli accorgimenti che seguono tengono anche conto delle differenze tra le difficoltà di
apprendimento nella scuola primaria e in adolescenza, momento nel quale il problema è

4. Professore ordinario di Psicologia clinica all’Università di Modena e Reggio Emilia, fondatore dell’Associazione Italiana
Dislessia, membro del comitato tecnico-scientifico per l’attuazione della legge 170 e del comitato promotore per il panel di
aggiornamento e revisione della Consensus conference sui DSA, direttore scientifico della rete di centri clinici S.O.S. Dislessia
per diagnosi e rieducazione dei DSA e di I.RI.DE, Istituto di Ricerca sulla dislessia evolutiva. Citazione tratta da
http://www.sardegnamedicina.it/content/dislessia-e-dsa-sotto-la-lente-di-giacomo-stella.

40
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 41

più della memoria di lavoro che non nelle difficoltà di letto-scrittura, ossia la capacità di
mantenere in mente e manipolare le informazioni per un breve periodo di tempo.
Essa è implicata in molteplici attività della vita quotidiana, come farsi la cartella e capire
informazioni stradali, ma anche nell’attività scolastica, come ripetere una parola in una
lingua straniera e memorizzare consegne complesse. Infatti, il recupero delle informazioni
a lungo termine che opera quando l’insegnante spiega e lo studente ascolta oppure legge e
prende appunti, interviene nell’organizzazione del discorso e nella comprensione del testo.
Se si producono enunciati troppo complessi, si sollecita in modo eccessivo la memoria di
lavoro, perché non si riesce a mantenere il collegamento tra l’inizio dell’enunciato e la fine,
il che è necessario al fine dell’apprendimento.
Un esempio molto facile da capire è quello delle indicazioni stradali: “Svolta alla prima
a destra e poi di nuovo a sinistra in corrispondenza del semaforo di fronte alla farmacia,
poi procedi sempre dritto e, dopo aver oltrepassato alla tua destra il tabaccaio, svolta a
destra e in corrispondenza della rotonda…”. Questo tipo di informazione, nella vita reale,
sarebbe interrotta dall’interlocutore con DSA che deciderebbe di chiedere la ripetizione
della sequenza già dalla prima svolta oppure di affidarsi a un navigatore. In classe ciò non
è possibile, ecco quindi che una modalità diversa di trasmettere i contenuti può essere
risolutiva, poiché è il sovraccarico di informazione nella memoria che porta lo studente
DSA a distrarsi e a cancellare anche le poche informazioni trattenute.
Nella scuola, spesso, il problema della memoria di lavoro non viene identificato, ma
attribuito a scarsa attenzione5. Una capacità di memoria di lavoro inefficiente impedisce di
manipolare le informazioni. Una semplice verifica per rendersi conto del problema
potrebbe essere quella di far ripetere in ordine inverso sequenze di numeri o parole. A
sviluppo di memoria terminato, ossia a 15 anni, si dovrebbe essere in grado di ricordare tra
le 5 e le 6 parole dette in sequenza.

Accorgimento 1: abbassare il filtro affettivo


Secondo il celebre linguista statunitense Stephen Krashen, per acquisire una nozione è
necessario che non sia inserito il filtro affettivo, altrimenti ciò che si comprende viene
collocato nella memoria a breve termine e non diventa acquisizione stabile e definitiva.
Nelle situazioni di sfida piacevole, nella convinzione di poter riuscire, l’organismo
rilascia neurotrasmettitori (come la noroadrenalina) necessari per fissare la “traccia
mnestica”, ossia per fare proprio l’input che viene recepito, mentre in stato di paura e
stress si produce uno steroide che blocca la noradrenalina e fa andare in conflitto
l’amigdala – la ghiandola “emotiva” che vuole difendere la mente da eventi spiacevoli – e
l’ippocampo – la ghiandola che invece ha un ruolo attivo nell’attivare i lobi frontali e
iniziare la memorizzazione.
Il filtro affettivo è dunque un preciso meccanismo di autodifesa che viene attivato da
stati di ansia e condiziona negativamente il passaggio dei dati. In sostanza, lo stato

5. G. Stella, La dislessia in adolescenza, in https://www.youtube.com/watch?v=iiGNykzaAPI

41
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 42

emozionale del soggetto, causato dall’ansia di fronte al compito, può favorire o impedire
l’elaborazione mentale di ciò che sente: in presenza di un filtro affettivo attivato non si può
avere acquisizione, ma solo apprendimento.
Le modalità e l’intensità attraverso le quali il filtro agisce sull’apprendimento del
soggetto dipendono dalle sue caratteristiche personali, ma anche e, in alcuni casi
soprattutto, da come l’ambiente è in grado di “leggere” e di soddisfare le sue motivazioni
profonde in relazione ai contenuti da apprendere, e di come questo possa procurare al
soggetto benessere emozionale, in quanto “lo stato mentale rilassato dello studente […]
aumenta la recettività verso la nuova materia”6.
La soluzione dunque è quella di non far innescare tale filtro affettivo, solitamente
attivato da:
• stati di ansia: ad esempio, un dettato autocorretto non è ansiogeno, ma solo una sfida
con se stessi, mentre un dettato che poi viene corretto dall’insegnante crea ansia;
• attività che pongono a rischio l’immagine di sé che lo studente vuole offrire al resto
della classe: ad esempio, chiedere a uno studente di parlare o dialogare in lingua
straniera prima che egli si senta sicuro di riuscirci;
• attività che minano l’autostima: per esempio, la procedura cloze (tecniche di incastro),
gli esercizi in cui occorre rimettere in ordine le parole e gli esercizi in cui si deve trovare
un sinonimo sono attività che pongono lo studente di fronte alla propria capacità di
problem solving, che può parere inadeguata;
• attività che provocano la sensazione di non essere in grado di apprendere: ad
esempio, le attività di comprensione che aprono un’unità d’apprendimento devono
facilitare al massimo il primo contatto con un nuovo testo in lingua straniera,
evitando l’inserimento del filtro affettivo7. Un accorgimento quindi potrebbe essere
quello di scegliere testi di questo tipo in modo da alzare il livello di autostima.

Quanto elencato non si riferisce esclusivamente a studenti con BES, si può dunque
facilmente cogliere come la dislessia possa concorrere a moltiplicare gli stati d’ansia di
fronte a una qualsiasi attività di apprendimento.
La chiave è, forse, aiutare chi la dislessia non ce l’ha, ossia rendere i docenti
consapevoli che la didattica trasmissiva e gli esercizi di cui sopra escludono e non
includono, e spingerli a chiedersi se abbassare il filtro affettivo non giovi a tutta la classe e
non solo ai dislessici.

Accorgimento 2: multisensorialità
Come già accennato, occorre puntare sulla motivazione e su strategie didattiche
appropriate, come l’approccio multisensoriale, per esempio, il cui principio fondante è che
“gli studenti percepiscono l’input linguistico mediante il ricorso a più di un canale

6. Cfr. P. E. Balboni, Le sfide di Babele. Insegnare le lingue nelle società complesse, UTET, 2012, p. 39.
7. Ibidem, p. 40.

42
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 43

sensoriale, facendo sì che si realizzi simultaneamente un’elaborazione visiva, uditiva, e


tattile-cinestetica dell’informazione”8.
Scrivere e pronunciare le nuove parole sollecitando l’associazione a un simbolo visivo,
compitare le parole ad alta voce, far percepire che quando si pronuncia la lettera “h” in
inglese si emette dell’aria (espirazione) che ad esempio sposta una pallina di carta che
l’insegnante tiene in mano, aiuta ad associare struttura grafica, pronuncia e significato della
parole.
Trasformare la classe in un laboratorio multisensoriale o poter disporre di un laboratorio
linguistico sarebbe l’optimum, ma, partendo da ipotesi più realistiche e cioè che non sia
possibile accedere ad un siffatto laboratorio, che non vi sia una LIM in classe, né un
proiettore collegato a un computer, si può chiedere agli studenti di portare i loro apparecchi
in base alla nota strategia BYOD (Bring Your Own Device) oppure almeno reperire delle
casse per il PC d’aula.

Accorgimento 3: flessibilità e clima relazionale positivo


Un’altra parola chiave è flessibilità, perché non esiste un alunno dislessico standard e
spesso vi è un disturbo misto: si tratta quindi di trovare insieme allo studente strategie
diverse che vanno adattate di volta in volta.
Ogni insegnante di lingua inglese conosce molto bene quale sia il ciclo di
apprendimento delle lingue straniere: comprehension-assimilation-production. Tuttavia,
talvolta non attribuiamo abbastanza valore all’aspetto della ricezione-comprensione,
tendendo a darlo quasi per scontato. Ciò capita soprattutto con l’inglese, sia perché è la più
romanza tra le lingue germaniche, sia perché nel registro formale annovera molti termini di
derivazione greca o latina che la maggior parte degli studenti italiani non ha eccessiva
difficoltà a comprendere. Valorizzare la comprensione del testo e non sottovalutarla
potrebbe aiutare gli studenti ad elevare il livello di autostima e a rafforzare la fiducia nelle
proprie abilità di comprensione, anche se si tratta di testi puramente referenziali, in questo
modo affronterebbero con meno timore testi in cui abbondano verbi fraseologici, figure
retoriche, polirematiche e proverbi.
Flessibilità significa anche non procedere per tappe forzate, ma privilegiare le attività in
cui gli studenti riescono meglio in modo da trarre gratificazione da ciò che fanno.
Alcuni suggerimenti potrebbero essere:
• contestualizzare sempre i vocaboli anche rispetto a campi semantici vicini agli interessi
dei ragazzi, come la musica, il calcio, la danza, per esempio, e rinunciare a un paragrafo
del libro su una corrente letteraria o su un autore
• parlare di un autore raccontando aneddoti sulla sua vita privata che attirino l’attenzione
degli studenti
• dire che Shakespeare non sapeva scrivere il proprio cognome e lo scriveva in modi
sempre diversi

8. P. Aiello et alii, “Dislessia e complessità didattica della lingua inglese nei contesti scolastici italiani: proposta di un approccio
multisensoriale ed interattivo” in Italian Journal of Special Education for Inclusion, anno I, n. 2, 2013, p. 113.

43
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 44

• raccontare le difficoltà che avevano a scuola letterati di primo piano, e, soprattutto,


raccontare le proprie difficoltà di quando eravate voi gli studenti
• non aver paura di usare l’italiano per attirare l’attenzione: se gli studenti non capiscono,
si distraggono, pensano che l’inglese sia troppo difficile e assumono atteggiamenti
rinunciatari
• usare colori per le parole chiave
• usare lo stampatello e chiedere se capiscono, o scusarsi per la propria brutta grafia sono
strategie che non costano niente e migliorano la relazione tra docenti e studenti,
permettendo agli alunni dislessici di capire le parole meglio senza rivolgersi al
compagno di banco
• sorridere, chiedere agli studenti come stanno, come si sentono, soprattutto se ci si rende
conto che è successo qualcosa che li ha rattristati o agitati nell’ora precedente e
rinunciare a spiegare quello che ci si era prefissi o a interrogare o a svolgere la verifica
scritta è un esempio di flessibilità che influisce molto positivamente sull’aspetto
emotivo-motivazionale, perché gli studenti associano inevitabilmente il docente alla
materia e se il docente li considera persone e non secchi da riempire – per citare la
celebre metafora di Yeats9 – la fiamma prima o poi si accenderà
• lodarli: gli insegnanti madrelingua dicono continuamente “good” o “excellent”: è una
buona tecnica motivazionale
• mimate: mettetevi sotto la cattedra se dovete spiegare “under”o fate cadere una biro per
spiegare “to drop”: oltre a catturare la loro attenzione innescherete un altro canale di
riconoscimento del nuovo vocabolo.
Liberate la vostra fantasia: in fondo le indicazioni nazionali stesse sottolineano
l’importanza di programmare un’azione educativa che tenga in considerazione
principalmente le risorse dell’individuo, puntando su un’accoglienza educativa che gli
permetta di affrontare con serenità le attività richieste.

Accorgimento 4: lavori di gruppo o di coppia e cooperative learning


Lavorare in coppia o in gruppo è più delicato perché una cosa è doversi esporre di fronte
all’insegnante e alla classe, altra cosa è, invece, relazionarsi tra pari, in un’intervista, in un
role play o in un’attività di work in pairs.
Il confronto ridotto consente anche di lavorare sulle dinamiche relazionali della classe:
gli studenti imparano a confrontarsi anche con i compagni meno simpatici o meno
conosciuti e non solo con il compagno di banco; se il clima è positivo, si possono creare
dei gruppi basandosi sulle date di nascita e associando tutti coloro che sono nati nello
stesso mese o tutti coloro che sono nati in primavera o in estate in modo da evitare che
qualcuno si senta escluso. Associare studenti che ottengono risultati molto positivi ad altri
che non li ottengono, non è sempre una buona idea, perché talvolta il criterio è troppo
ovvio e finirebbe per umiliare questi ultimi, se non si sa mediare e far accettare un
messaggio di aiuto tra pari.

9. “Education is not the filling of a pail, but the lighting of a fire”, W.B. Yeats.

44
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 45

L’importante è sempre chiarire perché si deve svolgere un determinato esercizio e che


cosa si impara facendolo: se l’insegnante sa dove deve andare, gli alunni lo seguono, ma in
coppia o in gruppo è più divertente.
Il metodo principe per quanto riguarda l’apprendimento cooperativo formale e
strutturato, molto differente quindi dall’approccio grammatico-traduttivo, è il cooperative
learning, ispirato alle teorie costruttiviste e alla teoria della valutazione autentica. Per
quanto riguarda la didattica delle lingue straniere, l’approccio di Spencer Kagan10 ha il
vantaggio di essere di facile implementazione e di non richiedere una lunga progettazione
preparatoria.
Nell’interazione “a stella”, tipica della lezione frontale, al centro vi è sempre
l’insegnante, mentre nelle attività di apprendimento cooperativo l’interazione è reticolare e
coinvolge tutti gli allievi in modo olistico senza essere mediata dal docente.
Nell’interazione “a stella” gli alunni considerano importante solo il parlato di quest’ultimo
e si sentono esonerati dall’ascoltare i compagni11. L’attività didattica suddivisa in momenti
di spiegazione e interrogazione instaura un rapporto solitario, a due, tra alunni e
insegnante, che alza il livello del filtro affettivo. L’interrogazione, tipico esempio di
conversazione diseguale, è un unicum italiano che causa noia e distrazione, soprattutto nel
caso delle interrogazioni cosiddette “programmate”, negative soprattutto
nell’apprendimento di una lingua straniera, in particolare nel caso di alunni dislessici che
necessitano di sistematicità e non possono affrontare molte pagine di contenuti tutte
insieme, anche se, ovviamente, devono sapere quando e su che cosa saranno interrogati.

Accorgimento 5: schemi/tabelle/quaderno compensativo/mappe


L’utilizzo di poster didattici, la realizzazione di schemi con la reiterazione di forme
linguistiche di difficile memorizzazione, un formulario di rielaborazioni sintetiche da
realizzare insieme, sono strategie che funzionano sempre. Tali attività sono socializzanti e
favoriscono l’integrazione piuttosto che la differenziazione. Difficilmente gli studenti le
rifiuteranno o le troveranno banali, soprattutto se si dirà loro che possono utilizzare tali
materiali anche durante le verifiche scritte o orali (le neuroscienze hanno dimostrato che
scrivendo si memorizza, tanto più se lo si fa con colori diversi). Gli studenti dislessici
potrebbero disegnare i mediatori iconici oppure si occuperanno di reperire mappe e sintesi
sul loro apparecchio elettronico in base alle loro preferenze.
In alcune facoltà universitarie si permette agli studenti di tenere aperto il libro di
testo durante gli esami, perché se l’argomento non è stato compreso e non si è acquisito
un metodo di studio adeguato, non si riesce comunque a svolgere il compito assegnato
in maniera adeguata; quindi, perché puntare sulla memorizzazione non contestualizzata
delle preposizioni dei phrasal verbs, per esempio, quando si apprendono in modo più
proficuo utilizzandoli e magari disegnando delle vignette che li illustrino? Anche le flash
card sono efficaci e divertenti. Si possono coinvolgere gli studenti nella loro creazione e

10. S. Kagan, L’apprendimento cooperativo: l’approccio strutturale, Edizioni Lavoro, 2000, Roma.
11. C. Lavinio, Comunicazione e Linguaggi disciplinari, Carocci, Milano, 2006, p. 190.

45
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 46

sono utili per ripassare il lessico e alcune regole grammaticali. O, ancora, si possono
realizzare dei poster… per esempio dal titolo “Attenti a quei due” per elementi
grammaticali o lessicali a confronto e soggetti a interferenze o “Usare solo in caso
di necessità” (ma la creatività degli studenti sarà certamente più accattivante),
oppure conseguenze temporali con traduzione a fianco per ricordare la differenza
di uso tra L1 e L2…

Mangio una mela ogni giorno. I eat an apple every day.


Oggi a pranzo mangio una mela. I’m going to eat an apple at lunch.
Adesso mangio una mela. I’m eating an apple now.
Ho fame: mangio una mela. I’m hungry. I’ll eat an apple.
Mangio solo una mela a pranzo I’ve been eating just an apple
da una settimana. at lunch for a week.

Agli studenti si può chiedere di osservare l’economicità dell’italiano rispetto all’inglese,


una volta tanto, oppure semplicemente che in inglese cambia sempre il tempo e in italiano
si usa sempre il presente indicativo per indicare azioni che si svolgono in tempi diversi,
oppure si può parlare dell’aspetto del verbo, delle funzioni linguistiche, ecc., ma è
importante che ce l’abbiano sempre davanti quando svolgono un esercizio di produzione
scritta.
È fondamentale chiarire che questa differenza causa errori di interferenza e che ci
sbagliavamo anche noi quando avevamo la loro età perché tutti traducono dalla lingua
madre. È inutile ipotizzare situazioni di “bagno linguistico” e di metodo comunicativo puro
che difficilmente sono praticabili in una classe con 24 studenti per tre sole ore alla
settimana in cui si deve anche spiegare, correggere e valutare e che, comunque, funzionano
solo con i bambini piccoli: l’adolescente vuole sapere perché e fa confronti con la lingua
italiana. Rispondiamogli o, meglio ancora, anticipiamolo.
Lo studente dislessico potrebbe utilizzare un quaderno compensativo in cui inserire gli
ostacoli alla memoria sia durante le verifiche scritte sia durante quelle orali. Ciò ovvierebbe
al problema di confondere una parola con un’altra e consentirebbe di testare più la sua
comprensione che la sua memoria.
La mappa concettuale è un altro strumento utile. Si tratta della rappresentazione grafica
di un concetto, un’informazione o una conoscenza. L’utilizzo delle mappe concettuali nella
didattica permette non solo un apprendimento significativo, ma anche lo sviluppo della
meta-cognizione, intesa come la consapevolezza che un soggetto ha della propria capacità
cognitiva. Non è da dimenticare, inoltre, che le mappe concettuali disegnano l’articolazione
della rete cognitiva in cui un dato sapere è collocato e collegato ad altre conoscenze,
pertanto la sua rappresentazione grafica obbliga ad una lettura di tipo ipertestuale e abitua
chi le utilizza ad abbandonare il pensiero lineare/sequenziale e ad utilizzare il cosiddetto
pensiero reticolare.
Imparare ad usare ed insegnare ad usare software specifici può essere una buona
strategia. Tali software infatti solitamente utilizzano due strategie peculiari affinché una

46
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 47

mappa sia effettivamente utile: la riduzione del numero di informazioni e della complessità
visiva e l’aumento del valore informativo del singolo nodo. Alcuni esempi sono:
‘IperMAPPE’ (studiato appositamente per gli apprendenti dislessici), ‘cmap’, ‘XMind’, e
‘Mindomo’ (quest’ultima applicazione presenta anche la possibilità di collaborazione in
tempo reale poiché più utenti possono lavorare contemporaneamente sulla stessa mappa).
Tali mappe possono anche essere integrate da altre applicazioni o piattaforme eLearning
(Moodle, Blackboard, Desire2Learn, Clever, itslearning).
In ogni caso, le mappe non si devono improvvisare e bisogna imparare a costruirle e a
farle costruire, altrimenti si rischia di ottenere esiti opposti che confondono gli studenti. Le
mappe non devono essere ricche, ma essenziali e con chiare relazioni. I ragazzi con DSA
tendono a perdersi quando devono preparare un’argomentazione, sia scritta sia orale, a
causa delle difficoltà che hanno nei processi di automatizzazione delle informazioni. La
mappa aiuta a minimizzare i punti deboli dello studente, compensando la lentezza nella
lettura, la stanchezza nella lezione, la disorganizzazione e la struttura sintattica
esclusivamente paratattica, a patto che:
• si eviti la prima progettazione a mano libera da parte dello studente: la dislessia severa
rende arduo individuare nel testo le parole grafiche, la memoria a breve termine fa
dimenticare i collegamenti, la disgrafia rende incomprensibile la rilettura
• si faccia utilizzare il PC con sintesi vocale guidandoli nell’uso, non delegando al PC ciò
che è peculiare del docente
• si forniscano le mappe nel caso di contenuti complessi di genere storico-letterario
ricordandosi di individuare i nodi e i concetti associati, assegnando loro etichette
significative (parole-concetto)
• si individuino i collegamenti (anche quelli che al docente paiono scontati) e si
assegnino le parole-collegamento
• si facciano svolgere attività di preparazione alla costruzione delle mappe come, per
esempio, imparare a scegliere il significato in base al contesto o saper ricavare
informazioni dagli espedienti grafici dei libri di testo, dai mediatori iconici, dalle
fotografie e dai titoli dei paragrafi.

Accorgimento 6: provare la flipped classroom


Anche la flipped classroom può essere una strategia per abbassare il filtro affettivo. L’idea è
quella di fornire agli studenti dei materiali didattici appositamente selezionati o predisposti
dall’insegnante prima di affrontarne il contenuto insieme in classe.
La prima cosa che gli studenti fanno diventa quindi quella di studiare guardando
video, consultando i materiali ed adoperandoli più volte fino a quando i concetti non
sono sufficientemente chiari. Visto che lo studente dislessico non può permettersi lo
stesso metodo di studio dei normolettori – ossia leggere più volte il materiale di studio –
dato che la difficoltà di lettura rallenta i tempi e affatica in modo eccessivo rendendo
precari i processi di comprensione e elaborazione del testo, occorre spiegare quali siano
le strategie per ottimizzare il metodo di studio. In questo caso il concetto di classe
capovolta funziona solo se il docente conosce e fornisce prima il materiale da preparare

47
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 48

a casa e lo correda di una traccia per creare aspettative e focalizzare l’attenzione su


determinati argomenti. L’insegnante potrebbe quindi, per esempio, dare come consegna
di leggere il titolo e individuare l’argomento centrale del titolo e i sotto-argomenti;
fornire un glossario evidenziando prima le parole più difficili che si troveranno nel testo;
suggerire di gerarchizzare le informazioni utilizzando le congiunzioni, dopo aver fornito
una tabella con i linking signals; o ancora usare colori diversi per far ricordare meglio le
informazioni più importanti e le parole chiave.
La seconda parte del lavoro avviene invece in classe dove l’insegnante si troverà
(almeno dal punto di vista teorico) un gruppo di studenti già preparato e, a detta dei
sostenitori, finalmente omogeneo ed “allineato”12. Nella terza parte c’è un momento di
recupero e sistematizzazione delle informazioni e una simulazione di verifica.
In sintesi:

SÌ NO
Ridondanza (riutilizzo in vari contesti dei medesimi vocaboli) Uso di sinonimi
Multisensorialità (vari linguaggi: paraverbali, iconici, uditivi) Metodo ‘talk and chalk’
Input segmentato Assegnazione di contenuti
(tempi più lunghi e compiti scorporati in più fasi) da studiare “da pagina a pagina”
Input sistematico Scarso rinforzo, digressioni,
(schemi di riferimento e ricapitolazioni) pianificazione disordinata della lezione
Input ludico Assegnazione di elenchi di vocaboli
o verbi da sapere a memoria
Usare organizzatori anticipati: schemi, tabelle, mappe con uso Non dare come consegna la rilettura
di colori diversi per gerarchizzare le informazioni, le desinenze, di argomenti nuovi o poco chiari
l’ordine delle parole che devono imparare e controllare
l’aggiornamento sistematico del quaderno compensativo

12. In realtà non è proprio così, perché dipende dall’ambiente di apprendimento domestico e dalla possibilità di
consultare il materiale o di farsi aiutare, ma è un tentativo che val la pena fare.

48
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 49

3. DIDATTICA INCLUSIVA E RESILIENZA

3.1 Superare la logica compensativa


In considerazione di una visione pedagogica che si proponga come ponte e non come
muro e che non deleghi alle tecnologie il lavoro dell’insegnante, fatto di relazione e
accompagnamento, si propone in questa sezione un approccio didattico orientato a
superare la logica compensativa e a sviluppare le potenzialità individuali. Le misure
compensative previste dalla normativa vigente sono già state accennate e sono in genere
ormai note a tutti i docenti, ciò che forse è più opportuno ricordare è la differenza tra
didattica individualizzata e didattica personalizzata1.
Mentre “individualizzato” è l’intervento didattico misurato su ogni singolo individuo,
tale intervento diventa “personalizzato” quando è ideato ad hoc per ogni studente,
calibrato sulle sue necessità.
L’azione formativa individualizzata si prefigge obiettivi comuni per tutti gli studenti della
classe, ma è concepita modellando le metodologie in funzione delle caratteristiche individuali
dei singoli studenti. La didattica individualizzata si caratterizza per l’assegnazione di
determinate attività individuali che può svolgere il singolo discente per potenziare specifiche
competenze: ad esempio nella classe terminale della secondaria di secondo grado scrivere
una mail all’Ufficio Relazioni con il Pubblico per lamentarsi della qualità del servizio,
gerarchizzare le informazioni di un testo storico o in una biografia, individuare le
informazioni referenziali e inferenziali in un dato testo, scrivere un testo argomentativo,
svolgere un esercizio di scrittura documentata, individuare le figure retoriche di un testo
poetico, scrivere un testo utilizzando solo termini denotativi e non connotativi e viceversa,
o ancora distinguere il registro formale da quello informale in un articolo di giornale.
La didattica personalizzata, invece, gestisce l’offerta didattica e le modalità relazionali
sulla specificità e univocità a livello personale dei bisogni educativi considerando le
differenze individuali sotto il profilo qualitativo, accrescendo i punti di forza di ciascun
allievo. Gli individui apprendono in maniera diversa l’uno dall’altro secondo le modalità
e le strategie con cui ciascuno elabora le informazioni e quindi la didattica inclusiva deve
tener conto degli stili di apprendimento che differiscono da studente a studente. Quando
si usano mappe concettuali, organizzatori anticipati, mediatori iconici calibrati sul
singolo studente e adeguati al suo particolare stile di apprendimento, si usa la didattica
personalizzata. La sinergia tra didattica individualizzata e personalizzata crea le
condizioni più favorevoli per l’apprendimento.
Non si tratta più dunque di far fare a ciascuno la stessa cosa nello stesso modo, ma di
adattare a necessità e stili diversi attività che rimangano simili negli obiettivi ma diverse
nella modalità di somministrazione, gestione e valutazione.

1. Cfr. AA. VV., Dislessia e altri DSA a scuola. Strategie efficaci per insegnanti, Erickson, Trento 2013, p. 79.

49
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 08:12 Pagina 50

Il primo passo per diventare un docente inclusivo è l’analisi dei prerequisiti degli
studenti. Dando per scontato che il docente debba credere egli stesso nell’inclusione
perché possa riuscire a realizzarla, per quanto riguarda i discenti occorre conoscere il
retroterra scolastico di ogni alunno dislessico per capire se vi sia stata una presa in carico
tempestiva o meno e capire le specifiche difficoltà di ciascuno. Le differenze soggettive,
come già chiarito, sono infatti essenziali per la scelta adeguata degli strumenti
compensativi da adottare.
Alcuni studenti incontrano difficoltà nella comprensione del testo e quindi la sintesi
vocale o l’uso di programmi di video-scrittura con correttore ortografico bastano da un
punto di vista legale, ma potrebbero non essere sufficienti da un punto di vista
didattico. Il computer funziona solo se l’alunno lo sa usare bene, sapendolo adattare
alle proprie esigenze di studio, tuttavia difficilmente gli studenti dislessici sono
dattilografi provetti che conoscono perfettamente i programmi di video-scrittura, pur
essendo molto veloci nello scaricare film e musica o interagire sui social network.
Inoltre, raramente gli studenti sanno filtrare le fonti, se non glielo si insegna a scuola,
per cui le teorie sconclusionate di un blogger qualsiasi spesso sono considerate alla pari
di quelle di accademici di fama. Occorre dunque insegnare loro la differenza, così come
è necessario spiegare il divario culturale e di affidabilità che corre tra l’enciclopedia
Treccani online, ad esempio, e Wikipedia, nonché informarli sull’esistenza di Google
Scholar e scoraggiarli, invece, dall’utilizzare Google traduttore, dato che traduce “tu sei”
con “you six”2!
Più che affidarsi unicamente a strumenti digitali, è invece essenziale potenziare le
capacità di ascolto degli alunni dislessici e rafforzare le loro relazioni sociali, così come
la competenza sociale di saper chiedere aiuto è una competenza che molti studenti
devono ancora apprendere: un progetto di autonomia non significa infatti imparare a
fare a meno degli altri, ma significa imparare a chiedere aiuto e a ringraziare per averlo
ricevuto3.
Il PC non basta se il modello di lezione è quello trasmissivo in cui il docente parla e
scrive date e nomi alla lavagna in corsivo! Forse adottare strategie è più opportuno che
adottare tecnologie, come suggerito dalla seguente tabella4:

2. Un sistema infallibile è, per esempio, quello di prendere un testo autentico, letterario o giornalistico, che loro conoscono e
farlo tradurre da Google traduttore, mettendo a fronte la traduzione di un anglista.
3. Cfr. F. Fogarolo, “Tecnologie per compensare la dislessia: che cosa fare perché siano efficaci” e E. Ghidoni, D. Angelini,
“La dislessia negli adolescenti e negli adulti”, in La Dislessia e i Disturbi specifici dell’Apprendimento, in Annali della
Pubblica istruzione 2/2010.
4. Vedi F. Fogarolo, op. cit., p. 111.

50
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 11:20 Pagina 51

STRATEGIE COMPENSATIVE TECNOLOGIE COMPENSATIVE


Vengono spesso acquisite, e anche individuate, Almeno all’inizio, l’intervento degli adulti è
autonomamente dagli alunni. indispensabile.
Raramente hanno controindicazioni. Possono Le tecnologie mal somministrate possono essere
essere più o meno efficaci ma è molto raro che seriamente controproducenti: calo di motivazione
possano essere considerate dannose. e autostima, netta diversificazione dalla classe,
complicazione operativa, allungamento dei tempi…
Spesso le strategie sono utili a tutti i ragazzi e L’uso delle tecnologie usate in funzione
quindi possono essere proposte a tutta la classe. compensativa è davvero conveniente solo in
Non hanno alcuna caratteristica stigmatizzante presenza di un serio disturbo; per gli altri alunni
e vengono accettate molto più facilmente dagli sarebbero un’inutile complicazione in più.
alunni con problemi di vario tipo. Problemi di rifiuto e/o accettazione sono molto
frequenti.
Le strategie, almeno quelle di base, non hanno Molte tecnologie richiedono prodotti software
costi e possono essere usate con tutti gli alunni distribuiti con licenza unica e che non possono
senza problemi. Questo facilita l’accettazione e la pertanto essere usati da tutti i compagni.
condivisione.
Possono essere introdotte o suggerite anche in È necessario un percorso di formazione e
modo strutturato o informale, in base ai più addestramento, almeno in certi momenti più
svariati stimoli o suggerimenti educativi. significativi, per acquisire alcune abilità per una
efficace competenza.

Diventare un insegnante inclusivo è molto difficile perché richiede molto tempo e la


messa in discussione della propria routine didattica, ma è anche una sfida emozionante che
si può vincere se si riesce a sviluppare resilienza e ad accettare che è un percorso ad
ostacoli con poche gratificazioni a breve termine. Non bisogna stancarsi di provare e
cambiare strategia quando questa non funziona, evitando sia i conflitti che a volte si
creano, ma anche il pietismo, per cui “la sufficienza è scontata dato che l’alunno è
dislessico”. Cerchiamo di ricordarci ogni giorno le parole di Thomas Jefferson: “There is
nothing more unequal than the equal treatment of unequal people”.

3.2 Come sviluppare la resilienza e l’autoefficacia nell’ora di inglese


La resilienza è definita come un processo di adattamento funzionale per affrontare le
avversità, le situazioni stressanti e traumatiche della vita (Masten, 1994), o come la capacità
di “rimbalzare” (rebound) o far fronte con successo alle avversità, o, secondo la definizione
di Froma Walsh (2003), come l’abilità di resistere e affrontare senza soccombere alle sfide
che la vita impone, come un processo che coinvolge aspetti dinamici che sostengono,
incoraggiano e promuovono l’abilità di contrastare e opporsi. Essere resilienti implica lo
sviluppo di quelle competenze emotive, sociali, e cognitive necessarie al superamento delle
difficoltà nonostante l’individuo sia esposto a notevole fonte di stress5. Tuttavia, le
definizioni proposte dagli esperti sono ben più numerose di quelle sopra citate.

5. Cfr. V. Cavioni, M. Lupica Spagnolo, G. Beddia, M. A. Zanetti, “Promuovere la resilienza a scuola. Un curricolo europeo per
docenti e studenti”, in Psicologia e Scuola, maggio-giugno 2015.

51
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 11:20 Pagina 52

In ambito anglofono, associato alla resilienza si trova il concetto di empowerment,


termine di difficile traduzione perché sintetizza in una parola la capacità di padroneggiare
una situazione e la consapevolezza di avere il potere di influire sull’ambiente grazie alle
proprie competenze in quel determinato ambito. Secondo questo approccio, gli indicatori
dell’empowerment personale sono principalmente fondati sulla capacità di controllo
personale e di autonomia e rimandano ai concetti di auto-apprezzamento/valutazione delle
competenze e alla stima di sé. Per questo concetto, i ricercatori canadesi francofoni usano
il termine habilitation (accrescimento dell’abilità)6. Al di là della questione terminologica, a
scuola interessano gli aspetti operativi delle componenti dell’empowerment, identificate
dagli studiosi Zimmerman, Bandura e Mechanic7:
1. attribuzione di causalità interna
2. percezione di auto-efficacia
3. speranza appresa (traduzione di learned hopefulness)
4. pensiero positivo operativo.
Si potrebbe obiettare, ironicamente, “Vasto programma!”. In classe, però, gli studenti
trascorrono parecchie ore e quindi ci sarebbe il tempo per tentare di far sviluppare tali
atteggiamenti nei confronti delle difficoltà scolastiche.
Nel caso del fattore uno – ossia l’attribuzione di causalità interna –, è tipico di alcuni
adolescenti attribuire i risultati delle proprie azioni e dei propri risultati scolastici negativi
all’insegnante del momento, al sistema scolastico, al libro di testo, agli insegnanti degli
ordini di scuola precedenti, ossia a forze esterne e indipendenti dai propri comportamenti.
Nei confronti dell’inglese, l’atteggiamento di alcuni studenti dislessici è rinunciatario
perché esso è da sempre fonte di frustrazione e diminuzione del livello di auto-stima. Altri
adolescenti, invece, come meccanismo di difesa, per non riconoscere che c’è qualcosa che
non va, si attribuiscono tutte le responsabilità: “non lo imparo perché non ho voglia di
studiarlo”, “mi annoia”, “non mi va”. Anche questo è un modo per reagire allo stress
causato dall’insuccesso scolastico, è una strategia di coping, ossia un processo di
adattamento, uno sforzo cognitivo e comportamentale per far fronte a una difficoltà, al fine
di ridurre la minaccia che stressa l’individuo. Meglio dire di non aver voglia di studiare,
meglio convincersi che il problema è la mancanza di volontà, piuttosto che chiedere aiuto e
riconoscere che c’è un problema. Questo atteggiamento è anche influenzato
dall’egocentrismo dell’adolescente oppure dal meccanismo psicologico della profezia che si
auto-avvera (self-fulfilling prophecy) per cui l’individuo mette in atto comportamenti atti a
provocare ciò che egli teme.
Per rispondere a ciò in modo positivo, si può cominciare con il chiedere agli studenti
dislessici due parole che associano all’inglese: purtroppo, si sentiranno risposte molto
negative, sempre collegate alla materia scolastica e mai alla lingua in cui sono cantate la
maggior parte delle canzoni che ascoltano o in cui sono scritte quasi tutte le frasi delle
magliette che indossano. Partire da questa considerazione e insegnare loro ad associare

6. Cfr. E. Malaguti, “Articolazioni teoriche della resilienza”, in B. Cyrulnik, E. Malaguti, Costruire la resilienza, Erickson, Trento
2015.
7. Ibidem.

52
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 11:20 Pagina 53

immagini positive all’inglese può essere un modo per farli riflettere sul fatto che
l’atteggiamento negativo condiziona i risultati.
Per quanto riguarda il punto due, ossia la percezione di auto-efficacia, occorre far
riflettere questi studenti su che cosa intendano per imparare l’inglese e far loro capire che
sanno già fare molte cose con questa lingua, ma che le sottovalutano, perché hanno
deciso di concentrarsi su altre materie, dato che l’inglese “tanto è troppo difficile”, “si
scrive in un modo e si legge in un altro”, “non ci sono regole fisse”, ecc. Una strategia
vincente per l’auto-efficacia è spiegare perché l’inglese è così, fare esercizi di
consapevolezza fonologia e scoprire che una logica c’è, suddividendo ad esempio le
parole in gruppi fonologici, evidenziandoli con colori diversi per ricordarsi che tutte
corrispondono a un suono preciso:
• cat, sat, bat…
• but, duck, mug…
• see, bee, teen…
• food, soon, moon…

Il concetto di “speranza attesa” e di “pensiero positivo operativo” sono collegati. Il primo


è definibile come la tendenza a ritenere che determinati eventi siano gestibili e controllabili,
anche la grammatica inglese con le sue deviazioni dalla norma così ampie rispetto alle
lingue romanze! Vi sono insegnanti di inglese italiani dislessici, si tratta quindi di sviluppare
abilità e conoscenze per influire sul proprio apprendimento perché nulla può avvenire di
default. A volte gli studenti hanno dei falsi miti sull’apprendimento della lingua inglese:
“l’inglese si impara solo andando sul posto, non sui libri, non a scuola”, “così non serve a
niente”, ma tale mito si sfata facilmente anche semplicemente citando i tanti immigrati
italiani del passato che non lo parlavano neanche dopo molti anni di permanenza, perché
non l’avevano studiato e frequentavano solo italiani in quartieri abitati da italiani, mentre i
figli che lo hanno studiato a scuola l’hanno imparato molto bene. Un altro esempio sono gli
studenti dei paesi ex-membri del Patto di Varsavia che, pur non potendo soggiornare in Paesi
anglofoni, conoscevano ugualmente la lingua molto bene. È necessario affaticarsi per
imparare l’inglese, così come per qualsiasi altra materia, e l’impegno dura tutta la vita. Gli
alunni dislessici si stancano prima degli altri ed è per questo che hanno diritto a più tempo.
Un modo efficace per creare un pensiero operativo positivo collegato alla materia è, per
esempio, usare attività inconsuete o che scatenino ilarità e collaborazione, come per
esempio insegnare l’aspetto continuo del verbo chiedendo agli studenti di disegnare delle
vignette illustrando frasi assurde o comiche per presentare, sdrammatizzare e interiorizzare
la spesso ostica duration form. Un altro esempio potrebbe essere cercare di coinvolgerli
maggiormente attraverso le canzoni, ottimo spunto con cui affrontare i tempi verbali8.
Anche YouTube può essere fonte di ispirazione, ma se non si dispone di LIM o di PC
collegato a un proiettore, si può usare comunque il metodo BYOD. Perché non chiedere poi
agli studenti di preparare una verifica sul tempo verbale affrontato utilizzando le canzoni e

8. Al link http://www.tefltunes.com/grammarsongs.aspx si può trovare una tabella indicante, per ogni testo verbale, quale
canzone potrebbe essere utile e il link relativo al testo.

53
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 11:20 Pagina 54

inventando esercizi collegati ad esse? Qualsiasi occasione di protagonismo (spesso anche


proposta dagli stessi studenti) non può che motivare e lavorare nella giusta direzione.
Per concludere: l’alunno dislessico non può diventare resiliente da solo, la comunità
educante tutta, le associazioni, le istituzioni sul territorio devono interagire per aiutarlo, ma
anche la didattica spicciola e il singolo docente possono fare molto e ciò migliorerà
l’ambiente di apprendimento e avrà risultati positivi su tutti gli studenti. Val la pena quindi
di pensare a una rilettura in chiave di empowerment delle misure compensative e
dispensative per un Piano Glottodidattico Resiliente:

1. Sviluppare il pensiero positivo per incoraggiare l’ottimismo e l’umorismo


nell’affrontare la dislessia
2. Potenziare i punti di forza degli studenti deboli, diagnosticati e non, per aiutarli
nell’utilizzo delle proprie abilità e potenzialità per il successo scolastico e sociale
aumentandone l’autoefficacia e l’autostima
3. Sviluppare l’autodeterminazione per stimolare l’impegno, l’autonomia e la tenacia
degli studenti dislessici mediante attività di problem solving e decision making
4. Potenziare le capacità di listening e speaking che non sono condizionate dalla dislessia
5. Potenziare l’assertività e la capacità di chiedere aiuto
6. Incoraggiare la costruzione di relazioni amicali sviluppando le capacità di
cooperazione, di imparare a studiare insieme ai compagni e l’empatia. Le schede, le
mappe e le sintesi servono a tutti e trasformare la propria difficoltà nell’opportunità di
aiutare gli altri, insegnando loro un metodo di studio efficace, è una arma potentissima
7. Promuovere processi metacognitivi fa riflettere sulle proprie difficoltà e trovare il
modo di aggirarle
8. Evitare verifiche a sorpresa per tutti, non solo per gli studenti con DSA. Anche
all’università gli studenti sanno con largo anticipo quando vi sarà l’esame e su cosa
verterà. Inoltre, far sempre fare a tutta la classe una simulazione di verifica è utile a tutti
9. Consentire l’uso del dizionario a tutti, ma non prima di aver insegnato come
utilizzarlo. La traduzione è un esercizio di problem solving di elevata difficoltà,
dunque esercitarla è un ottimo sistema per stimolare i giusti processi di
apprendimento
10. Usare gradualità nell’affidarsi agli strumenti compensativi e adattarli in base a ciò che
si deve valutare di volta in volta, personalizzandoli
11. Stare attenti ai prerequisiti: se l’alunno dislessico non ha mai usato programmi di
videoscrittura con correttore ortografico e non vuole cominciare a 16 anni, non si
deve insistere, ci si limiterà a non tener conto dei tipici errori di spelling che vengono
compiuti. Anche per quanto riguarda il tempo a disposizione, che può essere più
ampio, è meglio lasciare allo studente la facoltà di scegliere questo tipo di misura
oppure di avvalersi della possibilità di svolgere un esercizio in meno

54
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 11:20 Pagina 55

12. Insegnare a tutti a tenere un diario di bordo è fondamentale. Lo studente migliore non
è mai il più intelligente o il più creativo, bensì il meglio organizzato. Alcuni, anche se
non sono dislessici, non riescono a scrivere i compiti e le date delle verifiche sul
diario perché i docenti le dettano troppo velocemente. Scrivere sempre sulla lavagna
la data e l’argomento della lezione, suddividendola nelle varie sezioni è, per esempio,
uno dei modi per aiutare a compilare un diario di bordo
13. Suddividere spiegazioni e verifiche in porzioni idonee. Non serve rispettare sempre e
comunque la scansione del libro di testo, è più efficace adattare il testo alle esigenze
della propria classe. Un’unità di apprendimento si suddivide in unità didattiche, ma
non è detto che le varie sezioni strutturate per uno studente immaginario funzionino
a livello pratico. In fondo, il programma non esiste più: esistono gli studenti e le loro
esigenze formative che non sono mai omogenee
14. Coinvolgere lo studente dislessico nella redazione del PDP, di cui è il protagonista, in
questo modo diventerà sempre più consapevole delle proprie modalità di
“funzionamento” e si sentirà parte attiva del processo.

55
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 11:20 Pagina 56

4. ALTRI TIPI DI BISOGNI EDUCATIVI

4.1 Quando il Bisogno Educativo è raro e superspeciale


All’interno degli alunni con Bisogni Educativi Speciali devono anche essere inclusi i
cosiddetti “gifted”, ossia gli studenti plusdotati definiti anche “ad altissimo potenziale
intellettivo”. Si tratta di studenti con un QI più alto di 25/30 punti rispetto al 100, che è il
punteggio standard per un’intelligenza media. A causa della rapidità di pensiero1, questi
studenti svolgono le attività assegnate prima degli altri e si annoiano nell’attesa che gli altri
terminino. Nel 2014 l’Organizzazione Mondiale della Sanità ha segnalato che questi alunni
sono a rischio di insuccesso formativo se non riescono a realizzare i propri talenti cognitivi.
Tuttavia, non solo coloro che hanno un QI al di sopra della media possono essere
considerati superdotati. Infatti, una seconda linea teorica sostiene che si debbano tenere in
considerazione anche altri indici. Non si tratta quindi di alunni geniali, non ci si riferisce
agli enfants prodiges, a novelli Mozart, ma ad alunni che hanno qualcosa in più da un
punto di vista qualitativo, più che un QI superiore alla media, anche perché nella maggior
parte dei casi gli insegnanti ignorano il QI dei loro studenti. La Regione Veneto,
all’avanguardia su questo aspetto, ha pubblicato un documento con le linee guida sui
“gifted”, al quale si rimanda2, in cui vengono prese in considerazione caratteristiche quali
creatività, pensiero divergente, autoregolazione e intelligenza emotiva.
Pertanto non si tratta neanche delle “eccellenze”, non sono gli alunni con tutti 9 e 10
in pagella, anche perché come è noto, spesso gli studenti che ottengono voti migliori a
scuola coincidono con gli studenti meglio organizzati e con un migliore metodo di studio,
ma non sempre questi ultimi sono anche i più intelligenti o i più creativi. Infatti, fattori
come l’istruzione ricevuta nel ciclo precedente, la famiglia di origine e la motivazione
contribuiscono notevolmente ad avere una media di voti molto alta.
Si tratta quindi, nel complesso, qualsiasi sia il loro talento in più, di studenti che
occorre non demotivare e, soprattutto, scoprire. A volte, infatti, soprattutto nella secondaria
di secondo grado, essi tendono a nascondersi, perché gli adolescenti sono molto
conformisti, non vogliono differenziarsi dal gruppo dei pari ed essere considerati
“secchioni”. Una volta “scoperti” tali alunni, gli errori da non compiere sono i seguenti:
non considerarli assistenti dei docenti, non chiedere loro di spiegare qualcosa che gli altri
non hanno capito, non considerarli adulti da un punto di visto emotivo e affettivo – le loro
intelligenze infatti si sono sviluppate in modo asincrono e potrebbero avere dei problemi
relazionali, non assegnare loro un numero di esercizi superiore a quello assegnato ai
compagni o approfondimenti personali non supervisionati dal docente. Anche aspettarsi
che siano eccellenti in tutte le materie è sbagliato.

1. Cfr. http://gcq.sagepub.com/content/51/4/342.refs VanTassel-Baska& Brown, “Toward Best Practice: An Analysis of the


Efficacy of Curriculum Models in Gifted Education”, in Gifted Child Quarterly, Fall 2007 51: 342-358, 2007.
2. http://www.istruzioneveneto.it/wpusr/wp-content/uploads/2015/05.

56
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 11:20 Pagina 57

Come fare dunque a identificarli? In genere tali alunni condividono alcune o tutte le
seguenti caratteristiche:
• sono lettori avidi
• hanno senso dell’umorismo
• dimostrano curiosità intellettuale prolungata nel tempo su alcuni argomenti
• si esprimono con notevole proprietà di linguaggio
• operano collegamenti originali
• amano le attività di problem solving e i giochi enigmistici
• hanno un’immaginazione particolarmente vivida
• sono interessati all’equità e alla giustizia
• si annoiano facilmente
• preferiscono la compagnia di persone adulte
• tendono a mettere in discussione l’autorità
• sono abili con i numeri
• sono molto creativi
• sono molto sensibili e dimostrano empatia per chi ha subito un torto o è in difficoltà
• sono particolarmente vulnerabili a livello emotivo
• hanno acquisito le abilità di letto-scrittura precocemente.

Che cosa fare quindi, quando si ha la fortuna di avere alunni con queste caratteristiche
intellettive? Coltivare il talento di ciascuno. Sembra uno slogan, difficilmente applicabile
nella prassi, ma, soprattutto nell’insegnamento della lingua straniera, sperimentare e
individualizzare è facile e possibile.
Supponiamo di dover affrontare un’unità didattica su Il mercante di Venezia nell’ambito
di un’unità di apprendimento su Shakespeare. Si potrebbe ipotizzare di partire dal
monologo di Shylock e chiedere agli studenti di cercare su YouTube i vari contributi
presenti. A ciascuno poi si potrebbero assegnare compiti differenziati: distinguere tra le
rappresentazioni degli attori professionisti e quelle dei dilettanti, classificare le sequenze
tratte dalle riduzioni cinematografiche, chiedersi come mai tale monologo è così famoso e
così rappresentato anche a livello di recite scolastiche e provare a dare più risposte. Agli
alunni “gifted” si potrebbe chiedere, invece, di capire come mai il monologo di Shylock è
allo stesso tempo sublime e pericoloso, qual è il rapporto con il denaro dei veneziani così
ben rappresentato da Shakespeare, di spiegare perché i critici hanno accostato quest’opera
a Il Timone d’Atene e sostenuto che Shakespeare ha anticipato Marx, in che modo nella
Germania nazista è stato rappresentato Il Mercante di Venezia, oppure di individuare gli
errori di traduzione nel doppiaggio e nei sottotitoli in italiano nella riduzione
cinematografica più famosa, quella del 2004 in cui Shylock è interpretato da Al Pacino
diretto da Michael Radford. Gli studenti in cui il pensiero divergente è meno sviluppato, ma
che possiedono buona memoria, potrebbero imparare a memoria il monologo e recitarlo.
In generale, quando si assegnano attività di problem solving, vi è una fase che riguarda
la produzione delle idee che si chiama “fase divergente”, in cui alcuni allievi sono più
versati, e una “fase convergente”, in cui si selezionano le idee. Gli alunni “gifted” hanno
bisogno di compiti sfidanti, che stimolino la loro curiosità intellettuale e mettano in gioco il

57
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 11:20 Pagina 58

pensiero divergente. Si può chiedere loro di confrontare due traduzioni di due brani di
narrativa tratti da un classico della letteratura o due poesie, oppure di rispondere a
domande aperte che richiedano capacità argomentative e di ricerca delle informazioni
particolarmente impegnative.
Ad esempio, se si propone l’analisi di una recensione cinematografica oltre alle solite
domande di comprensione del testo e a quelle sulle caratteristiche testuali della recensione,
sul contenuto, sull’opinione del critico, e su quale tipo di film preferiscano gli studenti, si
può chiedere, a livello facoltativo, di scoprire se vi siano tycoon donne, in quale romanzo
Fitzgerald tratta dei magnati hollywoodiani, di approfondire la storia della censura a
Hollywood. A questo punto si potrebbero ulteriormente differenziare i compiti: ad alcuni si
chiede di scoprire perché nei film degli anni Cinquanta anche le coppie sposate venivano
rappresentate sempre in stanze con letti gemelli, ai “gifted” di scrivere una relazione sulla
censura a Hollywood durante il Maccartismo; ad altri di scoprire esempi di product
placement (pubblicità indiretta) nei film di James Bond; ai “gifted” di studiare la questione
dal punto di vista giuridico. Esistono contratti in cui una casa di produzione “vende” un
certo numero di inquadrature dell’acqua minerale San Pellegrino? Quali termini del
linguaggio settoriale giuridico vengono usati in questi contesti?
Se si affronta una lettura tratta da un qualsiasi quality paper britannico, si potrebbe
assegnare loro il compito di esaminare molto attentamente il paratesto e poi di confrontarlo
con un’altra testata britannica e, successivamente, con una testata statunitense e italiana,
oltre alle usuali domande di comprensione del testo.
Per quanto riguarda l’aspetto grammaticale, quando si spiega used to, per esempio, si
può chiedere loro di scoprire che cos’è il would iterativo e di scrivere degli esempi. Oppure
quando si trattano i verbi fraseologici chiedere di analizzare e tradurre in italiano frasi
come He drank himself into the hospital, In 1931 England was forced off the gold standard,
o The rain washed out the match.

In conclusione, la creatività, il senso critico e l’empatia sono doti con cui si nasce, sta
all’insegnante cercare di farle venire fuori e, ciò che più conta, è che spesso esse non sono
così limitate. Compito dei docenti è quindi insegnare a chi le possiede a mettersi in
relazione in modo positivo con gli altri, a conoscere i propri punti di forza ma anche quelli
deboli, a gestire lo stress e le emozioni, creando un ambiente di apprendimento in cui tutti
si impegnano per risolvere un problema contribuendo con le proprie capacità e
collaborando. L’importante è far capire che tutti contano e sono utili: chi riesce a trovare
soluzioni originali ma magari è disordinato sarà aiutato da chi è meno creativo ma più
sistematico. Poiché ormai è scientificamente accertato che le intelligenze sono multiple e
gli stili di apprendimento sono diversi, un insegnante inclusivo dovrebbe cercare di far star
bene in classe sia il timido insicuro di sé, sia l’estroverso creativo che si spazientisce se ci
sono esercizi ripetitivi.

58
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 21/03/18 12:02 Pagina 59

5. SUGGERIMENTI E MODELLI PER LA VALUTAZIONE

5.1 Suggerimenti di formattazione per documenti dyslexic-friendly


Le tipologie di esercizi da utilizzarsi nelle verifiche qui di seguito proposti si basano sui
seguenti criteri di accessibilità suggeriti dagli esperti:
• usare font ‘bastoni’ come Arial o Verdana a grandezza 14, con interlinea almeno 1,5 (i
font graziati, infatti, ossia quelli con allungamenti ortogonali alle estremità delle lettere
detti appunto ‘grazie’, sono di più difficile leggibilità) oppure usare font creati ad hoc e
scaricabili gratuitamente: 1. Open Dyslexic, le cui lettere hanno una forma particolare;
2. TestMe, i cui caratteri sono senza grazie, con spaziatura abbondante e lettere
ascendenti e discendenti lunghe; 3. Bianconero che rende molto più leggibili le lettere
che più spesso vengono confuse: p-b, p-q, a-e
• usare carta opaca, color bianco avorio: lo sfondo non bianco stanca meno la vista
• non spezzare la parola per andare a capo
• utilizzo del colore quando possibile
• giustificazione a sinistra
• sottolineamento delle frasi per evitare errori dovuti alla confusione tra la riga di sopra e
quella di sotto
• adoperare molte tabelle e numerare gli elenchi
• non usare più di 60-70 caratteri per rigo
• aumentare i margini della pagina
• consentire la verticalizzazione del testo con un leggio
• predisporre due cartoncini colorati tagliati a L per inquadrare il paragrafo da leggere
• evitare testi fotocopiati.

5.2 Suggerimenti per la predisposizione di verifiche


Di seguito, un insieme di buone pratiche per impostare nella maniera corretta i testi
necessari a valutare gli studenti:
• ridotta quantità di produzione scritta con esercizi non strutturati
• esercizi strutturati costituiti per lo più da attività di abbinamento e T/F o scelta multipla
limitate a 2 o 3 sole opzioni
• assenza di esercizi che richiedono una riflessione astratta sulla lingua
• assenza di esercizi che si focalizzano sullo spelling
• evitare esercizi del tutto decontestualizzati tipo riordinamento di frasi, esercizi con
verbi all’infinito tra parentesi da coniugare nella forma corretta
• fornire un glossario riferito alla tematica da trattare e un elenco di linking signals con a
fronte la traduzione in italiano. Infatti, anche se viene concesso l’uso del bilingue

59
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 21/03/18 12:02 Pagina 60

cartaceo nella ricerca del lemma e del traducente corretto, lo studente può perdere
tempo sia per problemi nell’individuare il corretto ordine alfabetico sia nell’individuare
il contesto corretto al quale si riferisce il traducente, anche a causa dei caratteri molto
ridotti dei traducenti e delle glosse esplicative dei dizionari in commercio. Qualora,
invece, sia possibile far utilizzare un dizionario on line, il problema non si pone e si può
fornire solo un elenco di linking signals, tipo quello suggerito.

ADDITION SIMILARITY LIMITATION CONTRADICTION RESULT CONDITION


not only… but also as well as although however accordingly as long as
non solo… ma anche così come sebbene tuttavia in base a purché

as well as likewise despite instead hence provided that


oltre a allo stesso modo (+nome) invece quindi a patto che
malgrado

moreover/furthermore together even though conversely therefore unless


inoltre with anche se viceversa perciò a meno che
insieme con/a non

in addition to this in spite of nevertheless thus due to


inoltre (+verbo) ciò nonostante dunque a causa di
nonostante

on the one hand,


... on the other hand
da un lato...
dall’altro

while/whereas
mentre

5.3 Modelli di verifica per studenti dislessici


Nelle domande aperte, gli esercizi non possono differire per contenuto da quelli del resto
degli studenti. Sono possibili solo accorgimenti grafici, l’uso del dizionario bilingue,
nonché la possibilità di rispondere a un quesito in meno, oppure più tempo a disposizione.
Il tutto, ovviamente, deve essere specificato nel PDP ed essere stato applicato nelle
simulazioni.
Al fondo della sezione, dopo alcuni modelli di verifica che hanno il semplice scopo di
mostrare alcune tipologie di esercizi impostati nella maniera corretta e formattati secondo i
suggerimenti consigliati, sarà possibile anche trovare un paio di esempi di griglie valutative
che valorizzano la comprensione globale del testo o la capacità di esprimere la propria
opinione in modo efficace, non penalizzando gli errori che non inficiano la comunicazione,
in particolare gli errori ortografici, la punteggiatura, la non differenziazione tra minuscole e
maiuscole, gli errori dovuti a distrazione o stanchezza. Per gli esercizi puramente
grammaticali si consiglia di trascurare gli errori ortografici, valutando quindi maggiormente
il contenuto rispetto alla forma.

60
03A guida Bit by bit_025-061 corretto.qxp_Layout 1 19/03/18 11:20 Pagina 61

Prima di valutare, comunque, ricordiamo sempre che la legge 170 (art. 5, c. 4) parla di
“adeguate forme di verifica e di valutazione”, e pertanto i ragazzi con DSA devono essere
valutati in rapporto alle loro capacità e alle loro difficoltà, senza paura di discostarsi da
come in genere si valuta in classe, ma secondo il principio della personalizzazione. Si deve
tenere conto delle caratteristiche personali del disturbo dell’allievo, del punto di partenza e
dei risultati conseguiti, premiando i progressi e gli sforzi: è importante che l’insegnante
ricordi che la valutazione è un processo di natura psicologica, perché tocca il giudizio che
ciascuno ha di sé, pertanto dovrebbe essere pensata e progettata come un processo per
migliorare i risultati degli studenti e non solo per verificarli.

Ricapitolando, un docente, per una attenta e accurata valutazione, deve:


• valutare più il contenuto e meno la forma
• considerare le conoscenze e non le carenze
• applicare una valutazione formativa e non sommativa dei processi di apprendimento
• fornire copia delle verifiche per una riflessione consapevole
• dimostrarsi ottimista sulle capacità di recupero.

61
03B guida Bit by bit_062-084.qxp_Layout 1 19/03/18 08:12 Pagina 62

Livello A2 – Reading comprehension

1. Read the information about a school theatre trip.


Complete Andrea’s notes.
LEGGI LE INFORMAZIONI SU UN’USCITA DIDATTICA A TEATRO.
COMPLETA GLI APPUNTI DI ANDREA.

Join us in a school trip to Stratford-on-Avon on Saturday 3rd July!


You can spend the morning shopping.
For lunch we will have a picnic near the river.
In the afternoon we will see William Shakespeare’s play
Romeo and Juliet.
Price: £15
Meet at River Road car park: 8.30 a.m.
Return: 6.30 p.m.

Dear Students,

Our Stratford-on-Avon trip is very popular. Unfortunately we


cannot get enough tickets to see Romeo and Juliet.
So we have tickets for A Midsummer Night’s Dream instead.

The tickets are a little more expensive, so the trip will now
cost £18 per person.

Arrival and departure times are the same.

Mrs Pendleton
English Teacher

62
03B guida Bit by bit_062-084.qxp_Layout 1 19/03/18 08:12 Pagina 63

Andrea’s notes: School Trip


Name of town: __________________________________________
Name of play: ____________________________________________
Cost: ___________________________________________________
Meeting place: __________________________________________
Return time: _____________________________________________

2. Which notice (A-D) says this?


QUALE CARTELLO DICE QUESTO?

1. You don’t have to pay to get the bus from here.

A
Please give this seat to an old, sick or pregnant person
if they need it.

B
There are no bus services from this stop on Sundays
and public holidays.

C
The bus service is changing, please take a timetable.

D
We offer a free bus service from this car park to the airport.

63
03B guida Bit by bit_062-084.qxp_Layout 1 19/03/18 08:12 Pagina 64

Livello A2 - Culture

1. Read the web page on the screen and find out information
about Nelson Mandela on the web and complete the fact-file.
LEGGI LA PAGINA WEB SULLO SCHERMO, SCOPRI
LE INFORMAZIONI SU NELSON MANDELA E COMPLETA
LA SCHEDA1.
Name: __________________________
Born: ___________________________
Died: ___________________________
Famous Saying: “The struggle is _________________________”
Family background: Mandela is one of ____ (how many?)
children. His ___________________ was a Thembu king and his
father was a _________________________ .
Ethnic Group: The _______________, his tribal clan, is part of
the _____________ people.
Education: BA, University of South Africa, 1942: Student,
University of the Witwatersrand. Mandela has honorary degrees
from more than 50 international universities and is chancellor of
the University of the North in South Africa.
Occupation: _____________________________________________
Historical Notes:
• In 1964
______________________________________________________
• In 1990
______________________________________________________
• In 1993
______________________________________________________
• In 1994
______________________________________________________
• From 1994 to 1999 he was
______________________________________________________

1
Nel caso non si disponga di schermo o LIM si fornirà testo autentico.

64
03B guida Bit by bit_062-084.qxp_Layout 1 19/03/18 08:12 Pagina 65

Livello A2 – Grammar and Vocabulary

1. Circle the right answer.


CERCHIA LA RISPOSTA CORRETTA.
1. Which word is a correct past simple verb?
a. made
b. taked
c. stooded

2. What is the comparative form of great?


a. more great
b. very great
c. greater

3. What is the past participle of to be?


a. was
b. been
c. were

4. Which preposition can be used before home?


a. to
b. at
c. in

2. Find the odd one out.


TROVA L’INTRUSO.
1. sauce, orange juice, water, bread: ______________________
2. steak, egg, cheese, wine: _____________________________
3. glasses, dress, skirt, blouse: __________________________
4. eye, heart, mouth, beach, ear: _________________________
5. flowers, forests, rivers, horses: ________________________
6. hockey, soccer, ballet, waterpolo: _______________________

65
03B guida Bit by bit_062-084.qxp_Layout 1 19/03/18 08:12 Pagina 66

3. Tick (✔) if these sentences are correct. Put a cross (✗) if


they’re wrong.
METTI UN TICK (✔) SE LE FRASI SONO CORRETTE.
UNA CROCETTA (✗) SE SONO SBAGLIATE.
1. You do like ham sandwiches. _______
2. Do they play tennis on Sunday afternoons? _______
3. He is got two dogs. _______
4. She isn’t a nice girl. _______
5. Does he work in a factory? _______

4. Subject personal pronoun or possessive adjective?


INSERISCI IL GIUSTO PRONOME PERSONALE SOGGETTO
O AGGETTIVO POSSESSIVO.
I – YOU – HE – SHE – IT – WE – YOU – THEY
MY – YOUR – HIS – HER – ITS – OUR – YOUR – THEIR
1. Jack and Linda are with ____________ parents today.
_________________ are very nice people.
2. Katie is only 12, but ____________ often goes out with
________________ friends in the evening.
3. Lucas is going out with ____________ friends tonight.
Are __________ going out too?

5. Tick (✔) if these sentences with the Saxon Genitive are


correct. Put a cross (✗) if they’re wrong.
METTI UN ✔ SE LA FRASE RISCRITTA CON IL GENITIVO
SASSONE È CORRETTA, O UNA ✗ SE È SBAGLIATA.
1. The windows of the house are green. ➞ The house’s
windows are green. ____
2. The car of Luke and Michelle is a Fiat. ➞ Luke’s and
Michelle’s car is a Fiat. _____
3. The bicycles of those men are very expensive. ➞ Those
men’s bicycles are very expensive. _____

66
03B guida Bit by bit_062-084.qxp_Layout 1 19/03/18 08:12 Pagina 67

6. Choose the correct question for the underlined part of the


answer.
SCEGLI LA DOMANDA GIUSTA PER LA PARTE SOTTOLINEATA
DELLA RISPOSTA.
1. Who is Mary’s teacher? – Whose is Mary’s teacher? –
Who is Mary’s teacher’s name?
Mary’s teacher is Mr Reds.

2. With who is Margaret? – Who is Margaret with? –


Who with is Margaret’s father?
Margaret is with her father in this moment.

3. When is your school? – Where is her school? –


Where is your school?
My school is in the city centre, opposite the church.

7. Choose the correct option.


SCEGLI L’ALTERNATIVA CORRETTA.
Greg and Sarah are married and have got two
daughters / childrens / son. They live in a big house
next to / under / between a supermarket. Upstairs (al piano di sopra)
there are / is / have got the bathroom, two bedrooms, and
an / – / a store room, downstairs (al piano di sotto) there is the
kitchen, the toilet and the living room.
Greg and Sarah’s / Greg’s and Sarah / Greg’s and Sarah’s
favourite room is their living room. It is quite big and his / its / it’s
walls are orange. From / In / On the middle of the room
their / they’re / there is a big circular table with six chairs.
Opposite the fireplace (caminetto) there is a grey sofa with
a / any / some white cushions (cuscini). Their cat usually
sleeps there. Would you like to meet they / their / them?

67
03B guida Bit by bit_062-084.qxp_Layout 1 19/03/18 08:12 Pagina 68

Livello B1 – Grammar

1. Complete the chart with the right words.


Will, Could, Perfect (3), Past continuous, Past simple

DIRECT SPEECH REPORTED SPEECH


Present simple …
Present continuous …
Past simple Past…
Present … Past…
Can …
... Would

2. Tick (✔) the right option.


1. If you … practise, you won’t pass.
a. don’t b. won’t c. will

2. They will be scolded if they… arrive late.


a. will b. / c. do

3. Paula’s daughters … fail their exams if they don’t study harder.


a. will b. won’t c. don’t

4. If she doesn’t apologise, I … talk to her again.


a. don’t b. won’t c. will

5. My phone plays a Leonard Cohen song when someone … me.


a. will call b. calls c. won’t call

68
03B guida Bit by bit_062-084.qxp_Layout 1 19/03/18 08:12 Pagina 69

3. Complete with the participle adjectives of these verbs.


ADJECTIVE + -ED / -ING
0. INTEREST: She’s INTERESTED in old books, she’s just
bought one.
1. TIRE: The journey was ___________________, it lasted
nearly ten hours.
2. EXCITE: I like windsurfing, it’s so ___________________.
3. FRIGHTEN: He was so ___________________ he couldn’t
speak.
4. AMUSE: He’s an ___________________ person. He always
tells jokes and stories.

4. Match the two parts of the sentences and add the correct
relative pronoun to complete them.
THAT – WHAT – WHICH – WHO – WHOSE
1. The film _____________________ ................
2. I’d never met a person ____________________ ................
3. My country house, ____________________ ................
4. Carl, ____________________ ................
5. This is ___________________ ................

a. I would like to receive for my anniversary.


b. speaks so badly before.
c. we saw yesterday won two Oscars.
d. wife you met last Christmas, has just left for India for two
months.
e. is in Lake District, is very old but I’ve renovated it.

69
03B guida Bit by bit_062-084.qxp_Layout 1 19/03/18 08:12 Pagina 70

Livello B1 – Reading Comprehension (Istituti Tecnici o Professionali)

1. Read the text.


THE DISTANCES TOURISTS TRAVEL AND THE SEASONABILITY1
OF THEIR TRIPS
Efficient and cheaper travel allows people to travel all over the
world as tourists. The numbers travelling tend to decrease with
distance. In the UK, Europe remains the most popular
destination, while in the USA, California and Florida are popular.
Some people enjoy returning to familiar places and following the
same routine year after year. Others search for new experiences
in unfamiliar locations. These people travel increasing
distances. The mountains of South America, the foothills2 of the
Himalayas and Antarctica have become tourists goals.
Tourism can be a very seasonal activity with people looking for
sunshine and coasts in the summer. In winter a significant
number of tourists seek out snow for winter sports. This
seasonability can cause problems for destination areas.
People managing resorts attempt to extend their season, for
example:
• seaside resorts use elaborate illuminations and put on
carnival events to attract visitors out of the season
• ski resorts have summer walking routes
• Mediterranean resorts offer long breaks for the over-60s
during cooler autumn and spring periods
• extensive indoor facilities provide resorts that are not
dependent on the weather.
Adapted from J. Hancock and Alan Bilham-Boult, Revise GCSE, Letts 2009, p. 176

Glossary
1. SEASONABILITY = stagionalità
2. FOOTHILLS = colline pedemontane

70
03B guida Bit by bit_062-084.qxp_Layout 1 19/03/18 08:12 Pagina 71

2. Now, say whether these statements are true (T) or false (F).
1. Both busy and quiet seasons pose problems for holiday
resorts. _____
2. Tourism develops everywhere. ______
3. Most people like unfamiliar locations. ______
4. Italy, France and Spain are popular destinations in Britain.
______
5. The numbers travelling tend to increase with distance. ______
6. People managing resorts try to attract tourists out of
season. ______
7. Few people like returning to familiar places. ______
8. In winter tourists stay at home. ______
9. People over 50 do not travel abroad. ______
10. Very few people enjoy skiing. ______

3. Match the first part of the sentence to the final one.

1. This e-mail message a. that any use of this


is intended… message is unauthorized
and may be unlawful.

2. If you are not the intended b. delete this message from


recipient, … your system.

3. … by replying to this message c. please, notify us


and then… immediately…

4. You are hereby notified… d. only for the use of the


individual or entity to which
it is addressed.

1. ______; 2. ______; 3. ______; 4. ______

71
03B guida Bit by bit_062-084.qxp_Layout 1 19/03/18 08:12 Pagina 72

Livello B1/2 – Reading Comprehension (Licei)

1. Read the text.


MUSIC IN LITERATURE
People who love both fiction and music might talk Hamlet-like
about whether to enjoy a book or some tunes in their free time.
But there’s a way to combine both!
I don’t mean reading and listening to music at the same time,
though you can do that if you don’t pay full attention to either. I
mean reading fiction containing some musical elements.
Music is so much a part of our lives that its presence in
literature can help readers relate to fictional situations and
characters. Also, characters who love music are often creative
people (as is the case with real-life music lovers), and creative
people tend to be quite interesting.
In addition, music can give us insights into what makes
protagonists tick: What do they listen to? Do they also sing,
write tunes and/or play an instrument? Does music set off
Casablanca-like memories in the minds of fictional characters
(as music can do in the minds of real-life readers)?
Music’s jogging of memory is quite profound in James Joyce’s
“The Dead.” That magnificent short story gets really interesting
when Gretta Conroy hears a song that sparks a melancholy
recollection of a major event in her youth. She subsequently
discusses this with her kind-of-stunned husband Gabriel, and
readers are reminded that we often don’t know everything about
the people we’re closest to.
Of course, there are also longer fictional works with major
musical elements. Five of many novels that come to mind are
Willa Cather’s The Song of the Lark, Colette’s The Vagabond,
Nick Hornby’s High Fidelity, Tom Perrotta’sThe Wishbones and
Jonathan Franzen’s Freedom.
Adapted from http://www.huffingtonpost.com/dave-astor/
music-in-literature_b_2590404.html

72
03B guida Bit by bit_062-084.qxp_Layout 1 19/03/18 08:12 Pagina 73

2. Now answer the following questions.


1. At the ver y beginning of the ar ticle is there an implied
quotation?
2. What does the writer suggest about people who read and
listen to music at the same time?
3. Why does the writer quote Casablanca? Can music help us
understand characters’ tastes?
4. Are music lovers more creative than other people?
5. Does the writer quote an Irish musician?
6. Does Gabriel Conroy know everything about his wife?
7. What does the song Gretta Conroy listens to remind her of?
8. Does the writer like a very famous short story taken from
Dubliners?
9. How would you translate “Music’s jogging of memory”?

3. Ask the questions for these answers about the passage.


1. ___________________________________________________?
No, the writer thinks that we often don’t know people
closest to us.
2. ___________________________________________________?
The article deals with the link between literature and music.
3. ___________________________________________________?
It means to activate.
4. ___________________________________________________?
The writer defines the short story as magnificent.
5. ___________________________________________________?
Yes, there are longer fictional works on this topic.
6. ___________________________________________________?
The film quoted stars Humphrey Bogart and Ingrid Bergman.
7. ___________________________________________________?
No, it is not taken from a British newspaper.
8. ___________________________________________________?
No, the short story quoted was written by James Joyce.
9. ___________________________________________________?
It is set in Ireland.
10. ___________________________________________________?
Yes, I’ve found it interesting.

73
03B guida Bit by bit_062-084.qxp_Layout 1 19/03/18 08:12 Pagina 74

Livello B1/2 – Writing

1. Prepare the pre-call checklist to call a supplier for your firm.


Here are some prompts:
PREPARA UNA LISTA DI CONTROLLO PRE-TELEFONATA
PER CHIAMARE UN FORNITORE PER LA TUA DITTA.
ECCO ALCUNI SPUNTI:
a. Who do I need to speak to?
b. What time zone is the receiver in?
c. ____________________________________________________
d. ____________________________________________________
e. ____________________________________________________
f. ____________________________________________________

2. Now try to write the phone call. Complete the dialogue.


ADESSO PROVA A SCRIVERE LA TELEFONATA,
COMPLETANDO IL DIALOGO.
The supplier’s secretary: ABC Ltd., how can I help you?
You: I’d like to _________________________________________
The supplier’s secretary: Who’s calling, please?
You: This is __________________ . It’s about _______________
The supplier’s secretary: Hold the line. I _________ put you
________ .
You: __________________________________________________
The supplier: __________________________________________
You: __________________________________________________

74
03B guida Bit by bit_062-084.qxp_Layout 1 19/03/18 08:12 Pagina 75

Livello B2 – Grammar

1. Match the sentences to the tenses.

1. This issue is dealt with a. Past simple active


c
in the second chapter.
2. Our hamster is being b. Past perfect passive
examined by the vet.
3. Paul looked into Miriam’s eyes. c. Present simple passive
4. My car was being fixed by d. Present continuous
the mechanic. passive
5. She’s been given a telling off. e. Past continuous
passive
6. Their flat had been broken into. f. Present perfect
passive

2. Tick (✔) the right option.


1. He… stealing my silver fountain pen.
a. denied b. refused c. said he didn’t

2. The twins… why they couldn’t come.


a. warned b. explained c. told

3. Susan’s niece… cheating at the maths test.


a. admitted b. agreed c. disagreed

4. I… my parents not to ground me.


a. promised b. begged c. prayed

5.The teacher… his students not to cram before the exam.


a. promised b. advised c. suggested

75
03B guida Bit by bit_062-084.qxp_Layout 1 19/03/18 08:12 Pagina 76

Livello B2 – Reading Comprehension (any kind of school)

HEALTH AND SAFETY CONCERNS ARE RESTRICTING


CHILDREN’S SCHOOL PLAYTIME
Survey shows children brought up ‘in cotton wool’ when they need
boisterous play, say experts
A generation of “cotton wool” children are growing up without
being exposed to risky play, experts have warned, as new
research finds that parents are increasingly concerned about
the health and safety culture in schools.
In a survey of more than 2,000 parents of primary school
children commissioned by Play England and the British Toy and
Hobby Association, almost three-quarters said they felt schools
were too concerned with health and safety during playtime. The
survey found the average child got just 37 minutes of time to
play in the school day.
Two-thirds of parents told researchers they felt this was not enough.
Dr Amanda Gummer, a psychologist who advises the
association, said: “‘Cotton wool’ children are growing up without
having been given the opportunity to learn how to assess risks.
Children have to have bumps and scrapes to teach them what’s
safe and what’s not; children who have all elements of danger
removed from their lives grow up to think they are invincible.
This doesn’t just affect the accidents they might have when
riding a bike or exploring a river, but it has a knock-on effect in
terms of drug culture and gang violence.”
Taken from https://www.theguardian.com/education/2010/sep/07/health-
and-safety-children-school-play

1. After reading this article, circle the best answer for each item.
1. “Cotton wool” children could be translated in Italian as: … .
a. bambini di bambagia
b. bambini di cotone
c. bambini fragili

76
03B guida Bit by bit_062-084.qxp_Layout 1 19/03/18 08:12 Pagina 77

2. Experts think… .
a. children should never be exposed to risky play
b. risky play is an opportunity to take risk and make mistakes
c. rough play should be forbidden
3. According to Dr Gummer… .
a. children shouldn’t get hurt while playing
b. children should not engage in any play involving physical
contact
c. children should be allowed to fall and get bruises
4. Children grow up to think they are invincible if… .
a. they never play outdoors
b. both parents and teachers protect them from any
possible accident
c. they are allowed to engage in physical play

2. Complete the following dialogue between a very anxious


mother complaining about her very lively little girl with her
pediatrician, using the information in the article.
Mother: Susan is my second eldest, so I only had her older
sister to compare with her. Since she was a toddler, she liked
running and fighting with boys.
Doctor: Why don’t you let her free to play and fight, children
have to _________________________________________________
Mother: But she _________ be able to sit still at least at dinner,
I always have to scold her.
Doctor: How long does the school break last?
Mother: It _______________________________________________
Doctor: It’s not _____________ . You should take her to a
playground after school.
Mother: But what if she ______________ hurt?
Doctor: Children should be allowed to _______________________
_________________________________________________________
Mother: But she could end up all black and blue!
Doctor: _________________________________________________

77
03B guida Bit by bit_062-084.qxp_Layout 1 19/03/18 08:12 Pagina 78

3. Choose the best option to fill in the gaps.


FAMOUS SAYINGS
Shakespeare was very clever with words. A lot of 1. lines / words
from his plays are very famous. For example, “Oh Romeo,
Romeo! Wherefore are thou Romeo?”, which Juliet says when
she is 2. standing / staying on her balcony. Everyone knows
this line, and where it comes 3. by / from . But there are a lot
of sayings in English which people 4. say / tell all the time
without realising that they come from Shakespeare. “All that
glitters is not gold” is a common saying. It means that some
things are simply not as good 5. like / as they seem to be at
first; it is used in The Merchant of Venice, from which another
saying is also taken: “A pound of 6. flesh / meat ”, phrase used
when people mean that 7. what / who people want from them
is too much.
The saying “It stinks to high heaven” began with Shakespeare,
when Hamlet’s uncle admits to himself that he has done
something 8. meaningful / dreadful by killing his brother.
People often say “There are more things in heaven and earth”
to mean that we cannot think of everything that might happen or
might exist. It comes from Hamlet again, when he is telling
Horatio that he really has seen the ghost of his father:
“There are more things in heaven and earth, Horatio, than are
dreamed 9. of / up in your philosophy”.
“A horse! A horse! My kingdom for a horse” is from Richard III.
Richard loses his horse and is desperate for another 10. pet / one ,
so offers his entire kingdom in exchange for it. It’s another
Shakespearean line which sometimes people use humorously,
saying things like “A drink, a drink! My kingdom for a drink!”.
Adapted from Longman Dictionary of English Language and Culture

78
03B guida Bit by bit_062-084.qxp_Layout 1 19/03/18 08:12 Pagina 79

4. Answer these questions with yes or no. Each expression in


bold print appears in the article.
1. If something stinks to high heaven, does it smell good?
2. If someone wants a pound of flesh, is he/she very angry?
3. When people say “All that glitters is not gold” are they
talking about jewels?
4. When people say “My kingdom for a drink” do they want to
show off their education”?
5. Is the saying “Oh Romeo, Romeo! Wherefore are thou
Romeo?” used when you fail to remember a name?

79
03B guida Bit by bit_062-084.qxp_Layout 1 19/03/18 08:12 Pagina 80

Livello B2 – Production

1. Read the text.


HEALTH HAZARDS FOR OFFICE WORKERS
Much progress has been made in the past decade in addressing
carpal tunnel syndrome and other repetitive stress injuries
through the use of ergonomic keyboards and computer stands.
But less focus has been given to correcting how people sit in
front of their screens all day, according to Brian McKeon, M.D.,
chief medical officer for the Boston Celtics and an orthopaedist
at the Boston Sports & Shoulder Center. Poor posture, coupled
with the natural process of losing bone density and flexibility as
we age, sets up a perfect storm for a host of back, neck and
shoulders problems.
The increasing popularity of portable computers only compounds
the problem, because “the design of laptops violates a basic
ergonomic requirement for a computer, because the keyboard
and screen should be separated”, according to the Cornell
University Ergonomics Web, which recommends a host of
posture-positive tips for laptop users. Bad posture is something
we don’t take as a serious matter, McKeon says. “If we treated
posture aggressively from the outset, shoulder, elbow and hand
injuries would dramatically decrease.”

Answer the questions about the passage above.


1. What does the passage deal with?
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________

80
03B guida Bit by bit_062-084.qxp_Layout 1 19/03/18 08:12 Pagina 81

2. What does McKeon complain about?


________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________

3. What are the consequences of poor posture?


________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________

81
03B guida Bit by bit_062-084.qxp_Layout 1 19/03/18 08:12 Pagina 82

B2 – Production: Essay

1. Speak about a wedding you’ve been to. Who was getting


married? What was the ceremony like? And the reception?
Glossary:
THE BRIDE la sposa
VEIL velo
THE BRIDEGROOM lo sposo
SUIT, TUXEDO (American English) smoking, abito da cerimonia
WEDDING RING anello nuziale
AISLE navata della chiesa
WEDDING CAKE torta nuziale
SUGAR ALMONDS confetti alla mandorla
LITTLE TULLE BAGS sacchetti dei confetti
RIBBON nastro
TO BE A GOOD OMEN essere di buon auspicio
COURSE portata

________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________

82
03B guida Bit by bit_062-084.qxp_Layout 1 19/03/18 08:12 Pagina 83

Griglia – Domande aperte

Parametri Descrittori Punti Quesiti


Primo Secondo Terzo

Aderenza Non coerente 0


alla traccia Coerente 1

Conoscenza Gravemente insufficiente 1


dei contenuti Insufficiente 2
Sufficiente 3
Discreta 4
Buona 5
Ottima 6

Complessità Minima 1
della struttura Sufficiente 2
linguistica
Buona 3
e del lessico

Totale 10

VALUTAZIONE COMPLESSIVA DELLA PROVA ......./10

83
03B guida Bit by bit_062-084.qxp_Layout 1 19/03/18 08:12 Pagina 84

Griglia – Essay

Parametri Descrittori Punteggio

Capacità Insufficiente 1
argomentativa Sufficiente 2
Buona 3
Ottima 4

Organizzazione Scarsa 1
dei contenuti Sufficiente 2
Buona 3

Complessità Minima 1
della struttura Sufficiente 2
linguistica
Buona 3
e del lessico

Totale 10

VALUTAZIONE COMPLESSIVA DELLA PROVA ......./10

84
PROGRAMMAZIONE DIDATTICA
MODULE 1 - THE BIRTH AND ROLE OF COMPUTERS

KNOWLEDGE/CONTENTS
Theory Vocabulary Grammar
Informatica e ICT Termini specifici Prefissi, suffissi e
ICT e la società per le attività al nomi composti
Computer computer

FILM: Bicentennial Man


LANGUAGE SKILLS
READING SPEAKING
Domande aperte Fare e rispondere a domande
Risposte vero/falso Relazionare alla classe/all’insegnante
Completare testi con le parole mancanti Descrivere immagini
Abbinare termini con il loro significato

LISTENING WRITING
Risposte vero/falso Completare tabelle
Abbinare affermazioni e persone Completare delle affermazioni
Completare testi con le parole mancanti Scrivere testi brevi e messaggi
COMPETENCES
Commentare una sequenza video
Dare il titolo ad un paragrafo
Discutere il ruolo della tecnologia nella vita di tutti i giorni
Completare/prendere appunti
Riassumere opinioni
Confrontare Mac e Pc
Descrivere grafici
STUDENT’S INDIVIDUAL WORK
ONLINE RESOURCES:
• Extra activities
• Letteratura (Never Let Me Go di K. Ishiguro)
• Eucip Core (Build: Fasi di sviluppo di un sistema informatico)
• First, part 1
ASSESSMENT
Units 1, 2, 3: Test formativi (standard e BES); Module 1: Test sommativi (standard e BES)

85

Bit By Bit.indb 85 19/03/18 08:31


MODULE 2 – THE BODY OF COMPUTERS

KNOWLEDGE/CONTENTS
Theory Vocabulary Grammar
Le component elettroniche del computer Verbi relativi ai Le frasi relative
La struttura del computer dispositivi di input
Le periferiche e output

FILM: Strange Days


LANGUAGE SKILLS
READING SPEAKING
Risposte aperte Fare e rispondere a domande
Risposte vero/falso Relazionare alla classe/all’insegnante
Completare testi con le parole mancanti Descrivere immagini
Abbinare termini e definizioni
Scegliere un titolo appropriato
Scelta multipla
Abbinare domande e risposte

LISTENING WRITING
Abbinare parole e immagini Confrontare tabelle
Risposte vero/falso Completare delle definizioni
Scelta multipla Scrivere brevi testi da appunti
Completare un testo con le parole mancanti Scrivere email formali e informali
Completare tabelle
Domande aperte
COMPETENCES
Relazione su un’indagine statistica usando un grafico
Classificare diversi tipi di software
Classificare dispositive di input e output
Giustificare le proprie scelte
Confrontare diversi tipi di stampanti
STUDENT’S INDIVIDUAL WORK
ONLINE RESOURCES:
• Extra activities
• Letteratura (The Machine That Won the War di I. Asimov)
• Eucip Core (Operate: Tipi di processori ed esecuzione delle istruzioni)
• First, part 2
ASSESSMENT
Units 4, 5, 6: Test formativi (standard e BES); Module 2: Test sommativi (standard e BES)

86

Bit By Bit.indb 86 19/03/18 08:31


MODULE 3 – THE MIND OF COMPUTERS

KNOWLEDGE/CONTENTS
Theory Vocabulary Grammar
Linguagggi di programmazione Termini Le frasi
La programmazione relativi alla ipotetiche
I sistemi operativi programmazione

FILM: Desk Set


LANGUAGE SKILLS
READING SPEAKING
Risposte vero/falso Descrivere tabelle
Abbinare termini e definizioni Descrivere con parole proprie
Completare testi con le parole mancanti Prendere parte ad una discussione
Risposte aperte Esprimere un’opinione

LISTENING WRITING
Risposte aperte Scrivere storie
Risposte vero/falso Scrivere brevi definizioni e testi
Correggere affermazioni errate Completare frasi e domande
Completare tabelle Completare testi con le parole mancanti
Abbinare affermazioni e persone Scrivere email informali
Abbinare paragrafi e titoli corrispondenti Completare il riassunto di un testo
Scelta multipla
COMPETENCES
Confrontare linguaggi di programmazione e software di traduzione
Progettare il layout di un sito web
Comprendere i simboli di un diagramma di flusso
Disegnare diagrammi di flusso
Descrivere gli elementi di base di un programma
Prendere appunti
Descrivere immagini
STUDENT’S INDIVIDUAL WORK
ONLINE RESOURCES:
• Extra activities
• Letteratura (Nineteen Eighty-Four by G. Orwell)
• Eucip Core (Plan: Soluzioni informatiche per le aziende)
• First, part 3
ASSESSMENT
Units 7, 8, 9: Test formativi (standard e BES); Module 3: Test sommativi (standard e BES)

87

Bit By Bit.indb 87 19/03/18 08:31


MODULE 4 – THE USES OF COMPUTERS

KNOWLEDGE/CONTENTS
Theory Vocabulary Grammar
I principali tipi di software Termini relativi La forma passiva
I software grafici al fotoritocco,
Altri tipi di software banche dati ed
effetti speciali
FILM: AI – Artificial Intelligence
LANGUAGE SKILLS
READING SPEAKING
Risposte aperte Rispondere a domande
Completare tabelle Discutere a coppie
Risposte vero/falso Descrivere tabelle
Abbinare parole e definizioni
Scegliere i sottotitoli per i paragrafi di un testo
Scelta multipla
Abbinare definizioni a immagini
Completare un testo con le parole mancanti
Completare un testo con le frasi mancanti

LISTENING WRITING
Completare testi con dati o parole mancanti Scrivere brevi testi
Completare tabelle Scrivere definizioni
Risposte aperte Scrivere lettere formali
Scelta multipla Scrivere domande
COMPETENCES
Progettare una pagina di foglio di calcolo con i voti scolastici
Progettare una banca dati per la classe
Ricercare informazioni specifiche
Scrivere una lettera di richiesta di informazioni per un corso di CAD
Classificare software per aziende
Simulare un colloquio con un esaminatore
STUDENT’S INDIVIDUAL WORK
ONLINE RESOURCES:
• Extra activities
• Letteratura (Do Androids Dream of Electric Sheep? di P. Dick)
• Eucip Core (Plan: Strumenti audiovisivi)
• IELTS, passage 1
ASSESSMENT
Units 10, 11, 12: Test formativi (standard e BES); Module 4: Test sommativi (standard e BES)

88

Bit By Bit.indb 88 19/03/18 08:31


MODULE 5 – LINKING COMPUTERS

KNOWLEDGE/CONTENTS
Theory Vocabulary Grammar
Reti di comunicazione Termini relativi Schema
Internet ad attività online riassuntivo dei
Condivisione in rete principali tempi
FILM: Lucy verbali
LANGUAGE SKILLS
READING SPEAKING
Risposte aperte Descrivere grafici
Risposte vero/falso Confrontare dati
Abbinare parole e immagini Discutere a coppie
Completare tabelle Fare e rispondere a domande
Completare un testo con le parole mancanti Confrontare immagini
Abbinare paragrafi e titoli
Abbinare parole e definizioni
Scelta multipla
LISTENING WRITING
Completare appunti Completare frasi
Completare un riassunto Scrivere un saggio comparativo
Completare tabelle Scrivere commenti
Completare un testo con le parole mancanti Scrivere un articolo
Risposte aperte Scrivere un resoconto
Riordinare delle istruzioni
COMPETENCES
Confrontare la trasmissione sincrona e asincrona
Confrontare diversi tipi di circuito
Confrontare diverse versioni di un software
Fare ricerche su Internet per completare una tabella
Analizzare tabelle
Leggere indirizzi di siti web in inglese
Descrivere il funzionamento di un motore di ricerca
STUDENT’S INDIVIDUAL WORK
ONLINE RESOURCES:
• Extra activities
• Letteratura (The Crystal Egg di H.G. Wells)
• Eucip Core (Operate: DNM-Domain Name System)
• IELTS, passage 2
ASSESSMENT
Units 13, 14, 15: Test formativi (standard e BES); Module 5: Test sommativi (standard e BES)

89

Bit By Bit.indb 89 19/03/18 08:31


MODULE 6 – PROTECTING COMPUTERS

KNOWLEDGE/CONTENTS
Theory Vocabulary Grammar
Le minacce per il computer Tipi di malware I comparativi e
La protezione del computer superlativi

FILM: The Imitation Game


LANGUAGE SKILLS
READING SPEAKING
Risposte aperte Parlare di esperienze personali
Abbinare paragrafi e titoli Discutere a coppie
Risposte vero/falso Descrivere grafici
Completare tabelle Discutere di somiglianze e differenze
Completare un testo con le parole mancanti Discutere di opzioni
Abbinare testi e immagini
Abbinare parole e definizioni

LISTENING WRITING
Risposte aperte Abbinare parti di frasi
Completare tabelle Descrivere diagrammi e processi
Completare riassunti e appunti
COMPETENCES
Confrontare tabelle
Descrivere esperienze personali con i virus informatici
Fare una presentazione con supporti audiovisivi
Confrontare diversi tipi di software antivirus
STUDENT’S INDIVIDUAL WORK
ONLINE RESOURCES:
• Extra activities
• Letteratura (Enigma di R. Harris)
• Eucip Core (Build: Procedure di sicurezza)
• IELTS, passage 3
ASSESSMENT
Units 16, 17: Test formativi (standard e BES); Module 6: Test sommativi (standard e BES)

90

Bit By Bit.indb 90 19/03/18 08:31


MAPS AND DIAGRAMS

Bit By Bit.indb 91 19/03/18 08:31


MOD 1 - THE BIRTH AND ROLE OF COMPUTERS
Unit 1 – Computer Science and ICT
C
O Theoretical study and practical Not just programming Computational
M problems thinking
P
U
T
E Computer
Multiple application domains Strategic
R Science

S Creativity
C
I
E Problem solving and Team-work activity Flexibility
N communication skills and
C resilience
E

ICT (1997)

Digital identity
I Computing (2014)

C
T
New fields: Goals: transparency, easy
telecommunications, robotics, bio-computing, access, competence
environment, energy, 3D virtual reality

L
D
I Digital literacy
I
T
G
E
I
R Skills for good netizens
T Education goals
A
A
C Coding
L
Y

F • security and privacy Research


R
I • health-care
E Priorities
E • robotics
S
L • artificial intelligence
E Societal
D • machine learning Excellent
A changes
S • networks and science
R
C communication Industrial
O • big data leadership
H
F • cloud computing

92

Bit By Bit.indb 92 19/03/18 08:31


Unit 2 – ICT and society
LIVING IN THE DIGITAL AGE

No barriers Pros Business development

Strengthened relationships Better solutions E-schools

Impact on interpersonal communication Cons Fake people

Loss of non-verbal communication Virtual distance Addiction

ICT AND SOCIETY

Benefits ICT and health Drawbacks


Obesity

Information RSI
Technology
Stress

Backache
Tools Efficient healthcare system Eye strain

ICT and work Ssmartworking


Machines and robots
Teleworking

Digital broadcasting Human resources platforms Global collaboration

Tools ICT, education and culture Advantages

• learning platforms • active participation


• Wikis • in-depth knowledge
• digital maps • real-life work experience
• cloud storage • increased motivation
• online labs • technical skills
• webinars • digitised libraries
• virtual classrooms • promotion of the cultural heritage

93

Bit By Bit.indb 93 19/03/18 08:31


ICT and the environment
Positive impacts Negative impacts

• mobility reduction • paper waste


• massive packaging reduction • e-waste
• monitoring Earth changes • pollution
• smart water management • global warming

Unit 3 – Computers

Conversion of decimal to
The Binary system Use of two digits: 1 and 0
binary: repeated division by 2

History of computers

c. 1946-55 c. 1955-64 c. 1964 - early 70s early 70s - early 80s 80s - today
1st generation 2nd generation 3rd generation 4th generation • AI
• vacuum • transistors • integrated • single chip • natural language
tube • assembly circuits microprocessor • quantum
technology languages • multiprocessors • IBM PC and computation
• ENIAC • magnetic • mainframes market revolution • nonotechnology
memories • minicomputers

Evolution of computers

Present Development Development Development Development Future: AI,


computers and storage of parallel of network of HCI quantum
and ULSI of memory processing capabilities computing,
technology devices nano-biological
computers

Types of computers
(big computers)

Supercomputers Mainframes Servers

• very expensive • multi-users services • server/client services


• high computational • big amounts of data • dedicated servers
performances storage • VPS
• speed of • very expensive
microprocessor • multiprogramming
measured in FLOPS

94

Bit By Bit.indb 94 19/03/18 08:31


Types of computers
(small computers)

Tablets PDAs Smartphones Smartbooks Phablets

• thouchscreen • difficulties • multitasking • birth in • 5-6 inches


interface to sync or • touchscreen 2009/2010 screens
• larger than backup • PDAs • entertainment • spectacular
smartphone, • manage functions purposes graphics
• shorter than personal • operating • small screen • portable as
notebooks data system sizes smartphones

Other types of
computers

Wearable computers Handheld computers: Embedded systems


e.g. QR and barcode
readers, Rfids

• smart clothing • multi-users services • integrated for specific


• fitness gear • big amounts of data tasks and instructions
• comunicative needs storage • ATM or Cash Machine:
• very expensive monitors customers’
• multiprogramming transactions

95

Bit By Bit.indb 95 19/03/18 08:31


MOD 2 – THE BODY OF COMPUTERS
Unit 4 – The electronics of computers

Integrated circuit
=
tiny component which contains many microelectronic devices for a specific function

Uses Construction Types

microprocessors silicon crystal monolithic

wafers
digital computer hybrid
memories doping

other electronic devices die

package

Transistor
=
miniature electronic component (semi-conductor)

Amplifier Switch

Microprocessor more switches together + operators =


= logic gates
integrated circuit of
billions of transistors instructions

Transmission media

Transmission
Cable Wireless

Twisted pairs
Infrared Radio frequency Microwaves
Untwisted pairs

Coaxial cable Antennae Satellites

Fibre optics

96


Bit By Bit.indb 96 19/03/18 08:31
Unit 5 – The structure of computers
Hardware Software
External Internal System software Application software
• peripherals • mother • operating General purpose Special purpose
• CPU board system • word processing • flight
• storage • audio/ • drivers • presentation simulator
devices video • utilities • modelling and data handling software • payroll
• memory cards • desktop publishing
chips • hard disk • video editing
drive • web browsers
• apps

The CPU
Main parts Machine cycle Factors of speed
• Central Unit (CU) • 1-2 I-time: fetch and decode • clock
• Arithmetic and Logic Unit (ALU) • 3-4 E-time: execute and store • cores
• Immediate Access Store (IAS) • cache

Computer memory
Primary Secondary Tertiary
• registers Magnetic Optical Solid state
• RAM • hard disk • CD • USB drive
Volatile Non-volatile Internal External
• ROM • magnetic • DVD • memory stick
• cache tape • Blu • flash card
• floppy disk Ray • memory

Unit 6 – The peripherals of computers

Peripheral Input/output devices


devices
Input devices Output devices

Manual devices Automated devices Manual devices Control devices

M Primary input devices


A Virtual keyboard Tracker ball
N
Keyboard Mouse
U
A Concept keyboard Touch ball
L
Other input devices Audio input: microphones
I
N
P • scanner (hand-held, flat bed, baggage) • digital camera
U • graphics tablet • web camera
T • video digitiser

97

Bit By Bit.indb 97 19/03/18 08:31


Primary output devices
M CRT
A
N TFT/LCD Monitors Printers
U
A LED Impact Non impact
L plasma OLED
dot matrix inkjet laser
O
U
T Multifunction
Other output devices I/O devices (headset)
P printers touchscreen
U
T
Multimedia projector Speakers, headphones

A
Automated input devices Control output devices
U C
T O
O N Sensors • barcode readers • actuators
M T • magnetic strip readers • motors
A R • MICR readers • buzzers
T O • OMR readers • lights
E L
• heaters
D

98

Bit By Bit.indb 98 19/03/18 08:31


MOD 3 – THE MIND OF COMPUTERS
Unit 7 – Computer languages

Programming languages

Low-level languages (more computer like) High-level languages (more human like)

Machine language Assembly language Translated by

No translation Translated by an A compiler An interpreter


assembler

Computer generations
First 1GL: machine language
generation • low-level language (LLL) – single machine dependent
(1940s-1950s) • fast to be executed: binary strings
• vacuum tubes for circuitry and magnetic drums for memory

Second 2GL: assembly language


generation • low-level language (LLL) – machine dependent
(1950s-1960s) • fast to be executed, written in mnemonics – converted by an assembler
• transistor-based computers

Third 3GL: high level languages (HLL)


generation • procedural languages – modular programming
(from 1960s to • interpreted or compiled
present) • not-machine dependent
• integrated circuits

Fourth 4GL: non-procedural languages


generation • machine independent
(1980s to 1990s) • query languages, markup languages
• microprocessors and personal computers

Fourth 4GL: higher Abstraction


generation • object-oriented languages
(1990s to • visual programming languages
present)
Fifth generation 5GL: natural languages
(1990s to • logical programming languages
present)

99

Bit By Bit.indb 99 19/03/18 08:31


Unit 8 – Computer programming
Procedural language Object-oriented language

Topdown instructions to Interaction with objects to


accomplish a task accomplish a task

Procedures, routines, Objects and classes of obiects


subroutines
Attributes and variables to
Risks of spaghetti code define state, methods to
define actions
More bugs, more
debugging time Modifiable, reusable

Main computer languages


C
C++ Unified Parallel C
F
C
A
M C shell
Lite-C
I
L C# Visual C
Y

HTML
Declaration Heading
H
T Basic tags Extra or graphic tags
M Root
From
L
Frame Table
Head Title Body

Java
Language
Platform
J
A
Source code (written in plain text)
V Virtual machine API
A
Compiled into
Libraries
byte code by JIT and executed by

P Beginner friendly
Python Slow
Y
T
H Dynamically typed
Flexible
O
N Difficult to maintain

100

Bit By Bit.indb 100 19/03/18 08:31


Java platform

API JVM
Java Application Programming Interface Java Virtual Machine
(i.e. libraries of compiled codes (i.e. a program that interprets Java
that can be used in programs) programs for the native O/S)

Java program JVM O/S

interprets VM bytecode
with a text editor

Text file JIT


mapping compiles runs the program

Writing computer programs

Algorithm Flowchart or pseudocode

1
Mapping a program

Mapping Writing Testing and documenting

Writing a program
2
Language Editor Compiler/Interpreter Code writing

Testing and documenting a program

Testing Debugging Documentation

Static Dynamic Errors User System


3

Syntax

Logic

Run-time

101

Bit By Bit.indb 101 19/03/18 08:31


Unit 9 – Operating systems

Supervisory programs
Functions Operating system
Service programs
manages hardware interface Types
Utility programs System aids
• single program • multi-programming/
• multi-user multi-tasking
• multi-processing • virtual storage
• multi-threading • virtual machine

Functions User interfaces Menu-driven

Graphical user interface (GUI)/WIMP

Made up of:
• windows • pointers
• icons • menus

Kernel

Unix Unix shell

Programs
Linux (open source)

Android (touch screen devices)

PCs: Windows
• 1.0 (mouse)
• XP(the most popular) servers mobiles:
• 7 (replaced Vista) • CE
• 8 (Metro design system) • Phone 7
• 10 (unified system)

PCs Macintosh Mobile devices iOS

Classic Mac Os Mac OS X

GUI Nexus, Unix

Linux kernel Ubuntu Unity desktop

GUI Gnome 3

102

Bit By Bit.indb 102 19/03/18 08:31


MOD 4 – THE USES OF COMPUTERS
Unit 10 – Main software

W
O WPS Office Microsoft Word
R
D
Main functions Word processor Main types Google Docs
P
R
O Text formatting Text editing Open Office Lotus Word Pro
C Writer
Other features
E
S
S Layout Revision Headers
O and footers
R

M. Excel
Open Office
Spreadsheet main types Calc
S Libre Office
P Google Sheets
R made up of
E Zoho
A Rows Columns
D
S which form
H
fonts numbers
E
E colour format data Cells which may contain text
T size formulae
conditional
formatting

Presentation software
Main types:
P
R • Power Point
E • Prezi,
S • PowToon
E • Preszentit
N Text • SlideRocket
T • Keynote
A made up of
T
with speaker images
I
O slides frames movie, sound
N without speaker animation effects

commentary

103

Bit By Bit.indb 103 19/03/18 08:31


C Notebook full-featured app
A Calendars, electronic diaries and notebook applications application handwriting app
L
E
N Calendaring software Electronic diary
D
A local network on a on a personal web-based
R app package desktop PC portable organiser application

Fields Relational
Database Types
Records Non-relational
D
A flat-file object- network
Data type
T oriented
A
B Text Integers Real numbers Dates Boolean
A
S
E User Database Application Database Management System Database
forms, reports, DBMS data files
queries, application data, database engine metadata
programs data schema

Unit 11 – Graphics software


P
D
A 2D graphics software
R
I Painting software Drawing software
A
N
W
T
I Bitmap/raster graphics Vector/object-based graphics
I
N (pixels in a grid) (separate objects)
N
G
G

Photo editing software Special features • enhancing


Scanner • restoration
E Sources • morphing
P D Main features
Digital Programs
H I • air brushing
O T camera
• red-eye removal
T I
O N PC (O/S) Web browser Online photo • cropping
G sharing • special effects
• brightness/contrast
• layers

104

Bit By Bit.indb 104 19/03/18 08:31


Desktop publishing
D
T
Page or pasteboard
P
Text frames Graphic frames

CAD
C Designs Activities Special uses
A
D Calculations Simulations Environmental Conceptual
Suggestions
(materials) impact reports designs

Digital mapping
Geography Information
M Mapping programs
System (GIS)
A
P Computer-Aided Cartography (CAC)
S
DTP CAD

Unit 12 – Other software programs

GPS • computer
• atomic clock
• radio
4 satellites above the horizon

G Trilateration
S1 S2 S3 S4
P
S
Altitude Mobile GPS
Triangulation receiver

Longitude
Ground receiver navigation
Latitude instructions

105

Bit By Bit.indb 105 19/03/18 08:31


• with computer + software = Virtual reality
sight and sound Purpose
• 3D image + haptics device =
V touch sensation
R Educational • games
T V • interactive
U I specified with stories
A D VRLM
L E
O Videogame
R G
Audiovisual apparatus Story
E A
A M
L E • arcade videogame • back story
Game
I S • cut scene
• videogame console
T
• handheld console • discussion
Y
• computer
• PDA
• smartphone

Effects in film-making

Live-action shooting Post-production


addition
M Mechanical effects Optical effects
F A
I K • visual effects (CGI)
L I • static images/landscapes
M N • architectural animation
G • anatomical models
• cloth and skin images
• interactive simulation
• visualisation
• computer animation

MIDI
M Standard works with
I interface
D SMF fle Notation Digital audio
I format software workstation
to connect a computer with
electronic instruments (DAW)

106

Bit By Bit.indb 106 19/03/18 08:31


Domotics
D
O Levels Architecture
M
O
1. intelligent objects • centralised
T
2. communicating intelligent objects • distributed
I
3. connected home • mixed
C
4. learning home smart home
S
5. attentive home

To improve production Goods coding


B S Business software
(CAM, CIM, CAD) (barcode, RFID)
U O
S F
I T Services
business management (EPOS, ATM)
N W
E A
S R • accounting software Marketing app
S E • office suite (QR code)
• enterprise software (ERP, CRM, SCM)

E
- with virtual learning
E-learning
L environment + LMS
E
A
R In class:
self-study/virtual classroom:
N • traditional setting + IWB
blended • computer-based training (CBT)
I • classroom performance
• web-based training (WBT)
N system (CPS)
G

107

Bit By Bit.indb 107 19/03/18 08:31


MOD 5 – LINKING COMPUTERS
Unit 13 – Communication networks

Telecommunications

Basic system:
transmitter transducer signal processor signal processor transducer receiver
(source) (microphone) (amplifier) (amplifier) (earphones) (destination)

Types Multiplex
(videoconferencing)

Simplex
(megaphone) Duplex
Broadcast (radio, TV)

Half-duplex Full-duplex
(walkie talkie) (telephone)

Methods of transmission

Point-to-point Network

Synchronous Asynchronous Circuit Packet


(full-duplex) (half-duplex) switching switching
(real-time, (no real-time,
voice) data/voice)

Networks
Types Components

Peer-to-peer Client-server • NIC


• hub
• router
• network switch
• bridge
• repeater
• gateway

108

Bit By Bit.indb 108 19/03/18 08:31


Types of networks
Physical/wireless Virtual

according to size VPN

• PAN • Intranet VPN


• HAN • Extranet VPN
• LAN • Access VPN
• CAN
• MAN
• WAN
• GAN

Communication protocols: TCP/IP


Level Name Protocols
4 Application layer HTTP, SMTP, FTP
3 Transport layer HTTP, UDP
2 Internet layer IP
1 Network access layer MAC addresses

Unit 14 – The Internet


History of the Internet
1969 ARPANET
1983 Internet
1990 End of ARPANET; first studies on the www
1993 Whitehouse and UN online
1995 The Coming Internet Tidal Wave (B. Gates); network service providers
2000 The rise and burst of the Internet bubble
2017 49,6% world Internet users

Internet connection and services

Internet connection Types of Internet services

Modem converts the analogue signal into • communication


digital and vice versa • e-commerce
• leisure
ISP temporary IP address=your PC • information retrieval
• education
sends request

DNS

109

Bit By Bit.indb 109 19/03/18 08:31


The World Wide Web, websites and web browsers

Web browser
www = collection of hypermedia loads

Hypertexts + other media A web page


+
processes
Annotated with HTML

HTML
Identified by URLs =
data in the browser window

Search engines and web search

Search engine User URL

Web spiders
Database

Wikis

Wiki Wiki Wiki Web

Wikipedia
Nupedia
Wikiquote & Wiktionary

Email

Email

Email client: Web based email:


• Outlook • Yahoo!Mail
• Outlook Express • Gmail
• Thunderbird • Hotmail

ISP (e.g. Libero, Tim, Tiscali, etc.)

110

Bit By Bit.indb 110 19/03/18 08:31


Cloud computing

Cloud computing Individuals: cloud storage

public
Organisations private
hybrid
SaaS
IaaS PaaS

Unit 15- Sharing online

Advantages
• free
• easy to access
• updated with new content
Types
• networking
Members
• microblogging
• public groups
Social networks • collaboration
• customers
• image and idea sharing
• employees
• live sharing
Business use • publishing
• advertising
• recruitment

Blog Forum Chat room


Private Business
Topic 1 Topic 2 Topic n
Message how-to post
list post
review Thread 1 Thread 2 Thread n
Answers

File sharing
Type of file Sharing system
peer-to-peer (P2P)
Network file sharing
Audio Video Image
(NFS)
file hosting service

111

Bit By Bit.indb 111 19/03/18 08:31


Smart TV
Stand-alone Set-top box

Services:

cable, satellite TV
web browsing
video-on-demand
streaming
social networking

VoIP

Skype (a type of VoIP)

Phone calls Instant messaging Videoconferencing

instant messaging
SMS text messaging + = microblogging
blogging

Apps: Widgets:
• native GUI
• web element
continuously running
• hybrid software that runs on user’s request +
to perform a task
• killer small
• legacy program

112

Bit By Bit.indb 112 19/03/18 08:31


MOD 6 – PROTECTING COMPUTERS
Unit 16 – Computer threats

IT threats
Bugs
Malware
Adware Spam

• malicious programs
• crimeware
• mobile malware
• network threats

Malicious programs

Damage Facilitate malicious attacks

Virus Worm Backdoor Rogue


(corrupts or deletes (consumes bandwidth, overloads security
programs and data) servers, damages host computers)

Crimeware Steals sensitive data

Steals money • cookies (non-malicious)


Steals sensitive data • identity theft

• dialer
• browser hijacker • keylogger
• ransomware • phishing
• rootkit
• spyware
• Trojan horse

Mobile malware

Also in computers Mobile specific Bluetooth hacking

• spyware • expander • bluejacking


• Trojan horse • ghost push • bluesnarfing
• worm • bluebugging

113

Bit By Bit.indb 113 19/03/18 08:31


DOS Network threats Destructive attack

Packet sniffing Unauthorised access

Port stealing Spoofing

Unit 17 – Computer protection

Cryptography

how it works Types Objectives

public private/ • confidentiality


key secret key • integrity
• non-repudiation
• authentication

plaintext encryption ciphertext decryption plaintext

Protection against risks

• antivirus software
• firewall
• user’s precautions

How to start and Troubleshooting


Best practices
stop the PC

How to store How to keep


and keep data the PC working

Network security, secure payments and copyright

Network security Copyright


Secure payments
• identification economic rights moral rights
(username/userID) secure secure website (royalties)
• authentication website secure server
(password) • paternity
(padlock+http://)
• authorisation • integrity

114

Bit By Bit.indb 114 19/03/18 08:31


REAL-LIFE TASKS

115

Bit By Bit.indb 115 19/03/18 08:31


Bit By Bit.indb 116 19/03/18 08:31
M1 Real-Life Task A computer history timeline

SITUATION
The history of computers is not apart from human History and it could be interesting to
relate the different stages of the history of computing with other historical and cultural
events. The purpose of the activity is to create a timelime of computer history where the
main events are related to other historical and cultural events.

WORK MODALITY: GROUP and CLASS WORK


Stage 1: work in groups to search the Internet and read materials to identify 10 major
events in computer history.
Stage 2: work as a class to agree on the 10 most important events.
Stage 3: work in different groups to find information about historical events, cultural
events, publication of books, films, other technical inventions, etc. for the chosen years.

ANALYSIS OF DATA
• Analyse the data found by the groups and decide which information is more relevant
for computer history.
• Organise the data into broad categories identified by the class.
• Analyse different types of existing historical timelines to choose the model that will
be used.
• Choose the appropriate software and images.

FINAL OUTCOME
The class will produce a historical timeline in which the 10 most important dates of
computer history are visually related to other important historical and cultural events.

SCHOOL SUBJECTS INVOLVED


English, Italian, History, Foreign Languages, Computing, Telecommunications.

117

Bit By Bit.indb 117 19/03/18 08:31


M2 Real-Life Task Choosing the right printer

SITUATION
Choosing the right printer is not easy as there are many available with different
characteristics and also the prices may vary considerably.

WORK MODALITY: INDIVIDUAL WORK


Stage 1: students ask themselves the following questions to guide them in their choice.

1. How much money can I spend?


2. Do I need a black and white or colour print?
3. Do I need a laser or inkjet printer?
4. Do I need a multifunction printer?

Stage 2: collect computer shop leaflets and/or visit websites to find out about models,
characteristics and prices.

ANALYSIS OF DATA
• Analyse the data gathered and choose the models that correspond to students’ needs
(see their answers to the questions in stage 1).
• Produce comparison tables to help make decisions.

FINAL OUTCOME
The students will be able to make their final decision and buy the printer that can better
satisfy their needs. They will also discover that other students will have made different
choices.

SCHOOL SUBJECTS INVOLVED


English, Mathematics, Business Administration, Computing.

118

Bit By Bit.indb 118 19/03/18 08:31


M3 Real-Life Task Writing a simple game for a smartphone

SITUATION
Writing computer code may sometimes seem an abstract and boring activity if the
students have to write pages of code without seeing any immediate results. Writing a
simple program for a smartphone can be a pleasant activity. The game chosen for this
activity is elementary: moving a ball on the screen.

WORK MODALITY: PAIR WORK


Stage 1: choose the programming language. If the students know Java, they can choose it.
Stage 2: decide on the characteristics of the ball (colour, size, initial position on the
screen).
Stage 3: decide on the movements of the ball.
Stage 4: write the code for these basic functions.
That is all. The purpose is to show that code produces something on screen.

ANALYSIS OF DATA
• See the results of the program on the screen of a smartphone.
• First of all, does the ball appear on screen? Is it the right size and colour? Where is
it? Can you move it?

FINAL OUTCOME
The final outcome of this activity is to show the game to teachers and classmates and
to show that programming is not simply writing lines of code, but something which
produces a visible result.

SCHOOL SUBJECTS INVOLVED


English, Computing, Telecommunications, Mathematics, Physics.

119

Bit By Bit.indb 119 19/03/18 08:31


M4 Real-Life Task Planning a database for the school library

SITUATION
Some school libraries still do not have a digital database of their books. It is possible to
use students’ expertise to create one.

WORK MODALITY: GROUP WORK


Stage 1: define what type of information each entry should contain, in other words the
categories that will be taken into account when classifying a book (e.g. author, title,
year of publication, publisher, language, etc.).
Stage 2: think of extra information that could be put in a related table (e.g. subject,
topic, short summary of content, etc.).
Stage 3: decide on a system of coding the books according to their characteristics (i.e.
capital letter for the surname of the author, etc.) and their position in the shelves.
Stage 4: give a code to each book in the library.
Stage 5: enter the data into the database.

ANALYSIS OF DATA
• Try searching the database to see if it works and, if necessary, correct wrong
information.

FINAL OUTCOME
A database of the school library is available to all the students. It has been hard work,
but it is also a great achievement.

SCHOOL SUBJECTS INVOLVED


English, Italian, other Foreign Languages, Computing, any other subject for which there
are books in the library.

120

Bit By Bit.indb 120 19/03/18 08:31


M5 Real-Life Task Creating a group for the class on Facebook

SITUATION
Young people use social networks to share thoughts, ideas, photos and videos. Why not
using it to share school materials or to help each other with homework?
The purpose of this activity is to create a group for the class so that photos, videos or
other materials are immediately available to all the members.

WORK MODALITY: GROUP WORK


Stage 1: decide the layout of the group account.
Stage 2: collect the materials that the students want to put on the site (e.g. photos from
the last school trip).
Stage 3: choose an administrator.
Stage 4: write a hello message.

ANALYSIS OF DATA
• Agree on the type of information that will be put on the site.
• Give roles to participants (e.g. one student is responsible for Maths, another one for
English, etc.).

FINAL OUTCOME
The group account is ready. Ask the student if they feel part of the group and if they
feel a sense of commitment. Remind them not to forget that this is just a medium of
communication, and that they should also meet their classmates face-to-face.

SCHOOL SUBJECTS INVOLVED


English, Computing, any subjects studied by the students (for the notes).

121

Bit By Bit.indb 121 19/03/18 08:31


M6 Real-Life Task Creating a blog on computer malware

SITUATION
There are different types of malware. Many people do not know how to deal with them,
while others may have found a solution. The purpose of this activity is to create a blog
dealing with malware: identifying different types and giving advice on how to neutralise
them.

WORK MODALITY: CLASS WORK


Stage 1: define the topics and the characteristics of the blog.
Stage 2: choose the appropriate software.
Stage 3: search the Net to find information on how to write blog entries.
Stage 4: each group concentrates on specific types of malware and looks for information
on them.

ANALYSIS OF DATA
• Start writing the entries on specific types of malware and how to neutralise them.

FINAL OUTCOME
When the blog is ready, it is essential to keep it up-to-date and decide who, in turn, will
answer the comments.

SCHOOL SUBJECTS INVOLVED


English, Computing, Law.

122

Bit By Bit.indb 122 19/03/18 08:31


UNIT TESTS

Bit By Bit.indb 123 19/03/18 08:31


Bit By Bit.indb 124 19/03/18 08:31
UNIT 1 Name ............................................................................................................................

TEST 1 Class ...................... Date ....................................................................................

1. Match the vocabulary with the correct definition.


 1. Virtual reality a. Images and sounds produced by a computer to represent a place
or a situation.
 2. Hacker b. Electronic texts, books and magazines.
 3. Implementation c. To make something more modern by adding new information.
 4. Netizen d. Someone who gets into other people’s computer systems.
 5. Broadband e. A person who uses the Internet.
 6. E-text f. The act of putting a plan into action.
 7. Cloudcomputing g. The quality of being able to return to a good condition after problems.
 8. Updating h. The application of electronic and digital technologies to cities and
communities.
 9. Resilience i. System that makes it possible for large amount of information to
be sent at the same time between computers on other electronic
devices.
10. Smart city j. Storing and accessing data and programs over the Internet.

......... /10
2. Fill in the gaps with the given words.
creativity • coders • software • digital • programming • sciences • coding • literacy •
website • combine

Coding in the Classroom: Why is Coding Important?


Code powers our digital world. Every (1) …....................................., smartphone app, computer
programme, calculator and even microwave relies on code in order to operate. This makes
(2) …..................................... the architects and builders of the (3) …..................................... age. Over the next
10 years it is estimated that there will be 1.4 million jobs in computer (4) ….....................................
and only around 400,000 graduates qualified to do them. Jobs not directly linked to computer
sciences – such as banking, medicine and journalism – will also be affected by the need for
at least an understanding of (5) …..................................... and coding. Linda Liukas, co-founder of the
most important (6) …..................................... workshop programme in the UK, believes that coding is
“the (7) …..................................... of the 21st century” and the need for people to speak the ABC of
programming is imminent. Liukas told IBTimes UK “Our world is increasingly run by software
and we need more diversity in the people who are building it. More importantly, writing
(8) …..................................... is about expression, (9) …..................................... and practical application.
Our kids should learn to bend, join, break and (10) …..................................... code in a way it wasn’t
designed to. It’s a whole generation of kids that will use code like our generation used words.”
Adapted from: http://www.ibtimes.co.uk/coding-classroom-what-coding-why-it-so-important-1463157- 29/08/2014

......... /10

125

Bit By Bit.indb 125 19/03/18 08:31


3. Choose the correct option.
Virtual reality (1) ….............. are becoming very popular among those teenagers who love

(2) ….............. and animations. They love virtual reality because this is a fantastic chance to
(3) ….............. using technology and without any adults around them. Some of these games are
(4) ….............. for Xbox 360, PS2 and 3 as well as Mac and PC, so, whatever (5) ….............. you use,
there is a Virtual Reality game for that. You can find a lot of different types of virtual reality
games, which also include virtual (6) …............... Simulation games often play an important role,
because they mimic or ‘(7) …..............’ real world activities but within a controlled environment.
The main purpose of these games is to (8) ….............., train or inform, but some of them were
invented just for fun. The main idea while projecting a new virtual reality game is to learn a
difficult subject in an (9) ….............. manner, making it easier to be learnt. We all have different
learning styles and a VR simulation game may be the ideal learning (10) ….............. for some
people. Furthermore, there are online simulation games which often contain complex rules
and relationships based on real life situations. Social interaction is a key feature of these
games.

1. a. games b. mobiles c. books d. play


2. a. draw b. environment c. graphics d. furthermore
3. a. find b. interact c. creativity d. games
4. a. available b. popular c. connection d. shop
5. a. username b. password c. console d. push
6. a. architects b. worlds c. internet d. surfing
7. a. simulate b. comedy c. act d. pretend
8. a. code b. program c. educate d. buy
9. a. virtual b. interactive c. uniformed d. educated
10. a. tool b. communications c. science d. study
......... /10

4. Are these statements true or false? Correct the false ones.


1. When the term ‘computer science’ was born, it indicated a new discipline which consisted
in programming, analysing and processing computer systems.
2. ICT is the acronym for ‘Institutions and Computer Technologies’.
3. ‘Digital literacy’ is the competence one acquires when studying literature and literary skills
on the computer.
4. ICT is a term used to refer to digital technologies and the aspects of collecting, storing,
processing, analysing and transmitting information and data with the right speed, accuracy
and security.
5. Some recent theories of education are considering the idea of adding coding as a school
subject.
6. Computer Science is the study of storage, transformation and transfer of information.
7. Human life has not been influenced by the fast-growing developments of Computer
Science.
8. Some researches in the CS field will be carried out in the future to develop up-to-date
protection plans.
9. The acronym FET stands for ‘Future and Emerging Technologies’.
10. Digital identity is a network or Internet equivalent to users’ ideas.
......... /20

126

Bit By Bit.indb 126 19/03/18 08:31


5. Define what ICT is and briefly talk about its functions and applications. Use no more
than 10 lines.
......... /20

6. Answer the questions.


1. Give a brief definition of the term Computer Science.
2. What are some of the fields of application of Computer Science?
3. Why are researchers in the CS working on up-to-date protection plans?
4. What do we mean by the word computing?
5. Who can have and what is a digital identity?
......... /10

7. Read the text and answer the questions.


What is VR? And AR?
Virtual and augmented reality replace or add computing to our real-world experience. Virtual
reality (VR) and augmented reality (AR) bring computers and the digital world to the real
world we can see, hear, and touch (smell and taste, of course, have yet to be translated
into computers!). Virtual reality uses sight, sound, and our sense of balance to create 100%
digital worlds we can move around in. Augmented reality, in contrast, adds a digital layer
to our real-world experiences, like, for example, attaching a small screen to glasses or a
heads-up display in a car that lets the driver view speed and other data as they drive.
The Pokemon Go game is augmented reality, letting you chase Pokemon in the real
world with your phone. While augmented reality is often useful – helping us do things
more efficiently or learn as we do things – virtual reality gets more attention because it
surrounds us with completely different worlds. It’s amazing to stand at the bottom of an
ocean and watch whales and jellyfish parade past when, in reality, we’re in our living room
or classroom. We can breathe in the digital water without scuba tanks. Reach up to touch
a jellyfish and it swims away. It’s so real, except it’s not. Virtual reality technology goes
back at least to flight simulators from the 1950s. Pilots used simulators to learn how to fly
and perfect their flying skills without the risk of crashing planes or the bother of waiting for
a storm to appear so that they could fly through it. 3D movies are another effort to make
movies immersive.
Adapted from: https://www.kidscodecs.com

1. What do virtual and augmented reality have in common?


2. What is the difference between virtual and augmented reality?
3. What do we need in order to experience augmented reality?
4. Can you give any famous examples of augmented reality?
5. Which of the two kinds of digital realities allows you to be in a complete different
environment?
6. Which one seems more similar to reality, virtual or augmented reality?
7. What are the origins of virtual reality?
8. Why did pilots use virtual reality simulators?
9. What’s the main purpose of augmented reality?
10. Why is virtual reality used in 3D films?

......... /20

Total score  ......... /100

127

Bit By Bit.indb 127 19/03/18 08:31


UNIT 1 Name ............................................................................................................................

TEST 2 Class ...................... Date ....................................................................................

1. Match the vocabulary with the correct definition.


1. Digital literacy a. It is the ability to provide and maintain an acceptable level of service
in the face of faults and challenges to normal operation.
2. Data b. It allows us to take a complex problem, understand what the problem
processing is and develop possible solutions.
3. Computational c. It is the ability to find, evaluate, utilise, share, and create content
thinking using information technology and the Internet.
4. Problem d. Massive volume of data that is so large it is difficult to process using
solving traditional database and software techniques.
5. Resilience e. Getting into someone else’s computer system without permission
and obtaining information or doing something illegal.
6. Updating f. Manipulation of input data with an application program to obtain desired
output such as an audio/video, graphic, numeric, or text data file.
7. Artificial g. The application of biological models or processes in structuring
Intelligence computer programs or programming.
8. Big data h. Adding new information or making corrections.
9. Cracking i. The process of working through details of a problem to reach a solution.
10. Biocomputing j. it is the ability of a computer to act like a human being.

......... /10

2. Fill in the gaps with the given words.


computing • Internet • cloud • computers • provide • connect • requests • page • share
• information

If Clouds are not Digital, What is Cloud Computing?


The internet is magic: turn on your phone or other computer and (1) …..................................... with
anyone anywhere in the world, find answers to most questions, and read the news. You might
hear people talk about the cloud as part of (2) …..................................... activity. What could that
mean? Clouds aren’t digital. While surfing on the (3) …....................................., the cloud is a set of
computers dedicated to (4) …..................................... data and services. It’s a fancy word, in a way,
for a collection of buildings around the world that host these dedicated (5) …......................................
When you call up a web (6) …..................................... or open an app on your phone, the Internet
routes your request for (7) …..................................... to the appropriate set of computers, or cloud, for
a response. One computer cannot handle all the traffic, but computers connected together to
(8) …..................................... the workload can manage millions of (9) …..................................... every second,
hour, and day. The (10) …..................................... makes it easy to provide lots of computing power
with minimal fuss setting up computers and handling traffic.
Adapted from: https://www.kidscodecs.com/cloud/
......... /10

128

Bit By Bit.indb 128 19/03/18 08:31


3. Choose the correct option.
In 1965, Ivan Sutherland, a computer-graphics pioneer, addressed an (1) …..................................... meeting
of engineers on the subject of (2) …..................................... reality. The ultimate virtual-reality display, he told
the audience, would be “a room within which the computer can control the existence of matter. A
chair displayed in such a room would be good enough to sit in and a bullet displayed in such a room
would be fatal.” Virtual reality has (3) …..................................... rapidly in the past couple of years. Yet the
(4) …..................................... is still very new, and Sutherland’s vision (5) …..................................... little closer to, well,
actual reality. During a recent demonstration, I found myself by turns atop a rocky peak and on a
gondola making my way up a mountain. The gondola ride gave me vertigo.
We react like that, experts say, because our brains are easily fooled when what we see on a
display tracks our head movements. They say that the brain hasn’t evolved to tell you it’s not real.
Much of the excitement about virtual reality has come from the (6) …..................................... community.
Who wouldn’t want to (7) …..................................... a game so completely? But gaming is just the start.
Google is testing Expeditions, a way of sending students to places like the Great Barrier Reef,
where they can (8) …..................................... scuba dive as part of a lesson on marine biology and ocean
acidification. Similar approaches may enhance professional (9) …......................................
Another possibility: Imagine that you’re unable to attend a family meeting. With a pair of glasses,
you’re in the middle of the action and everyone there wearing glasses can see you as though you’re
present. The whole thing is recorded, so you can replay the (10) …..................................... whenever you like.
Adapted from: http://www.theatlantic.com/magazine/archive/2015/10/virtual-reality-gets-real/403225/

1. a. local b. international c. university d. world


2. a. virtual b. environment c. graphics d. ICTs
3. a. play b. changing c. been d. advanced
4. a. Internet b. technology c. technological d. interest
5. a. seems b. look like c. appear d. performing
6. a. video b. play c. gaming d. race
7. a. experience b. life c. lived d. experiential
8. a. augmented b. virtually c. virtual d. swim
9. a. worked b. rehearsal c. train d. training
10. a. experience b. live c. experiencing d. meet
......... /10

4. Are these statements true of false? Correct the false ones.


1. Gathering information is the action of collecting information from different sources.
2. Retrieving information or data is the action of finding and getting back data or information
that has been stored in the memory of a computer.
3. ‘Processing’ is the action of designing and operating robots and robotic systems.
4. Theory of programming, numerical analysis, data processing and design of computer
systems are basic elements of computer science.
5. Computational thinking is the subject which allows students to learn how to invent new
computer programs.
6. Virtual-reality is the use of computer technology to create a simulated environment.
7. One of the objectives of the new application fields of ICTs concerns the impact on the
environment.
8. Cloud computing isn’t an application of Computer Science.
9. ICT refers to the developing digital technology and its aspects of gathering, storing, retrieving,
processing, analysing and transmitting data with the right speed, accuracy and security.
10. A digital identity is an online or networked identity adopted or claimed in cyberspace by an
individual, organisation or electronic device.
......... /20

129

Bit By Bit.indb 129 19/03/18 08:31


5. Define what Computer Science is and briefly talk about its long-term applications.
Use no more than 10 lines.
......... /20

6. Answer the questions.


1. Give a brief definition of the acronym ICT.
2. Where can we find ‘ICTs’?
3. What is a smart city?
4. What kind of equipment does the term ICT refer to?
5. Why are security protection plans so important in the development of communication
technology?
......... /10

7. Read the text and answer the questions.


What is VR?
The first example of VR that I saw was in 1987 at NASA, where my colleague was working
on VR environments for training future astronauts. It was really VR: I felt myself to be
immersed in a virtual world in which I could take action. The definitive goal of achieving
sensory immersion in a virtual environment, including a sense of presence, is obtained by
a combination of factors working together. Let’s get clear about the form of Virtual Reality.
Here are some of its basic characteristics: first, complete surround environment, in which
the range of view may vary according to the viewing device, but a participant must be
able to turn around, look up and down and see a complete environment; second, depth
perception, third, spatialised audio, not just stereo. Obviously, people move their heads
around when they are engaged in a virtual world. The auditory elements must match the
participants’ movements as well as the effects produced by the visual system. Fourth,
the participants movement should be divided into body and head movement. Fifth, natural
gesture and movement: the more natural the action, the greater the sense of presence.
Sixth, virtual environment should allow a narrative construction: by engaging in an
immersive virtual world with various elements and themes, a participant creates a story, or
many stories. Seventh, the principle of action: a participant must be able to take action in
the world and perceive the effects.
Adapted from: http://medium.com/@blaurel/what-is-virtual-reality-77b876d829ba#.l0iu4r3zr

1. When and where did the author see the first example of Virtual Reality?
2. Can virtual-reality be used for training? In so, give an example.
3. While experiencing virtual-reality, can you just see things or can you interact?
4. What’s the ultimate objective of virtual reality?
5. Does Virtual-Reality just show a world in front of you or 360°?
6. Is the virtual environment 2D or 3D? Why?
7. What is the audio like in a virtual environment?
8. Can a participant move his head around while moving in a virtual environment?
9. What should gestures and movements be like in a virtual environment? Why?
10. All in all, what can a participant do in a virtual environment?

......... /20

Total score  ......... /100

130

Bit By Bit.indb 130 19/03/18 08:31


UNIT 2 Name ............................................................................................................................

TEST 1 Class ...................... Date ....................................................................................

1. Complete the sentences using the given words


technology • global collaborations • teleworking • workplace • partnership •
digital broadcasting • management • flexibility • software packages • robotics

1. …..................................... is irrelevant in smart-working.


2. …..................................... has totally changed the way businesses work.
3. …..................................... is the new aim of modern way of working.
4. …..................................... are easier to start and maintain thanks to modern technology.
5. …..................................... allows the use of ICTs tool from a remote workstation.
6. …..................................... has changed the way in which products are manufactured.
7. …..................................... between companies are much easier thanks to technology.
8. …..................................... is the new system used by televisions and radios.
9. 
…..................................... can make decisions more easily thanks to Internet communication

systems.
10. …..................................... are developed to improve day-to-day work in all fields.
......... /10

2. Fill in the gaps with the given vocabulary.


Media • system • terms • out • online • Management • factors • earn • most • users

Choosing an Online Learning Platform


The type of (1) …..................................... learning system you choose will depend on what you want
your online program to “be”. That, in turn, depends on a number of (2) ….....................................
– what students should know and be able to do, technical considerations and the skills
of online instructors. Here is a little information to bear in mind when choosing an online
learning (3) “….....................................”.
Online learning is, in fact, remarkably uniform, at least in (4) …..................................... of its
platforms. For many people, a Learning (5) …..................................... System (LMS) is online learning,
but, though the LMS is only part of an online system, it is often the (6) ….....................................
prominent and visible. Since this is the platform through which teachers will teach and
students will (7) …....................................., it is extremely important to choose the LMS with care and
to allow (8) …..................................... (teachers and students) to use the system before choosing it.
When starting (9) …..................................... in online learning, three options for teaching and
learning are available online – learning management systems, social (10) ….....................................
applications, and web conferencing software. Many education institutions often use one or a
combination of these…
Adapted from: https://elearningindustry.com/choosing-online-learning-platform-makes-sense

......... /10

131

Bit By Bit.indb 131 19/03/18 08:31


3. Choose the correct option.
So, What is Smart Working?
According (1) …..................................... a recent study, smart working (2) …..................................... an approach
to working that focuses on output (3) …..................................... than input. In other words, the focus
is less on how you get the results, and more on the results themselves. So how is this really
different to what we’re doing now? In all organisations, results are what (4) ….....................................,
so, are we all applying ‘smart working’? (5) …....................................., organisations are already
claiming that they (6) …..................................... implemented ‘smart working’ policies and that they
have made a positive impact on employee engagement, productivity and their bottom line.
So, smart working initiatives (7) ….....................................: flexible working – both in terms of working
(8) …..................................... and location –, a greater (9) …..................................... of autonomy, virtual
teams, increased mobile communications technology, aligning personal objectives to business
objectives and creating the (10) …..................................... conditions for smart-working to work.
Adapted https://www.sdworx.co.uk/connection/articles/smart-working
......... /10

1. a. in b. at c. to d. on
2. a. defines b. speaks c. talks d. tells
3. a. better b. rather c. most d. first
4. a. important b. numbers c. appears d. matter
5. a. despite b. however c. because d. nevertheless
6. a. did b. have c. are d. can
7. a. include b. confirm c. contain d. insert
8. a. office b. job c. hours d. men
9. a. degree b. grades c. meaning d. team
10. a. idea b. interested c. cultural d. global

4. Are these statements true or false? Correct the false ones.


1. The strong effect of technology on the communication process has only positive aspects.
2. The term e-school refers to a new way of learning through integrated platforms, and new
learning resources and communication tools.
3. The term ‘virtual distance’ usually refers to people living abroad and contacting their
relatives through Skype or other social networks.
4. Smart watches and biosensors are two technological devices that allow us to track and
monitor our healthy or unhealthy lifestyle.
5. Repetitive strain injury (RSI) is a kind of illness caused by prolonged eye stress in front of
a screen.
6. Advanced technology hasn’t helped manufacturing companies to produce quality products
at low cost and in huge quantities.
7. ICTs are fundamental in the global marketplace, because they can allow reducing
environmental impact.
8. ICTs create smarter products which can be quickly adapted to changing demand.
9. Some people pretend to be someone else on social networks in order to take advantage of
other users.
10. An ergonomically designed chair, sitting at the correct height and taking breaks while
working on a computer are some of the ways to avoid obesity.
......... /20

132

Bit By Bit.indb 132 19/03/18 08:31


5. Explain what some of the positive and negative impacts of digital devices on
environment are. Use no more than 10 lines.
......... /20

6. Answer the questions.


1. What positive aspects does technology have on communication and relationships?
2. Has technology helped to find solutions to problems? How?
3. Has technology modified the school education system? How?
4. What negative impact has digital communication had on young people?
5. Can people be ‘addicted’ to technology? What are the risks of this kind of addiction?
6. Is it safe to trust anyone on social networks? Why/Why not?
7. Are there any health hazards from the excessive use of technological devices? Can you
give some examples?
8. Has technology changed radio and television? How?
9. Why are digital skills so important in new educational plans?
10. What is teleworking?
......... /10

7. Read the text and answer the questions.


Computer Use Improves School Readiness
Here’s some good news: recent research suggests computer use among preschool children
may actually improve their readiness for school and academic achievement. In one study of
122 pre-schoolers carried out in a Rural Head Start program1, children in the experimental
group were given the opportunity to work on a computer for 15-20 minutes per day with a
selection of developmentally appropriate educational software, while the kids in the control
(non-computer) group received a standard Head Start curriculum2. All children in the study
took four standardized tests at the beginning of the study and six months later to assess their
school readiness, visual motor skills, gross motor skills and cognitive development. The children
who worked on a computer performed better on measures of school readiness and cognitive
development than the children without computers. Also, kids who did computer work both at
home and at school performed better than kids who worked at a computer only at school.
1
Rural Head Start is a U.S.A. federally funded, no-cost, parent-focused program that serves low-
income children, aged 0-5, and their families.
2
Head Start is a program of the US Department of Health and Human Services that aims at
supporting low-income children and families by providing early education, nutrition, health and parent
involvement services.

Adapted from: http://www.allaboutvision.com/parents/children-computer-vision-syndrome.htm

1. What has recent research shown about the use of computer among pre-school children?
2. How many children did the research consider?
3. What were the children in the experimental group given?
4. What did the other children receive?
5. What did the children do at the beginning of the research? Why?
6. What did they have to do at the end of the study? Why?
7. What were the results regarding school readiness?
8. What were the results regarding cognitive development?
9. What were the results of children working on computers both at school and at home?
10. In your opinion, what does the research demonstrate?
......... /20

Total score  ......... /100

133

Bit By Bit.indb 133 19/03/18 08:31


UNIT 2 Name ............................................................................................................................

TEST 2 Class ...................... Date ....................................................................................

1. Complete the sentences using the given words.


lifestyle • hazards • routine • obesity • sensors • stress • injury • backache • pressure •
healthcare

1. A healthy …..................................... can be monitored thanks to a range of different technological


devices.
2. There are potential …..................................... when you stay in front of a computer too long.
3. Smart watches can give information about calories, pressure and workout …......................................
4. Children’s …..................................... can be caused by excessive time spent in front of video games.
5. …..................................... collect information to produce push notifications about calories, pulse
and pressure.
6. …..................................... might be caused by too much work and may lead to headaches,
depression or mental illness.
7. Repetitive Strain …..................................... is a general term used to describe the pain felt in
tendons caused by repetitive movement.
8. …..................................... might be caused by the wrong posture while working in front of a computer.
9. Smart watches can be sometimes used to monitor blood …......................................
10. …..................................... systems were made more efficient and responsive by ICTs.
......... /10

2. Fill in the gaps with the given vocabulary.


connectivity • classroom • format • cloud • carry • support • online • function • show •
hosted

Learning Management Systems


The most common (1) …..................................... for teaching online is a Learning Management System
(LMS). Learning Management Systems (2) …..................................... as an online (3) ….....................................
where instructors can hold discussions, upload readings, (4) …..................................... videos and
play audio, (5) …..................................... out learning activities, make announcements, assess and
grade student work. LMSs store and deliver materials developed in a variety of different
formats – everything from MS Office documents to videos and third-party applications. They
(6) …..................................... synchronous (at the same time) and asynchronous (not at the same
time) interactions between school and students. (7) …..................................... learning management
systems can be (8) …..................................... locally (i.e., kept on a server physically located at an
educational institution) or remotely, “in the (9) ….....................................” wherein the LMS company
(Moodle Rooms or a Moodle partner, such as Desire to Learn, or Blackboard) manages all
server-related issues. Wherever they are, LMSs demand high-speed (10) …..................................... and
large band.
Adapted from: https://elearningindustry.com/choosing-online-learning-platform-makes-sense

......... /10

134

Bit By Bit.indb 134 19/03/18 08:31


3. Choose the correct option.
Can Anyone Do Smart Work?
The short answer is, “yes, but no”. Yes, any business (1) …..................................... introduce smart
working to some (2) …....................................., but no – not just anyone can introduce smart working
without (3) …..................................... their own business (4) …..................................... and whether initiatives
such as flexible working or home working will be of any benefit to the workforce. HR, therefore,
is highly implicated, underlining its strategic importance to business performance. Any
business can introduce flexibility and autonomy to some degree, however. Smart working
initiatives don’t just accept the changing (5) …..................................... of technology in our working
lives, they (6) …..................................... HR teams to (7) …..................................... control of them in order to
maximise business (8) …..................................... and performance. In other words, if you are going to
introduce more flexible working practices, then your business – from top management down –
(9) …..................................... adopt a more flexible approach and even a (10) …..................................... trusting
culture, giving autonomy and, in effect, giving up a degree of control over employees in return
for better performance.
Adapted from: https://www.sdworx.co.uk/connection/articles/smart-working

1. a. be b. can c. have d. don’t


2. a. degree b. official c. computer d. levels
3. a. consider b. working c. operate d. considering
4. a. work b. conditions c. evolution d. manage
5. a. role b. emotion c. mind d. broadband
6. a. training b. permitting c. interrupt d. allow
7. a. take b. make c. fake d. doing
8. a. efficient b. enthusiastic c. efficiency d. slowness
9. a. has to b. mustn’t c. does d. has
10. a. most b. worst c. good d. more

......... /10

4. Are these statements true or false? Correct the false ones.


1. ICTs have changed society solely negatively.
2. Some researchers think that by 2020 Europe could suffer from a lack of ICT professionals.
3. Robotics has changed the way of working of manufacturing companies.
4. There could be some health risks while using computers, smartphones and other
technological devices.
5. No educational organisations are investing in the development of people’s ICTs skills.
6. Being trained in ICTs will be useless in the future.
7. Ergonomically designed chairs can help to prevent backache.
8. Investing in ICTs is not very important in the global marketplace.
9. Computers are never the cause of stress and nervous disorders.
10. Obesity is one of the possible effects of prolonged hours spent on the computer playing
computer games.

......... /20

135

Bit By Bit.indb 135 19/03/18 08:31


5. List and explain some of the pros and cons of living in the digital age. Use no more
than 10 lines.
......... /20

6. Answer the questions.


1. Has technology helped global collaborations and partnerships? How?
2. Does teleworking improve working conditions? How?
3. Is ICT important on the job market? Why?
4. Is ICT used in healthcare? How?
5. Can Repetitive Strain Injury (RSI) be caused by technology? How?
6. Speak about some mobile healthcare technologies (no more than 2 lines).
7. Why is an ergonomically designed chair very important while working in front of a computer?
8. How is children’s obesity connected to the use of technology?
9. In your opinion, can ICTs cause addiction? How?
10. Are there any negative environmental impacts while using digital devices?
......... /10

7. Read the text and answer the questions.


Computer Risks for Children
Like adults, children who spend many hours in front of a computer have a greater risk
of developing computer ergonomics problems and computer vision syndrome. Computer
ergonomics is the study of people’s efficiency at their computer work stations. Problems
with computer ergonomics are closely associated with computer vision syndrome, which
can affect children as well as adults, in fact too much unsupervised computer work may
cause vision problems for kids. Another potential problem of too much screen time (from
computers, e-readers, video games and smart phones) for children’s eyes is overexposure
to harmful blue light. All digital devices with viewing screens emit significant amounts of
blue light (also called “high-energy visible light” or “HEV light”) which might increase a
child’s risk of macular degeneration later in life. Though the sun emits significantly more
HEV light than computers and other digital devices, the added exposure to blue light kids
receive from these devices and how close these electronic screens are to a child’s eyes
for hours each day worry eye care providers for the potential eye damage over time. And
many eye care practitioners who specialise in children’s vision believe prolonged computer
use among children puts them at risk for progressive myopia. For these reasons, it’s a
good idea to set guidelines for children about the amount of time they spend in front of a
computer.
Adapted from: http://www.allaboutvision.com/parents/children-computer-vision-syndrome.htm

1. What are the risks for children who spend many hours in front of a computer?
2. What is computer ergonomics?
3. What is the computer vision syndrome?
4. What are the potential problems for children’s eyes of too much screen time?
5. What are the effects of excessive blue light on children’s eyes?
6. What are the other names of blue light?
7. Does the Sun emit ‘HEV light’?
8. What do eye care providers worry about?
9. What do eye care practitioners think?
10. What should parents do to avoid their children’s eyes being at risk?

......... /20

Total score  ......... /100

136

Bit By Bit.indb 136 19/03/18 08:31


UNIT 3 Name ............................................................................................................................

TEST 1 Class ...................... Date ....................................................................................

1. Explain the meaning of the given vocabulary.


1. Binary system
2. Bit
3. Byte
4. Digit
5. Conversion
......... /10

2. Fill in the gaps with the given vocabulary.


variable • clearer • interchange • bit • deterioration • analogue • richer • computers • digital
• transmissions

1. ASCII stands for American Standard Code for Information …................................................... .


2. …................................................... technology turns any information into electric pulses of variable
amplitude and frequency.
3. …................................................... technology changes data into binary digits.
4. Every …................................................... can correspond only to ON or OFF.
5. Analogue signals are continuous and …................................................... .
6. Analogue signals are …................................................... in detail, so they are better for audio and
video …................................................... .
7. Digital signals are more suitable for …................................................... .
8. Digital signal is less subject to …................................................... .
9. Digital signal permits a …................................................... communication.
......... /10

3. Choose the correct option.


1. Computers can’t understand analogue data input, so they need an …............ to turn this
information into something they can understand.
2. Analogue systems need to be equipped with a …............ to understand computer data.
3. ASCII is the most common format for text files in …............ .
4. Unicode is the format for text files used by …............ .
5. It is possible to transmit files from a code to another using a special …............ .
6. The first generation of computers in the early 1950s was based on …............ technology.
7. The second generation of computers in the early 1960s was based on …............ technology.
8. The third generation of computers in the early 70s saw the introduction of the new …............

technology.
9. The fourth generation of computers in the early 80s developed the first …............
10. The fifth and last generation of computer has introduced …............, software package
development, nanotechnology and AI (Artificial Intelligence).

137

Bit By Bit.indb 137 19/03/18 08:31


 1. a. output b. digital to analogue c. ASCII system d. analogue to
converter digital converter
 2. a. Unix system b. digital to analogue c. DOS system d. analogue to
converter digital converter
 3. a. digital devices b. analogical devices c. photos and audio d. output data

 4. a. UNIX b. Windows NT and c. UNIX and DOS d. Windows and


2000 systems DOS systems
 5. a. analogical b. converting c. converting d. changing byte
translator hardware software
 6. a. vacuum tubes b. transistors c. motherboard d. integrated circuits
 7. a. vacuum tubes b. transistors c. motherboard d. integrated circuits
 8. a. vacuum tubes b. transistors c. motherboard d. integrated circuits
 9. a. microchips b. single-chip c. parallel d. integrated circuits
microprocessor processing
10. a. microchips b. single-chip c. parallel d. integrated circuits
microprocessor processing

......... /10

4. Are these statements true or false? Correct the false ones.


1. At the moment researchers are working on the sixth generation of computers.
2. Sixth generation computers will respond more to natural language than to a machine one.
3. Sixth generation computers will be smaller but much more expensive.
4. ULSI technology allows a few hundreds circuit elements to be placed on a single chip.
5. The fifth generation of computers has achieved the development and simplification of
storage devices and memories.
6. The development of parallel processing, i.e. multiple processing operating simultaneously,
has never been achieved.
7. Artificial Intelligence is an essential part of the incoming sixth generation of computers.
8. The sixth generation of computers will focus on human-computer interaction.
9. The sixth generation of computers will enlarge the gap between machines and human
brain.
10. Artificial Intelligence, quantum computers and nano-biological computers will be combined
to reach the new frontiers of computer technology.
......... /20

5. Talk briefly about the most powerful types of computers listing their main characteristics
and usage. Use no more than 10 lines.
......... /20

138

Bit By Bit.indb 138 19/03/18 08:31


6. Answer the questions.
1. What is a personal computer?
2. What is a desktop?
3. What are the most common shapes of a desktop?
4. What is a workstation?
5. What is a laptop?
6. What is a netbook?
7. What are convertible computers?
8. What are tablets?
9. What is a Personal Digital Assistant?
10. What are Phablets?
......... /20

7. Read the text and decide if these statements are true or false. Correct the false ones.
Tech Now: Top Tablets for Kids and Teens
From educational apps to digital textbooks, tablets can be a great tool for teens and even
younger kids. Students can do just about everything they need on a tablet, especially if you
use it with a keyboard or keyboard for easy writing and note-taking. For younger learners, an
entire world of educational apps can appear right at their fingertips, along with easy access
to plenty of age-appropriate content to read or watch. If you know where to look, you won’t
have to spend a fortune to find a good one for the right price. Which tablet you get depends
on your student’s needs – and your budget. If you’re a budget-conscious shopper – and who
isn’t? – keep these buying tips in mind to keep the cost down:
• If used mainly at home or at school, you’ll need just a Wi-Fi-capable tablet, without an
additional 3G or 4G Internet option. As long as there’s access to a secure Wi-Fi, you
don’t need anything else.
• For average use, your student isn’t likely to need more than the lowest amount of storage
space – books, apps and homework assignments don’t take up a lot of space, so a 16GB
models should be more than enough. If your child works with videos or video editing, you
may want to consider more storage.
• Certified refurbished models are often as good as new and usually come with the same
warranty as a new product for a worthwhile discount. Look for these at MacMall, New Egg
or Amazon – to name a few.
Adapted from: http://www.usatoday.com/story/tech/2013/09/15/
tech-now-tablets-kids-teens-ipad-kindle-fire-leapad/2806055

1. Digital books can be read on tablets.


2. Tablets can be used as a virtual notebook to take notes.
3. Apps can be focused on the education of young children.
4. Educational apps are too expensive and are therefore not widespread among students.
5. Every student should get the same kind of tablet to use at school.
6. Budget-conscious shoppers should buy a tablet with a 3G or 4G Internet option.
7. The lowest amount of storage space is not enough for books, apps and homework assignments.
8. If children work with videos or video editing, they need bigger capability.
9. Certified refurbished models are reconditioned tablets costing less than new ones.
10. Certified refurbished tablets have the same characteristics and prices of new models.
......... /10

Total score  ......... /100

139

Bit By Bit.indb 139 19/03/18 08:31


UNIT 3 Name ............................................................................................................................

TEST 2 Class ...................... Date ....................................................................................

1. Explain the meaning of the given vocabulary.


1. Analogue signal
2. Digital signal
3. ADC
4. ASCII system
5. Unicode
......... /10

2. Fill in the gaps with the given vocabulary.


integrated circuits • devices • hardware • software • evolution • vacuum tube • transistor
• dimensions • the first • memories

1. The .................................. of computers can be classified into generations.


2. Scientists have always tried to develop smaller, cheaper, more powerful and efficient
...................................

3. The first changes to computers were simply related to ...................................


4. The modern changes to computers are related mostly to ...................................
5. Charles Babbage’s Analytical Engine was considered .................................. computer.
6. .................................. technology was the main point of the first generation of computers.
7. .................................. technology was the essential element of the second generation of

computers.
8. The second generation of computers had smaller ...................................
9. The first magnetic .................................. were placed in the second generation of computers.
10. The new .................................. technology was the basis of the third generation of computers.
......... /10

3. Choose the correct option.


1. ................. computers were still very large and very expensive in the early 70s.
2. INTEL Corporation developed the first ................. microprocessor.
3. In August 1981 IBM released the first ................. computer, which represented a revolution in
the computer market.
4. Fourth generation computers were generally simpler to operate, smaller, ..................
5. INTEL Corporation developed the ................. at the beginning of the 80s.
6. ................. was an essential element of fifth generation computers.
7. Scientists are working on new devices that respond to natural language in the .................
generation of computers.
8. ULSI technology stands for ..................
9. ULSI technology is made up by more than about one million ................. on a single chip.
10. ................. were developed and simplified in the current generation of computers.
......... /10

140

Bit By Bit.indb 140 19/03/18 08:31


1. a. mainframe b. personal c. fifth-generation d. transistors
2. a. single-transistor b. vacuum tube c. single-chip d. circuit
3. a. mainframe b. personal c. generational d. parallel
4. a. slower and b. faster and c. modern and d. faster and more
cheaper cheaper expensive expensive
5. a. five-chip b. single-transistor c. single-chip d. hardware
microprocessor microprocessor microprocessor
6. a. analysing b. delivery c. saving d. parallel processing
7. a. sixth b. seventh c. fourth d. second
8. a. Unique Large- b. Ultra Large-Scale c. Ultimately Lease d. Ultra Light Super
Scale Interaction Integration Standard Integrated Innovative
9. a. vacuum tubes b. transistors c. software d. circuit elements
10. a. circuits b. storage devices c. motherboards d. chips
and memories
......... /10

4. Are these statements true or false? Correct the false ones.


1. Ar tificial Intelligence is an innovative element of the 3rd generation of computers.
2. The word ‘computer’ refers to any device that has a microprocessor in it.
3. Computers are catalogued according to their size, expected performances or capability.
4. Supercomputers are very cheap computers that perform arithmetic calculations.
5. Weather forecasting or nuclear energy researches are carried out by supercomputers.
6. FLOPS is the common unit used for stating the speed of microprocessors.
7. FLOPS stands for Filling Perfect Operation Per Second.
8. Mainframe computers are mainly used by big companies and organisations.
9. Time processing in mainframe computers is measured in seconds.
10. Mainframe computers can perform on different operating systems simultaneously.
......... /20

5. Talk briefly about the two most common types of personal computers (desktops
and laptops) listing their main characteristics and usage. Use no more than 10 lines.
......... /20

6. Answer the questions.


1. What is a server?
2. What are wearable computers?
3. What are ATMs?
4. What are barcode readers?
5. What is a QRcode reader?
6. What is a Rfid?
7. What are Embedded Computers?
8. What is the binary system?
9. What is a byte composed by?
10. What is ASCII code used for?
......... /20

141

Bit By Bit.indb 141 19/03/18 08:31


7. Read the text and decide if these statements are true or false. Correct the false ones.
Hybrid or Convertible Laptop?
Since the release of Windows 8, there has been a greater emphasis on having a touch
enabled screen for the user interface. One of Microsoft’s goals with the new software
release was to unify the user experience between a desktop, a laptop and a tablet computer
system. One way that manufacturers are addressing this is by producing a new style of
laptop called either a hybrid or convertible. In essence, a hybrid or convertible laptop is any
type of portable that can essentially function as either a laptop or a tablet computer. The
most common method to create a convertible laptop is to create a touchscreen display
that opens out of a clam shell design like a traditional laptop. To convert the laptop into
a tablet, the screen is then either rotated or flipped so that it is then back into a closed
position but with the screen exposed. Tablet computers aren’t really new. Back in 2004,
Microsoft released their Windows XP Tablet software that didn’t really catch on as the
touchscreen technology was still relatively expensive and rudimentary and the software not
well optimised for the interface.
Of course, there are drawbacks to convertible laptops. The first and foremost problem
is their size. Unlike tablets, the convertible laptops must be larger in order to include
the keyboard and peripheral ports required. This of course means that they can be a lot
heavier than a straight tablet. This generally makes them larger and heavier than a tablet,
while not being easy to use for extended periods of time. Instead, they are more flexible
when it comes to using them in non-traditional modes. With the increasing technology
advancements in terms of low power consumption and less heat generated, laptop
computers continue to get smaller. As a result, there are now a wide range of convertible
laptops available on the market that are much more functional as tablets than they were in
the past. In addition, there is also a trend in the new 2-in-1 style of systems. These differ
from the convertible or hybrid because they tend to have all of the computer components
inside a tablet and then feature a dockable keyboard that allows it to function as a laptop.
The problem is that they generally sacrifice some performance in order to get to that size.
The advantage, of course, is that you would not necessarily need to carry two devices.
Adapted from: https://www.lifewire.com/what-is-hybrid-laptop-832336

1. Windows 8 has allowed the combination of a desktop, a laptop and a tablet computer
system experience.
2. Hybrid is another name for a tablet.
3. A convertible laptop turns from a laptop into a tablet by rotating or flipping the
touchscreen.
4. The tablet computer is a new invention.
5. The first Windows XP Tablet software was immediately successful because it was cheaper
than a normal laptop.
6. Hybrid laptops only have positive aspects.
7. Hybrid laptops are usually heavier and larger so as to include the keyboard and peripheral
ports required.
8. A lot of modern laptops are becoming smaller and developing touchscreen technology.
9. There is no difference between hybrid computers and modern laptop technology.
10. Modern laptops generally have to sacrifice something in order to be reduced in size.

......... /10

Total score  ......... /100

142

Bit By Bit.indb 142 19/03/18 08:31


UNIT 4 Name ............................................................................................................................

TEST 1 Class ...................... Date ....................................................................................

1. Give a definition to the given vocabulary.


1. Printed circuit board
2. Amplifier
3. Memory chip
4. Capacitor
5. Wafer
......... /10

2. Match each noun to the correct definition.


resistor • switch • transistor • fuse • light bulb

1. A .............................................. works by incandescence, which is the emission of energy caused by


heating the filament.
2. When a .............................................. is in an electronic circuit and the current exceeds the rated
level, it blows, thus breaking the circuit and preventing the excessive current from flowing
through.
3. A .............................................. is an electrical component that can break an electrical circuit,
interrupting the current or diverting it from one conductor to another.
4. A .............................................. is an electrical component that reduces the electric current.
5. A .............................................. is a semiconductor device used to amplify or switch electronic
signals and electrical power.
......... /10

3. Give a heading to these paragraphs, then briefly summarise their content (no more
than one line).
How Transistor Radio Changed Society
1. As World War II started, Winston Churchill knew that the conflict would be fought on two
fronts – on the battlefield and in the scientific lab. Within the technology developed during
wartime, the most important innovation was radar, which led eventually to the transistor.
It was in December 1947 that engineers John Bardeen, Walter Brattain, and William
Shockley experimented the transistor, the building block for all modern electronic devices,
at Bell Labs headquarters in Murray Hill, New Jersey.
2. While the devices of the time relied primarily on the more delicate, energy-inefficient
vacuum tube technology, the transistor, which used semiconductor materials to amplify
electronic signals, allowed the manufacture of products that were smaller, more durable,
and more easily produced. For this reason, the three scientists were awarded the 1956
Nobel Prize in Physics.
3. After a few years, this scientific innovation was applied to consumer products. The answer
came in 1951, when two companies teamed up to begin researching a new idea: a small,
portable radio. Texas Instruments supplied the transistors to Idea Inc., which designed,
produced, and – three years later – finally presented the Regency TR-1 in November 1954,
just in time for the holiday-shopping season. It was small and its cover was in red plastic,
the radio originally cost $50 – about $400 today.

143

Bit By Bit.indb 143 19/03/18 08:31


4. Almost immediately, the new product began to change the way in which Americans listened
to their music. At first, listening to the radio was a family activity and everyone gathered
around a single static machine. However, after this scientific innovation was turned into
a consumer product, listening to the radio became a solitary activity, as the radio could
follow people wherever they went.
5. Today, a person only needs to plug their headphones into their iPhone to appreciate the
significance of the transistor radio. The similarity to the 1954 transistor radio – a music-
playing device in a small box made of plastic, – makes us believe that the old belief that “the
more things change, the more they stay the same”, is indeed true. And as Apple predicts
strong sales for its newest models, Radio Shack and Amazon have recently begun to carry a
line of vintage-style transistor radios – just in time for the holidays, 60 years later.
Adapted from: http://www.smithsonianmag.com/smithsonian-institution/sixty-years-ago-the-regency-TR-1-
Transistor-Radio-Was-the-New-It-Gift-For-the-Holiday-Season-180953345/

......... /20

4. Choose the right option.


1. Transistor/Microchip/Integrated circuits essentially recreate a complete microscopic circuit
on the surface of a piece of silicon.
2. The major uses of ICs/light bulbs/resistors are for computer microprocessors and
electronic devices of very small size.
3. The size of a computer electric plant would be huge/tiny/small without the invention of
integrated circuits.
4. Each time new current flows through, the transistor/microchip/fuse flips on or off.
5. Optical fibre/A capacitor/A wafer is resistant to electromagnetic interference.
......... /5

5. Say if the statements are true or false and correct the false ones.
1. An integrated circuit is a very small component which contains many microelectronic
devices for a specific function.
2. Printed glass connections link resistors and capacitors together in an integrated circuit.
3. Computers require eight electronic switches to store a single byte.
4. A raw chemical element known as silicon is doped in order to obtain an integrated circuit.
5. Wafers are the eight electronic switches used to store a single byte in a computer.
......... /5

6. Explain the function of transistors in a computer. Use no more than 10 lines.


......... /20

7. Answer the questions.


1. What are transmission media?
2. What are untwisted pairs and what are their main characteristics?
3. What are twisted pairs and what are their main characteristics?
4. What is a coaxial cable?
5. What are coaxial cables usually used for?
6. What is optical fibre?
7. What is an infra-red communication system?
8. What is an antenna used for?
9. Why are satellites used in communication?
10. What are microwaves usually used for?
......... /20

144

Bit By Bit.indb 144 19/03/18 08:31


8. Read the text and say if the given statements are true or false. Correct the false ones.
Claude Shannon’s Work
Claude Shannon’s work ties two topics together: binary numbers and circuit design and in
fact, without Shannon, computers and computer science could have been very different.
Claude Shannon is a key figure in US computer science, electrical engineering, and a
number of related fields. He was born in Michigan in 1916. Shannon graduated from the
University of Michigan in 1936 with two degrees, in engineering and mathematics. That year
he started to work at the Massachusetts Institute of Technology, where he worked on V.
Bush’s ‘differential analyser’, one of the first analogue computers. While working on Bush’s
complicated circuits, Shannon realised that the ideas of Boolean algebra, an equation
theory based on two values, could be used to simplify the circuits, so he wrote his masters
thesis at MIT on how Boolean algebra could be applied to circuit design.
While studying at MIT, he also worked as a researcher at the Institute for Advanced
Study at Princeton, where he studied ideas that led to his key contributions to digital
communications theory. During World War II, he worked at Bell Labs on fire-control systems
and cryptography. In this period, he was in contact with Alan Turing, the British cryptanalyst
and mathematician, when Turing visited the US to share British methods of breaking
German codes. After the war, at Bell Labs, Shannon worked on digital communications
theory, publishing a key work, A Mathematical Theory of Communications, which eventually
led others to the development of microprocessors used in every computer, as well as
networks. He also studied and wrote about cryptography, game theory, and machine
learning.
Adapted from: https://www.kidscodecs.com/claude-shannon/

1. Claude Shannon’s work connects binary numbers theories to circuit design.


2. Computers and computer science haven’t been influenced by Shannon.
3. Claude Shannon is one of the most important characters in the field of US computer
science.
4. Claude Shannon graduated three times in 1916.
5. When he obtained a degree in engineering and mathematics he started working at MIT.
6. He invented the differential analyser, one of the first analogue computers.
7. Shannon’s idea was to use Boolean Algebra to make circuits less complex.
8. At Princeton, he studied Boole’s theories on digital communications.
9. Shannon never had the chance to hear about Alan Turing, the British cryptanalyst and
mathematician.
10. Shannon’s work, A Mathematical Theory of Communications, was never used in computer
technology.

......... /10

Total score  ......... /100

145

Bit By Bit.indb 145 19/03/18 08:31


UNIT 4 Name ............................................................................................................................

TEST 2 Class ...................... Date ....................................................................................

1. Give a definition to the given vocabulary.


1. Integrated circuit
2. Die
3. Resistors
4. Motherboard
5. Switch
......... /10

2. Match each term with the correct definition.


wire • capacitor • switch • inductor • battery

1. A .............................................. is a component which controls the open-ness or closed-ness of an


electric circuit.
2. A .............................................. can change chemical energy to electricity by putting certain
chemicals in contact with each other in a specific way.
3. A .............................................. is an electronic component that stores electric charge.
4. A .............................................. is nothing more than a conductor wrapped up in a jacket of
insulation. This insulation prevents it from making unwanted contact and also prevents you
from making unwanted contact and giving yourself a shock.
5. An .............................................. is a passive electronic component that stores energy in the form of
a magnetic field. In its simplest form, it consists of a wire loop or coil.
......... /10

3. Give a heading to these paragraphs, then briefly summarise their content in no


more than one line.
The History of the Integrated Circuits
1. Our world is full of integrated circuits, for example, you can find several of them in the
microprocessor of a computer. The microprocessor is an integrated circuit that processes
all information, keeps track of which keys are pressed and if the mouse has been moved.
It counts numbers and runs programs, games and the operating system. Integrated circuits
are also found in almost every modern electrical device such as cars, television sets, CD
players, cellular phones, etc.
2. Before transistors, engineers had to use vacuum tubes, which can switch electricity on or
off, or amplify current like a transistor. The vacuum tube looks and behaves very much
like a light bulb, it generates a lot of heat and has a tendency to burn out. Furthermore,
compared to the transistor, it is slow, big and bulky. The first digital computer, for example,
was a huge monster weighing over thirty tons, and it consumed 200 kilowatts of electrical
power, with around 18,000 vacuum tubes constantly burning out.
3. When the transistor was invented in 1947, it was considered a revolution. Small, fast,
reliable and effective, it quickly replaced the vacuum tube. However, as the complexity
of the circuits grew, problems started arising. Engineers soon realised that manually

146

Bit By Bit.indb 146 19/03/18 08:31


assembling the vast number of tiny components needed, for example, in a computer, would
be impossible, especially without generating a single faulty connection. Advanced circuits
contained so many components and connections that they were virtually impossible to build.
4. In the summer of 1958 Jack Kilby at Texas Instruments found a solution to this problem.
He found out that the path Texas Instruments had chosen for a miniaturisation project
didn’t seem to be the right one. His idea was to make all the components and the chip out
of the same block (monolith) of semiconductor material. In September 1958, he had his
first integrated circuit ready. It was tested and it worked perfectly. Jack Kilby received the
Nobel Prize in Physics in the year 2000.
5. Half a year after Kilby’s invention, Robert Noyce came up with his own idea for the
integrated circuit. Noyce’s circuit solved several practical problems that Kilby’s circuit
had, mainly the problem of interconnecting all the components on the chip. This made
the integrated circuit more suitable for mass production. Besides being one of the early
pioneers of the integrated circuit, Robert Noyce was also one of the co-founders of Intel.
Intel is one of the largest manufacturers of integrated circuits in the world.
Adapted from: http://www.nobelprize.org/educational/physics/integrated_circuit/history

......... /20

4. Choose the correct option.


1. A printed circuit board is similar to/different from/the same as an electric street map.
2. Printed copper connections link electronic components/switches/inductors together.
3. To make it possible to connect the transistor/vacuum tube/IC, we need a package to
encapsulate the die.
4. Conductors/Logic gates/Switches let computers make very simple decisions.
5. Since no electricity passes through satellites/optical fibres/coaxial cables, they cannot
cause sparks.
......... /5

5. Say if the statements are true or false and correct the false ones.
1. The die is encapsulated in a bag, to connect it to the IC.
2. Hybrid circuits contain transistors, diods and monolothic circuits.
3. Wafers are made of silicon.
4. Transistors are very small electronic components that are made of copper.
5. An amplifier is an electronic device that increases the voltage, current, or power of a signal.
......... /5

6. Explain what optical fibre is and compare it to coaxial cable. Use no more than 10 lines.
......... /20

7. Answer the questions.


1. What are transistors?
2. In order to produce transistor, how is silicon treated?
3. What kind of job can a transistor do?
4. What is an amplifier?
5. How could you classify integrated circuits?
6. What does a memory chip contain?
7. What is the role of logic gates?
8. What is a microprocessor?
9. What is a socket?
10. What is the role of a fan in a computer?

......... /20

147

Bit By Bit.indb 147 19/03/18 08:31


8. Read the text and say if these sentences are true or false. Correct the false ones.
Shannon’s Contribution to the Invention of Computers
Claude Shannon’s great contribution is the idea that all data can be reduced to one simple
unit, either on or off. These units are called binary digits or bits. Imagine a world without
bits. There would be no electronics as we know them, no mobile phones, no Internet.
Shannon took an earlier idea developed by the French mathematician George Boole,
who developed Boolean algebra: a theory using two values. Shannon used it to describe
data and to quantify and measure the data that flowed across the telephone networks.
Where others invented computers, Shannon formulated ideas to describe and quantify
information, ideas that made it possible for computers and networks to distribute data. In
addition to his master’s thesis and his paper, A Mathematical Theory of Communications,
Shannon published many papers about his varied research projects at MIT and Bell Labs.
He influenced, and was influenced by, many of the key scientists and mathematicians
involved in creating computers and electronic communications in the 20th century. Shannon
also contributed to game theory. He and his wife travelled to Las Vegas frequently to play
blackjack using the theories his colleague Thorp developed with John Kelly, Jr, a physicist.
They made a fortune and he wrote a book about their experiences in the early 1960s.
Shannon also invented some useless machines, such as a device that could solve the
Rubik’s Cube puzzle and he developed the first wearable computer with Ed Thorp.
Adapted from: https://www.kidscodecs.com/claude-shannon/

1. Shannon realised that data could be split in binary digits.


2. Without bits there wouldn’t be the Internet.
3. Boolean algebra was invented by Shannon.
4. Shannon used Boolean algebra to measure the data in the telephone networks.
5. Shannon did not have any ideas to describe and quantify information.
6. He published A Mathematical Theory of Communications.
7. He never influenced other scientists and mathematicians involved in creating computers
and electronic communications in the 20th century.
8. Shannon also invented video-games.
9. Shannon travelled to Las Vegas to play blackjack using his game theories.
10. The first wearable computer was an invention of Shannon and the physicist Kelly.

......... /10

Total score  ......... /100

148

Bit By Bit.indb 148 19/03/18 08:31


UNIT 5 Name ............................................................................................................................

TEST 1 Class ...................... Date ....................................................................................

1. Complete the diagram with the given vocabulary.


hardware • operating system • motherboard • drivers • components • storage devices •
memory sticks • spreadsheets • software • application software

1. ............................ tower peripherals 7. ............................. 9. ..................................


CPU hard disks
3. ............................. memory chip

Computer 4. .............................

2. ............................ system 5. ............................. 8. ............................. word processing


software 6. ............................. 10. ..................................
utility software databases

......... /10

2. Describe the function of these items.


1. Control Unit (CU)
2. Arithmetic Logic Unit
3. Volatile memory
4. Backing store
5. Primary storage

......... /10

3. Complete the definitions.


fetch • driver • central processing unit • execute • cores • cache • dual core •
Immediate Access Store • quad core • decode

1. A .............................................. controls a particular type of device that is attached to your computer,


such as a keyboard or a mouse.
2. The .............................................. is the brain of your computer. It handles all the instructions you
give your computer, and the faster it does this, the better.
3. The .............................................. is the place where the CPU holds all the data and programs that
are being used.
4. .............................................., .............................................., .............................................. and store are the four steps of
the machine cycle performed continuously while a computer is in operation.
5. The speed of the CPU depends on clock speed, ............................................. and ............................................. .
6. A .............................................. processor can perform two instructions at the same time.
7. A .............................................. processor carries out four instructions at the same time.

......... /10

149

Bit By Bit.indb 149 19/03/18 08:31


4. Are these statements true or false? Correct the false ones.
1. Computer memory has the basic function of processing input and turning it into output.
2. Word processing is a system software.
3. A tertiary storage is a shop where you can buy technology and computer devices.
4. Kilobytes and megabytes are some of the measures used for storage devices.
5. Memory hierarchy is the way in which different kinds of memory are classified.
6. Latency is a transistor placed next to the CPU.
7. Main memory is the area of the computer in which data is temporarily stored.
8. Auxiliary store does not directly interact with applications.
9. External store is often used to back up primary storage.
10. The most common types of secondary storage are keyboard, printer, mouse and camera.

......... /20

5. Explain what the difference is between RAM and ROM. Use no more than 10 lines.
......... /20

6. Answer the questions.


1. What is a WORM?
2. What is the difference between optical discs and magnetic media?
3. What is a solid-state memory?
4. What is the origin of the name Blu-Ray Disc?
5. What is the difference between DVD–R and DVD–RW?
6. What is the EO?
7. What type of CDs can you write on?
8. What is the difference between DVD–RAM and other CDs and DVD formats?
9. What is the difference between Blu-Ray Discs and other kinds of DVDs?
10. What are the advantages of solid-state memory?

......... /20

150

Bit By Bit.indb 150 19/03/18 08:31


7. Reading the text and answer the questions.
The Computer is the Memory
At the 2015 SNIA Industry Summit in January, Jim Handy and Tom Coughlin held a lesson
on the future of memory technology and how microprocessors and memory/storage are
coming together to provide faster movement and processing of data, enabling amazing
capabilities and services. The dream of creating processing and memory or storage of
information in the same device is an old one and has never been fully achieved. All our
computer architectures provide useful amounts of memory, but because of the cost of
traditional volatile high-speed memory technologies, such as SRAM and DRAM, this memory
is generally limited and transitory. Flash memory, and, in the near future, other solid-state
storage technologies, promise to provide much larger amounts of digital memory. The
trend of putting memory close to the processor started because non-volatile storage and
memory devices have moved to more general computer data channels. These interfaces
are larger and they allow a fuller use of the fast read speeds (and write speeds) that flash
memory makes available. These advantages come with limitations, since flash data are
considerably slower than DRAM or SRAM. New memory technologies offer an even more
direct connection between a non-volatile memory and a logic-processing unit. Some of these
technologies read and write at speeds that are perhaps even better than those of today’s
DRAM and SRAM’s. If these technologies are compatible with conventional processes, it is
possible to build these memories on the same chip as the logic units. One that has some
particular attraction is Magnetic Random Access Memory (MRAM), often called ST-RAM
(spin torque or spin transfer RAM). ST-RAM can provide performance like that of SRAM,
equal strength and non-volatility. Combining ST-RAM with logic units moves us closer to
combining memory and logic unit. In that case the memory is the computer.
Adapted from: http://www.forbes.com/sites/tomcoughlin/2015/01/31/
the-computer-is-the-memory/#9410f6d4c520

1. What happened at the 2015 SNIA Industry Summit?


2. Why are microprocessors and memory/storage going to be put together in a computer?
3. When was a processing system and storage of information first put together in the same
device?
4. Why are high-speed memory technologies generally limited and transitory?
5. What are flash-memories and other solid-state storage technologies going to do in the
future?
6. What are the main characteristics of flash memory based storage?
7. What are the negative aspects of flash memory based storage?
8. What is the main positive aspect of new memory technologies?
9. What would it be possible to do if new technologies were compatible with conventional
processes?
10. What can a Magnetic Random Access Memory (MRAM) do?

......... /10

Total score  ......... /100

151

Bit By Bit.indb 151 19/03/18 08:31


UNIT 5 Name ............................................................................................................................

TEST 2 Class ...................... Date ....................................................................................

1. Complete the diagram with the given vocabulary.


optical devices • volatile • internal memory • secondary storage • primary storage •
internal store • cache • tertiary storage • external storage devices • non-volatile

1. ................................ 3. ..................................... CPU registers


main storage 8. ............................................
main memory ram
primary memory
4. .....................................
Computer
2. ................................ 5. ..................................... hard drive disk magnetic devices
memory
backing store 9. ............................................ 10. .......................................
auxiliary store solid state memory
.....................................

7. ..................................... removable mass


storage media

......... /10

2. Describe the function of these items.


1. CPU
2. Hardware
3. Operating system
4. Immediate Access Store
5. Drivers
......... /10

3. Choose the correct option.


hard drive • input • processor register • system software • hardware • operating system •
peripherals • output • storage devices • components

1. A ....................................................... is a local storage space that holds data being worked on by a CPU.
2. ....................................................... is the collection of all the parts of a computer you can physically touch.
3. ....................................................... are computer auxiliary devices, that are not part of the essential
computer and have to be connected in order to be used.
4. Peripherals have the basic function of ......................................................., that is, providing data to the
computer.
5. ....................................................... is the outcome produced by a computer after the processing of the
input.
6. Some of the most common internal ....................................................... can be external hard disks or
memory sticks.
7. ....................................................... are very small parts built into or placed inside a computer case or
tower.

152

Bit By Bit.indb 152 19/03/18 08:31


8. An internal ....................................................... is the primary storage device located inside a computer
system.
9. The ....................................................... is the interface between the hardware and user applications.
10. The ....................................................... is the best-known example of system software. It manages all
the other programs in a computer.
......... /10

4. Are these statements true or false? Correct the false ones.


1. Processor registers generally occupy the top-most position in the memory hierarchy.
2. A register may include the address of the memory location instead of the real data.
3. A RAM is a remote access memory.
4. The RAM is attached to the motherboard and the system bus.
5. The data stored in RAM are deleted if the electrical power is turned off.
6. RAM in a computer will influence the way in which hardware is assembled.
7. RAM location in which a program is stored is called residency.
8. ROM stands for Repetitive Operation Memory.
9. ROM is a “built-in” computer memory containing data that normally can only be read.
10. New data or programs can easily be written or loaded onto the ROM by the user.

......... /20

5. Explain the difference between optical discs and solid-state memory. Use no more
than 10 lines.
......... /20

6. Answer the questions.


1. What does the word hardware refer to?
2. What are peripherals?
3. What is the basic relationship of the different hardware components in a simple computer
system?
4. What is inside a computer case?
5. What are the four basic functions of hardware?
6. What is Von Neumann architecture?
7. What does a system software include?
8. What is general purpose software?
9. What is a machine cycle?
10. What are the three factors of the speed of a CPU?

......... /20

153

Bit By Bit.indb 153 19/03/18 08:31


7. Read the text and answer the questions.
Open Source 25-core Processor Can Be Stringed into a 200,000-core Computer
Researchers at Princeton University have built a 25-core chip to create a 200,000-core
computer, in fact, the developers of a 64-bit chip called Piton at Princeton University have
in mind a 200,000-core computer made up of 8,000 of these science-fiction chips. It
won’t happen soon, but that’s one possible usage scenario for Piton. The chip is designed
to be flexible and will have to ensure that the giant collection of cores are in sync when
processing applications in parallel. The goal is to design a chip that can be used in large
data centres that handle social networking requests, search and cloud services. Piton is
a rare open-source processor based on the OpenSparc design, which is one of the many
open-source CPUs and architectures that have already been designed. One Piton chip
has 25 cores divided into five lines, a structure called mesh design. Each core operates
at 1GHz. Multiple chips in a line can be linked through a “bridge” that lies on the top of
the chip structure. The bridge also connects the chip to DRAM and storage. The Princeton
researchers say that Piton is the largest chip in academia, in fact with its 460 million
transistors it could be considered the largest chip developed by researchers in size.
Adapted from: http://www.pcworld.com/article/3111693/hardware/
open-source-25-core-chip-can-be-stringed-into-a-200000-core-computer.html

1. What have the researchers of Princeton created?


2. What was the aim of the new invention?
3. Will this new product be distributed soon?
4. What are the characteristics of the new chip?
5. What is the goal of designing such a chip?
6. Which design does this invention have?
7. What is the mesh design?
8. What’s its clock speed?
9. What’s the function of its bridge?
10. What do researchers claim about its size?

......... /10

Total score  ......... /100

154

Bit By Bit.indb 154 19/03/18 08:31


UNIT 6 Name ............................................................................................................................

TEST 1 Class ...................... Date ....................................................................................

1. Complete the crossword.


Across
2. Input devices that do not need human intervention to process the information.
5. A device that detects and responds to some type of input from the physical environment.
6. It turns incoming data into binary code to allow information to be understood by the computer.
10. Used to control processes in accordance with input tools.

Down
1. A peripheral that allows the user to interact directly with the computer.
3. A mechanism used when large amounts of information need to be processed accurately
and quickly.
4. It translates the digital signal into a user understandable version.
7. Printed data.
8. Any kind of external device of a computer used to enter or process information.
9. Virtual data shown before being printed.
1

2 3

4 5

7 8

10

......... /10

2. Choose the correct option.


1. ................ is a hardware input device that optically “reads” an image and converts it into a
digital signal.
2. ................ is a hardware peripheral that allows computer users to input vocal audio into their
computers.
3. You place items on ................ or ADF (auto document feeder) of your scanner or printer in
order to scan a document.

155

Bit By Bit.indb 155 19/03/18 08:31


4. Alternatively referred to as a drawing tablet and pen tablet, ................ is a hardware input
device that enables an artist to draw or sketch digitally.
5. A ................ is a hardware device that takes pictures, but stores the images as data instead
of printing them to film.
6. A ................ takes an image from a video camera or a TV set and turns it into digital code so
that it can be read by and stored on a computer.
7. A ................ is a light-sensitive integrated circuit that stores and displays the data for an
image in such a way that ................ in the image is converted into an electrical charge, the
intensity of which is related to a colour in the colour spectrum.
8. A ................ is an input device that connects to a computer and the Internet and captures
either still pictures or motion video of a user or other object.
9. The object to be scanned is called the ................

1. a. A mouse b. A microphone c. A scanner d. A keyboard


2. a. A mouse b. A microphone c. A scanner d. A keyboard
3. a. the mouse pad b. the touch pad c. the graphic tablet d. the platen
4. a. a graphics tablet b. a MICR c. a video capture device d. a scanner
5. a. digital camera b. webcam c. video capture device d. scanner
6. a. webcam b. OMR c. video digitiser d. touchscreen
7. a. charge-coupled b. magnetic stripe c. remote d. camcorder
device reader
a. each bit b. each byte c. each digit d. each pixel
8. a. digital camera b. video capture device c. webcam d. scanner
9. a. object b. target c. element d. subject
......... /10

3. Complete the sentences changing the prompt into the missing word, in order to
complete the text (you can add suffixes, plurals, prefixes or missing parts or just
change the word form). The first sentence is given as an example.

0. An ….........input…........ is data that a computer receives. 0. in


Computers only work with (1) …..................................... information. Any input that 1. digit
a computer receives must be digitised. Often (2) …..................................... have 2. datum
to be converted back to an analogue format to be (3) …....................................., 3. out
for example the sound from a computer’s (4) …..................................... . Input 4. speak
devices are things that put information into a computer – so, things
like a (5) …..................................... , a mouse, a (6) …..................................... or a 5. board
webcam. Then, there are output devices that feed information out of a 6. phone
computer – like speakers, a (7) …..................................... or a printer. But how do 7. monitoring
input devices communicate with output devices? Well, all information on
computers has to be digitised – that means turned into numerical data.
So, all forms of information – (8) …..................................... , text, sounds – 8. imagination
are converted into a single (9) …..................................... code. Or, information 9. bin
could be input using a (10) …..................................... keyboard. 10. wire
Adapted from: www.bbc.co.uk/schoolscomputing

......... /10

156

Bit By Bit.indb 156 19/03/18 08:31


4. Are these statements true or false? Correct the false ones.
1. Multifunction printers are output devices.
2. Multimedia projectors receive signals that can be only analogue.
3. Modern multifunction printers have features such as colour LCD displays and memory card
ports that allow a phone or a digital camera to be plugged directly into the printer.
4. A headset is the combination of virtual video glasses and headphones.
5. Touch screens are electronic visual displays that can perform their functions only if
touched continuously by their users.
6. Touch screens can also work if touched by passive objects such as styluses.
7. Barcode readers read black vertical bars usually found on products on sale.
8. Magnetic strip readers are used to read and deactivate anti-theft labels.
9. MICR stands for magnetic interactive card reader.
10. Sensors are often connected to a control program and collect data continuously.
......... /20

5. Talk briefly about primary output devices. Use no more than 10 lines.
......... /20

6. Answer the questions.


1. What is the main function of a joystick?
2. What is the main function of a keyboard?
3. What do we mean by the term QWERTY?
4. When are virtual keyboards used?
5. What are concept keyboards?
6. What is a mouse used for?
7. Does a mouse only work if connected to the computer through a cable?
8. What are the main parts of a mouse?
9. What is an optical mouse?
10. What is the difference between a tracker ball and a touch pad?
......... /20

7. Read the text and choose the correct option.


Children’s Headphones May Carry Risk of Hearing Loss
These days, even 3-year-olds wear headphones, and as the holidays approach, retailers
are well stocked with brands that claim to be ‘safe for young ears’ or to deliver ‘100
percent safe listening’. The devices limit the volume at which sound can be played.
Parents rely on them to prevent children from blasting, say Rihanna, at hazardous
levels that could lead to hearing loss, but a new analysis by ‘The Wirecutter’, a product
recommendations website, has found that half of 30 sets of children’s headphones
tested, did not restrict volume to the promised limit.
The worst headphones produced sound so loud that it could be hazardous to ears in
minutes.
‘These are terribly impor tant findings’, said Cor y Por tnuff, a paediatric audiologist
at the university of Colorado hospital who was not involved in the analysis.
‘Manufacturers are making claims that aren’t accurate’. The new analysis should be
a wake-up call to parents who thought volume-limiting technology offered adequate
protection, said Dr Blake Papsin, the chief of otolar yngology at the hospital for sick
children in Toronto. ‘Headphone manufacturers aren’t interested in the health of your
child’s ears,’ he said. ‘They are interested in selling products and some of them are
not good for you’.

157

Bit By Bit.indb 157 19/03/18 08:31


Half of 8- to 12-years olds listen to music daily, and nearly two-thirds of teenagers do, according
to a 2015 report with more than 2,600 participants. Safe listening is a function of both
volume and duration: the louder a sound, the less time you should listen to it. It’s not a linear
relationship. Eighty decibels is twice as loud as 70 decibels, and 90 decibels is four times louder.
The workplace safety limit for adults, set by the ‘national institute for occupational safety and
health’ in 1998, is 85 decibels for no more than eight hours. But there is no mandatory standard
that restricts the maximum sound output for listening devices of headphones sold in the US.
A team at ‘The Wirecutter’ used two types of sound to test 30 sets of headphones and
earbuds with an Ipod touch. Half of the 30 headphones exceeded 85 decibels. The loudest
ones went to 114 decibels. Most of the models relied on resistors, which impede electrical
currents, inside the chord to reduce volume, but they sometimes failed to work.
Adapted from: https://www.nytimes.com/2016/12/06/health/headphones-hearing-loss-kids.html

1. a. 
Parents trust companies selling headphones that limit the volume to avoid putting their
children’s hearing at risk.
b.  Parents think that their children’s hearing won’t be at risk if they listen to Rihanna.
c.  Retailers promise to find a solution for avoiding children’s loss of hearing.
2. a. 
‘The Wirecutter’ sells children’s headphones.
b.  30 sets of children’s headphones limited the volume as promised.
c.  Retailers did not keep their promise and the checked headphones proved to be hazardous.
3. The paediatric audiologist Cory Portnuff…
a.  believes that manufacturers are working hard to solve the problems.
b.  is really worried about the results.
c.  was involved in the analysis.
4. Dr Blake Ppapsin…
a.  believes that volume-limiting technology offers adequate protection to children.
b.  thinks that the results of the analysis should worry those parents who trusted the
volume-limiting technology.
c.  believes that this analysis should decrease volume levels.
5. Dr. Blake papsin thinks that…
a.  headphone manufacturers care about the children.
b.  some manufacturers are not good for the parents.
c.  manufacturers only want to sell their products.
6. a. 
According to a 2015 report, most children and teenagers listen to music.
b.  About 140 participants took part in a 2015 report.
c.  A 2015 newspaper stated that half of teenagers and only few children listen to music daily.
7. a. 
70 decibels is louder than 90.
b.  Safe listening can go up to 90 decibels.
c.  A human ear can stand a lower volume more easily than a higher volume.
8. a. 
There are no official rules about the sound levels for listening devices.
b.  85 decibels is the maximum sound output that listening devices can have.
c.  The National Institute for occupational and health safety regulations concerns both
workplaces and listening devices.
9. a. 
30, 85 and 114 were the levels that the tested headphones could produce.
b.  ‘The Wirecutter’ played 30 types of different sound to check products’ performances.
c.  ‘The Wirecutter’ staff showed that sound limits are not respected.
10. a. 
The volume-limiting technology was mostly based on resistors.
b.  Resistors stop the electrical currents, so they always limit the high volume.
c.  Resistors did not work because they were placed in the chords.
......... /10

Total score  ......... /100

158

Bit By Bit.indb 158 19/03/18 08:31


UNIT 6 Name ............................................................................................................................

TEST 2 Class ...................... Date ....................................................................................

1. Complete the crossword.


Across
3. A small table on which users move their fingers in order to move the cursor on the screen.
4. The most common and versatile device for direct human input into computers.
5. It is a cursor control device used mostly in computer games. It is named after its shape.
6. It is also called video game controller and it is designed to be connected to a computer or console
gaming system.
7. A kind of keyboard that is not physically linked to the computer but operates on the screen.
9. It allows a mouse to work without cables, transmitting information directly to a base
station.
Down
1. The most common pointing device to move a cursor on the screen.
2. A kind of mouse using a beam of light to track the cursor’s motion.
3. A kind of mouse in which the ball is moved directly by the hand.
8. A kind of keyboard that is shown in the form of pictures on a screen.
1

5 6

......... /10

2. Choose the correct option.


(1) ….............. screens use small cells that contain electrically charged ionised gases. (2) …..............
is another kind of screen whose function is improving perception visual perception and save
energy. It is made from organic, carbon based materials that emit light when electricity is
applied. A/An (3) ….............. has two joint and polarised layers of glass where the liquid crystals
pass or block the light. Light comes from a series of lamps at the back of the screen. (4)
….............. can be classified as (5) ….............., i.e. they print by hitting an inked printer ribbon against

the paper, or (6) ….............., i.e. they press ink directly onto the paper. A (7) ….............. is an old
type of printer still used when carbon copies or duplicates need to be made. It is also used

159

Bit By Bit.indb 159 19/03/18 08:31


in dirty environments because they are much stronger than more modern ones. It creates
characters using a group, also named (8) ….............., of tiny printing pins on the print head.
These press the printer ribbon onto the paper. (9) ….............. work by spraying ink onto the sheet
and can perform very high quality products, ideal for printing photographs or brochures. When
a document is sent to a (10) ….............., a beam “draws” the document on a selenium-coated
drum using electrical charges.

1. a. LED b. LCD c. CTR d. Plasma


2. b. LCD b. OLED c. CTR d. Plasma
3. a. LED b. CTR c. LCD display d. plasma
4. a. Printers b. Scanners c. Screens d. Beams
5. a. non-impact b. impressive c. impact d. imprint
6. a. non impact b. impressive c. impact d. imprint
7. a. inkjet printer b. laser printer c. dot matrix printer d. imprint printer
8. a. beam b. target c. panel d. matrix
9. a. Inkjet printers b. Laser printers c. Dot matrix printers d. Hot copy printers
10. a. inkjet printers b. laser printer c. dot matrix printer d. toner

......... /10

3. Complete the sentences changing the prompt into the missing word, in order to
complete the text (you can remove or add suffixes, plurals, prefixes or missing
parts or just change the word form. The first sentence is given as an example).
0. An .............input….............. is data that a computer receives. 0. in
Wireless devices communicate using (1) …..................................... waves. When 1. radiance
they get close enough, they have a conversation to work out how they’re
going to interact with each other. The screen of a (2) …..................................... or 2. smart
tablet computer is an input and output device. You input on the screen
through touch, and it outputs through (3) …..................................... or sounds, 3. graphic
which are an output too, thanks to its (4) …...................................... Once you know 4. speak
about input and output devices, you start to recognise them everywhere.
A computer (5) …..................................... processes and digitises the input 5. programmer
information. The result is then sent to an output device such as a screen.
If you think of a DVD player, you get a good example. You click ‘play’ on
your (6) …..................................... control, an input device. It digitises the input and 6. remotely
sends this (7) …..................................... information to the DVD player. The computer 7. digitise
inside the DVD player processes this input information and works out what
to do. It will start to read the DVD. The video and (8) …..................................... 8. audiology
information from the DVD is then sent to the TV screen and the speakers,
the output devices. When you are playing a game, you are using a (9) 9. control
…..................................... where you push a button or push the (10) …..................................... 10. stick
to move a character. These inputs are digitised and sent to the computer to
be processed. The program processes the inputs and gives an output. In this
case the character on screen moves as it has been programmed to.
Adapted from: www.bbc.co.uk/schoolscomputing

......... /10

160

Bit By Bit.indb 160 19/03/18 08:31


4. Are these statements true or false? Correct the false ones.
1. Headphones are input devices.
2. Multifunction printers are also called all-in-one printers.
3. Digital audio data of a computer are turned into an analogue form in order to amplify the
signal through the speakers.
4. Headphones are pairs of head-mounted phones that are positioned over the ears in order
to speak while driving or doing other activities.
5. The term touch screen is named after the action of touching the display of the device with
a finger.
6. A touch screen is only an output device.
7. Each sold product has two barcodes and, when they are read, one shows the name and
the other one shows the price of the product recorded in the database.
8. A magnetic strip on the back side of a bank card can hold personal details and, through a
PIN code, it allows a magnetic strip reader to access secure information.
9. An optical mark reader inputs marks made by pencil on a printed form into the computer.
10. Control devices most commonly used as anti-theft detectors are usually sensors,
actuators, motors, buzzers, lights and heaters.
......... /20

5. Talk briefly about peripherals used as input devices. Use no more than 10 lines.
......... /20

6. Answer the questions.


1. What is the main activity of an output device?
2. Can an output device receive and send data?
3. Give some examples of manual output devices.
4. What do control devices process?
5. What is the main activity of sensors in the control devices process?
6. What is a soft copy?
7. What is a hard copy?
8. Are there any devices that can be both input and output? In so, give an example.
9. What sizes are scanners usually?
10. Do digital cameras and scanners perform the same activity?
......... /20

7. Read the text and choose the correct option.


New Frontiers in 3D Printing
Three-dimensional printing is revolutionising the production of new devices and structures,
including soft robots and flexible electronics, but advances have been slowed by the complexity
of integrating multiple materials. A step forward has been taken at Harvard University by Jennifer
A. Lewis, who has designed new systems to actively mix and print concentrated viscoelastic
inks, simultaneously controlling composition and geometry while printing. The goal of integrating
different materials within printed objects has demanded the invention of new, flexible printing
platforms. For example, to print a functional “wearable” device including its electronic
components, a 3D printer would need to mix the flexible material that is moved by wearers to
rigid material that holds the electronic components.

161

Bit By Bit.indb 161 19/03/18 08:31


The ideal solution would be getting a continuous print job with active mixing of complex
fluids. Until now, most mixing approaches work well with thin, flowing fluids with low-viscosity,
but they are ineffective with thicker, high-viscosity fluids like gels, especially in small volumes
over short periods of time. To address this challenge, Lewis and her colleagues, Thomas
Ober and Daniele Foresti, designed a new multi-material print head based on active mixing.
“Passive mixtures don’t guarantee perfectly mixed materials, especially highly viscous
inks,” said Ober, the paper’s first author. The active print head efficiently mixed a wide
range of complex fluids by using a rotational component inside a microscale nozzle, which
enabled the team to print heterogeneous materials in three dimensions. The research team
demonstrated several uses of their active mixing technology. They showed that silicone
rubber can be printed into oblique architectures composed of soft and rigid regions. These
structures may find potential application in flexible electronics, wearable devices and soft
robotics. They also printed reactive materials which generally harden quickly when the two
parts are combined. Finally, they showed that conductive and resistive inks could be mixed
on demand to insert electrical circuitry inside 3D printed objects.
“Jennifer’s latest technical advance enables fabrication of objects composed of different
types of materials that could not be integrated into a single object with 3D printing in the
past,” said the researcher Donald Ingber. “Her creativity has opened another new path for
this emerging field to explore.”
Lewis and her team also recently designed another print head that can rapidly switch
between multiple inks within a single nozzle, eliminating the structural defects that often
occur during the start-and-stop process of switching materials.
Adapted from: https://wyss.harvard.edu/new-frontiers-in-3d-printing

1. a. 3D printing is developing, but there are still problems at mixing different materials.
b. Three-dimensional printing is increasing the production of new devices and structures.
c. Soft robots showed the complexity of mixing different materials.
2. a. Jennifer A. Lewis has designed composition and geometry while printing.
b. Jennifer A. Lewis was inspired by Harvard University.
c. Jennifer A. Lewis has created the project of new systems to mix and print concentrated
viscoelastic inks.
3. a. The researchers’ objective is to integrate the flexible material to the rigid material that
holds electronic components.
b. 3D printers are also produced in the shape of wearable devices.
c. Flexible printing platforms are wearable devices.
4. a. A print job mixes complex fluids.
b. The researchers are still having problems at mixing thicker and high-viscosity gels.
c. Most missing approaches work well.
5. a. Dr Ober thinks that passive mixtures can mix a wide variety of materials.
b. Dr Ober thinks that up to date technologies don’t guarantee a good result.
c. Dr Ober says that they developed a multi-material print head based on passive mixing.
6. a. The passive print head uses a microscale nozzle.
b. A rotational component inside a very small nozzle helped the team to take a step
ahead in new technology.
c.  Heterogeneous materials have never been printed in three dimensions.
7. a. Active mixing technology only uses silicone.
b. The research team applied silicone in wearable devices and soft robotics.
c. Active mixing technology has been tried in various sectors in order to find potential
applications.

162

Bit By Bit.indb 162 19/03/18 08:31


8. a. Researchers demonstrated that they can mix softer and harder materials and include
circuits in printed objects.
b.  Researchers printed hardened reactive materials, conductive and resistive inks.
c. Researchers printed 3D objects only on demand.
9. a. Donald Ingber stated that Jennifer’s invention is nothing new.
b. Donald Ingber believes that Jennifer’s discovery has opened a new way into the 3D
printing field.
c. Donald Ingber said that Jennifer aims to produce objects of different types of materials.
10. a. Lewis and her team have worked on another project.
b. Lewis and her team have used various inks within multiple nozzles.
c. Lewis and her team have improved their product further.
......... /10

Total score  ......... /100

163

Bit By Bit.indb 163 19/03/18 08:31


UNIT 7 Name ............................................................................................................................

TEST 1 Class ...................... Date ....................................................................................

1. Explain the meaning of the given vocabulary.


1. Low level language
2. Assembly language
3. Operation code
4. Statement
5. Tag
......... /10

2. Fill in the gaps with the given vocabulary.


report • declarative • object-oriented • objects • methods • abstraction • environments •
application • debuggers • machine

1. .................................. writers take the information from a database and format it in an appropriate
output. They enable users to create virtually any print or on-screen report that are too
complex or time-consuming to create manually.
2. .................................. languages focus on data presentation and structure. They are used to
explain how texts have to be edited, or displayed.
3. .................................. languages are often described as the opposite of procedural languages.
Programs are built around .................................. and their interactions, rather than on actions.
4. In OOP, .................................. are the objects abilities, i.e. what they can do and how they can move.
5. .................................. allows the common features of a class to be identified, keeping only the
information which is important for a particular purpose.
6. VPL uses integrated development .................................., which are .................................. packages with
multiple functions such as code editors, compilers or interpreters, .................................. and
automation tools.
7. Computers are devices that follow instructions, that must be in .................................. code in
order to be understood.
......... /10

3. Choose the correct option.


High-level computer (1) …............... use formats that are similar to (2) …................ The purpose
of developing them was to enable people to write (3) …............... easily, in their own native
(4) …................ High-level (5) …............... are basically symbolic and use (6) …............... words and/
or mathematical symbols rather than mnemonic codes. Each instruction is translated into a
language that the computer can understand. While speaking about advantages of these kind
of languages, we could say that they are (7) …..............., they use (8) …............... vocabulary and
well-known symbols, they are easier to learn, they are easier to maintain, they are (9) …...............
rather than ‘machine’-based. A program written in this way can be translated into many machine
languages and can run on any computer for which there exists an appropriate translator, the
language is independent of the machine on which it is used. On the other hand, they have to be
turned into understandable instructions by a translator, which takes up time and the object code
generated might be inefficient compared to an equivalent (10) …............... language program.
Adapted from: https://owlcation.com/stem/Types-of-Computer-Languages-with-Advantages-and-Disadvantages

164

Bit By Bit.indb 164 19/03/18 08:31


 1. a. environments b. programs c. languages d. formats
 2. a. algorithms b. English c. native d. languages
 3. a. languages b. methods c. objects d. programs
 4. a. programs b. language c. applications d. machine
 5. a. languages b. formats c. translations d. programs
 6. a. mathematical b. machine c. English d. report
 7. a. user-friendly b. difficult c. methodical d. translated
 8. a. program b. real c. objects d. abstraction
 9. a. programs b. reported c. sequential d. objective-oriented
10. a. machine-dependent b. subroutines c. assembly d. high-level

......... /10

4. Are these statements true or false? Correct the false ones.


1. Low-level languages manage and work directly on the hardware of a computer.
2. Low-level languages are more difficult to write than high-level languages.
3. The machine code is a secret number to enter a computer.
4. A machine code program is easy to write and correct.
5. An assembler is a technician who assembles a computer.
6. A program written in a high-level language works on different kinds of computers.
7. An interpreter is a program used for translating languages.
8. A compiler is a program to fill in documents automatically.
9. High-level languages are old-fashioned and no longer in use nowadays.
10. The second generation of programming languages dates back to the 1950s.
......... /20

5. Talk briefly about procedural languages, describing their tasks and parts.
Use no more than 10 lines.
......... /20
6. Answer the questions.
1. What are subroutines?
2. What are nesting subroutines?
3. What is the most important characteristic of fourth generation languages?
4. What is meant by the expression “drag and drop”?
5. What is the main objective of query languages?
......... /10

7. Read the text and decide if these statements are true or false. Correct the false ones.
The Pioneer Spirit
The ten years from 1950 saw the development of the first computer languages. From
machine code to assembler was a natural step, but to go beyond that took five years
of work and the production of Fortran 1. At the close of the 50s the programming world
had the trinity of Fortran, Cobol and Algol, and the history of computing languages had
completed its most critical phase. The history of computing is usually told in terms of the
hardware, but computing isn’t just applied to electronics, it is also about programming.

165

Bit By Bit.indb 165 19/03/18 08:31


Although computer hardware has changed dramatically in a very short time, its basic
principles have remained the same. So much so that even Charles Babbage (1792-1871),
the father of the computer, wouldn’t have too much difficulty understanding an IBM PC.
He might not know transistors, chips, magnetic recording or TV monitors, but he would
recognise the same operational principle of a CPU working with a memory. Babbage
probably didn’t even have a clear idea of programming as something separate from the
design of his machine. The first actual “programmer” is generally agreed to be Augusta Ada,
Countess of Lovelace (1815-52). She helped Babbage perfect his design for a mechanical
computer and invented programming in the process. Her contribution was recognised by
naming a computer language, Ada, after her. Ada seemed to understand the idea that it was
the software and the abstract expression of algorithms that made the machine powerful and
able to do almost anything.
Adapted from: http://www.i-programmer.info/history/computer-languages/
471-the-classical-decade.html

1. Fortran 1 is a kind of computer.


2. Fortran was invented at the end of 19th century.
3. Cobol and Algol are programming languages.
4. Hardware structure has changed very quickly.
5. Charles Babbage was the inventor of Fortran 1.
6. Charles Babbage thought that hardware would develop together with programming.
7. Augusta Ada was Charles Babbage’s lover.
8. Augusta Ada understood that programming was something different from building a computer.
9. Ada was a programming language.
10. Augusta Ada thought that programming was important in order to make a computer powerful.

......... /20

Total score  ......... /100

166

Bit By Bit.indb 166 19/03/18 08:31


UNIT 7? Name ............................................................................................................................

TEST 2? Class ...................... Date ....................................................................................

1. Explain the meaning of the given vocabulary.


1. High-level language
2. Machine language
3. Operand
4. Subroutine
5. Application generator
......... /10

2. Fill in the gaps with the given vocabulary.


encapsulation • graphical • logical • query • interface • class • fifth generation •
inheritance • environments • tags

1. .............................................. languages are used for creating, accessing and modifying data in and
out from a database management system.
2. .............................................. are markup indicators, i.e. attributes, and the instructions contained
between the symbols < >.
3. In OOP, any object belongs to a .............................................., which is a set of procedures and data
definitions from which many objects of the same kind can be created according to the
principle of ...............................................
4. In OOP, .............................................. is the ability of fundamental details of a class to be hidden.
This makes it possible to change an object without transforming the rest of the program.
5. In VPL, programs are created through a .............................................. user .............................................., which
interacts with the operative system in order to perform actions such as copying, moving
and deleting files.
6. .............................................. programming languages are common in the .............................................. of
computer languages. They aim at creating smarter .............................................., where algorithms
are replaced by statements recalling natural language.
......... /10

3. Choose the correct option.


Computer Languages
(1) …............. computer languages are either machine codes or are very close to them.
A computer can only understand and execute instructions given in the form of (2) ….............,
i.e. binary. There are two types of (3) …............. languages: (4) …............., which is a language
directly interpreted into the hardware and (5) …............., a slightly more user-friendly language.
Thinking about the pros and cons of using (6) …............., on the positive side, it makes fast
and efficient use of the computer; it requires no translator to translate the code, in fact it is
directly understood by the computer. On the other hand, all operation codes and all memory
addresses have to be remembered and it is hard to correct or find errors in a program written
in it. (7) …............. was developed to overcome some of the many inconveniences of machine
language. This is another (8) …............. but very important language in which operation codes
and (9) …............. are given in the form of alphanumeric symbols instead of 0’s and 1’s.

167

Bit By Bit.indb 167 19/03/18 08:31


The pros of it are that it’s easier to understand and use it, it is easily modified and it is easy
to locate and correct errors. However, since it is machine dependent, the (10) …............. also
needs to understand the hardware.
Adapted from: https://owlcation.com/stem/
Types-of-Computer-Languages-with-Advantages-and-Disadvantages

1. a. high-level b. query c. low-level d. procedural


2. a. executable b. machine c. high-level d. translation
file language language program
3. a. source b. high-level c. low-level d. mnemonics
4. a. machine b. high-level c. bug d. procedural
language language language
5. a. query b. modular c. structured d. assembly
language programming programming language
6. a. report b. machine language c. application d. markup
writers generators languages
7. a. Declarative b. Assembly c. Visual d. Object-oriented
language language programming languages
languages
8. a. logical b. markup c. low-level d. high-level
programming
9. a. operands b. procedures c. subroutines d. modules
10. a. report writer b. drag and drop c. multipurpose d. programmer

......... /10

4. Are these statements true or false? Correct the false ones.


1. Modular programming means that programs can be written in modules.
2. A computer cannot understand instructions given to it in English.
3. Machine language is the most recent type of programming language that has been
developed.
4. A manufacturer designs a computer to obey just one language, its machine code.
5. Assembly language is very easy to learn and use, since it is very close to English
language.
6. Procedures and subroutines are modules of the modular programming
7. BASIC is a multi-purpose language in the third generation of programming languages.
8. Memory aids are notes taken by the programmer so as not to forget the instructions of the
program.
9. COBOL is an example of procedural language.
10. The third generation of programming languages developed long before the birth of
integrated circuits.
......... /20

5. Talk briefly about the fourth generation of languages, listing their main
characteristics and usage. Use no more than 10 lines.
......... /20

168

Bit By Bit.indb 168 19/03/18 08:32


6. Answer the questions.
1. What are markup languages? What is the most common markup language?
2. What are tags?
3. What is the main aim of procedural language?
4. What are query languages used for?
5. What are report writers used for?
......... /10

7. Read the text and decide if these statements are true or false. Correct the false ones.
Seeing the Problem
If you can program, even a little bit, the idea of a programming language seems absolutely
obvious. This makes it very difficult to understand that there was a time when the idea of a
programming language was far less than obvious and even considered undesirable. Today,
programmers don’t need to know anything about the underlying design of the machine. For
them a program is constructed in a programming language and it is that language that is
reality. How the machine executes this program is more or less irrelevant. Computers have
become sophisticated by moving away from the simplistic computer hardware. However, this
wasn’t the case in the early days. Early programmers worked in terms of “machine code”
and it also has to be kept in mind that most programmers of the time were the people who
had a hand in building the machine or were trained in electronics. This confusion between
electronic engineering and programming persisted until recent times. A machine code
programmer sees the machine as a set of numbered memory locations and the operations
that can be carried out are given numeric codes. The program and the data have to be
stored in memory and the programmer has to keep track of where everything is. To a
programmer in those days however, machine code would have been like reading standard
English, and because they produced programs every day, this list of operation codes was
fixed in their minds. At this early stage, programming was the art of putting the machine
instructions together to get the result you desired.
Adapted from: http://www.i-programmer.info/history/computer-languages/471-the-classical-decade.html

1. Today programmers need to know the structure and design of a computer.


2. Programmers need to know the path that a computer follows to perform a program.
3. Computers became more powerful when hardware and software started to develop
autonomously.
4. In the early days hardware and programming were the same thing.
5. Early programmers wrote programs using machine code.
6. Early programmers did not have any experience in building machines or electronics in general.
7. Electronic engineers and programmers’ jobs have always been confused.
8. Machine code programmers give computers alphabetical codes to retrieve data.
9. Early machine code programmers used high-level language, because it is more similar
to modern English.
10. Programmers need to record where data and programs are stored in a computer.

......... /20

Total score  ......... /100

169

Bit By Bit.indb 169 19/03/18 08:32


UNIT 8 Name ............................................................................................................................

TEST 1 Class ...................... Date ....................................................................................

1. Match the description with the given type of programming language.


1. C a. It is a simple, modern, general-purpose, object-oriented
programming language. It was designed for Microsoft in 1999
with the original name of Cool
2. C++ b. It a programming language for multimedia applications and
personal computer games and it combines elements of C and C++.
3. C# c. It is a general-purpose programming language. Its design directly
recalls the typical machine language and it was used mostly in
applications that used assembly language.
4. Microsoft Visual C# d. It is a programming environment used to create computer
applications for the Microsoft Windows family of operating
systems. It combines the C# and the .NET Framework.
5. Lite-C e. It was created for general object-oriented programming, when
computers used a run command based user interface. It was
designed and improved by Bjarne Stroustrup at the Bell Labs in 1979.

1. .............; 2. ; 3. .............; 4.
............. ; 5. ..............
.............

......... /10

2. Fill in the gaps with the given vocabulary.


World Wide Web • tags • hyperlinks • HyperText Markup Language • close tag • formatting
• opening tag • Internet browser • forward slash • structure

HTML
First developed by Tim Berners-Lee in 1990, HTML is the short name for (1) …......................................
HTML is used to create electronic documents (called pages) that are displayed on the
(2) …...................................... Each page contains a series of connections to other pages called
(3) …...................................... Every web page you see on the Internet is written using one version
of HTML code or another. HTML code ensures the proper (4) …..................................... of text and
images so that your (5) …..................................... may display them as they are intended to look.
Without HTML, a browser would not know how to display text as elements or load images or
other elements. HTML also provides a basic (6) …..................................... of the page. As seen above
in the above HTML tag example, there are not many components. Almost all HTML
(7) …..................................... have an (8) …..................................... that contains the name with any attributes
and a (9) …..................................... that contains a (10) …..................................... and the name of the tag that
is being closed. For tags that do not have a closing tag like the <img> tag, it is best to end
the tag with a forward slash.
Adapted from: https://www.computerhope.com/jargon/h/html.htm

......... /10

170

Bit By Bit.indb 170 19/03/18 08:32


3. Talk briefly about Java programming language and platform. Use no more than 10 lines.
......... /20

4. Answer the questions.


1. What is Python?
2. What are Python’s three most important characteristics?
3. Why is Python slow?
4. What is PyPy?
5. What are some of Python’s applications?
6. Is Python still used?
7. What do we usually mean by the word programming?
8. What is a task for a computer?
9. What is an editor?
10. What is a compiler?
......... /20

5. List the given actions in the right order.


• develop an algorithm
• write the program in a programming language
• prepare a flowchart or pseudocode
• test the program and write documentation
• map the program and understand the problem
......... /10

6. Say if the given sentences are true or false and correct the false ones.
1. A flowchart is a graphic representation of the flow of operations using symbols.
2. A pseudocode is a protection system code.
3. Writing a program means preparing the instructions in coded form.
4. Choosing the most appropriate language for programming is very easy.
5. Adobe Dreamweaver is a programming language.
6. The testing of a program can be both static and dynamic.
7. Static testing checks for verification include walkthroughs and performance.
8. Dynamic testing is not completely reliable because it can show the presence of some
errors, but not the absence of others.
9. Debugging is the activity carried out to find out the cause of the error and fix it.
10. The documentation that must be produced at the end of the programming process is the
planning documentation and the system documentation.
......... /20

171

Bit By Bit.indb 171 19/03/18 08:32


7. Read the text and choose the right option.
History of the Computer Bug
The term ‘Bug’ has been part of engineering jargon for many decades. It appeared originally in
hardware engineering to describe mechanical malfunctions or problems, and this is why problems
with radar electronics during World War II were referred to as bugs or glitches. There is evidence
that the usage of this term dates back to much earlier. This term is mentioned in a letter from
Edison to an associate in 1878: “It has been just so in all of my inventions. The first step is an
intuition, and comes with a burst, then difficulties arise… this thing gives out and [it is] then that
Bugs – as such little faults and difficulties are called – show themselves and months of intense
watching, study and labor are requisite before commercial success or failure is certainly reached”.
However, the term ‘Computer Bug’ was coined by Grace Murray Hopper. While she was working
on Mark II, the machine had a problem. Sometime later, some operators investigated and
discovered there was a moth trapped in a relay which was causing the problem. This first
“Computer Bug” was removed and this is what Grace wrote in her log book on 9th September
1945 at 3:45 p.m.: “First, actual case of bug being found in computer.” The word went out saying
that they had “debugged” the machine and the term “debugging a computer program” was born.
moth: flying insect
Adapted from http://www.ksyash.com/2011/01/178

1. a. Engineers used to name their programs ‘Bugs’ for many decades.


b. The word ‘Bug’ was coined many years ago.
c. ‘Bug’ is the name of the engineering jargon.
2. a. The term ‘Bug’ has always been used for hardware.
b. ‘Bug’ was an original form of hardware engineering.
c. Originally, this word described mechanical problems.
3. a. Radar electronics during World War II was called bugs or glitches.
b. Bugs or glitches were failures in radar electronics during World War II.
c. Problems during World War II were caused by radar electronics.
4. a. Some historical documents show that the word ‘bug’ was invented before World War II.
b. Edison was the first to use the word ‘bug’.
c. This term was invented by an associate of Edison in 1878.
5. a. Edison declares that first intuition comes, then bugs arise.
b. Edison says that first bugs come, then intuition arises.
c. Edison declares that bursts and bugs are the same thing.
6. a. Edison says that when bugs arise, commercial failure is certainly reached.
b. Edison says that bugs are a requisite for success.
c. Edison says that when bugs arise, inventors should observe, study and work hard to solve them.
7. a. The ‘Computer Bug’ was developed by Grace Murray Hopper.
b. The term ‘Computer Bug’ was invented by Grace Murray Hopper.
c. Grace Murray Hopper worked to invent the ‘Computer bug’.
8. a. Mark II machine could not work properly because of an insect in a relay.
b. Mark II machine was invented to include moths.
c. Problems to Mark II machine were caused by operators.
9. a. September 9th 1945 was the date in which the moth was trapped.
b. September 9th 1945 was the date in which the first actual case of a bug happened to a computer.
c. September 9th 1945 was the date in which Grace Murray Hopper built Mark II and Mark III machine.
a. The term ‘debugging a computer program’ came out after Grace Murray Hopper invented Mark II.
10.
b. The term ‘debugging a computer program’ came out when Mark II machine had a problem.
c. The term ‘debugging a computer program’ came out after the first computer bug had been removed.
......... /10

Total score  ......... /100

172

Bit By Bit.indb 172 19/03/18 08:32


UNIT 8? Name ............................................................................................................................

TEST 2? Class ...................... Date ....................................................................................

1. Match the description to the given vocabulary.


1. Java source a. They are abstract computing devices or interpreters that enable a
code computer to run a Java program.
2. Java b. It helps users to run and develop Java applications. It also features
a wide variety of tools that can help developers work efficiently with
the Java programming language.
3. Java Virtual c. It is a general purpose, high-level programming language started by
Machines the Green Team in 1991 and later developed by Sun Microsystems.
It was originally designed for handheld devices.
4. Java Application d. It is made up of files written in plain text and then compiled into a
Programming format called bytecode.
Interface
5. Java platform e. It is a large collection of ready-made software components that allow
the computer to perform various activities, which are grouped into
libraries and interfaces known as packages.

1. .............; 2. ; 3. .............; 4.
............. ; 5. ..............
.............
......... /10

2. Fill in the gaps with the given vocabulary.


high-level • management • object-oriented • executable • syntax • paradigms •
general-purpose • dynamic • functional/procedural • code

Python
Python is an interpreted, interactive, (1) …..................................... programming language that
was first developed by Guido van Rossum in 1989 and released in 1991. Python is a
(2) …....................................., (3) …..................................... programming language. Its design philosophy
emphasises (4) …..................................... readability, and its (5) …..................................... allows programmers
to express concepts in fewer lines of code than would be possible in languages such as
C. Python supports multiple programming (6) …....................................., including object-oriented,
imperative, and (7) …..................................... styles. It has a (8) …..................................... typing system,
automatic memory (9) …....................................., and a comprehensive standard library. Like other
dynamic languages, Python is often used as a scripting language, but it can also be compiled
into (10) …..................................... programs. Development of Python began in 1989, with version 3.0
being released in 2008.
Adapted from: https://www.computerhope.com/unix/python.htm

......... /10

173

Bit By Bit.indb 173 19/03/18 08:32


3. Talk briefly about the steps of the programming process. Use no more than 10 lines.
......... /20

4. Answer the questions.


1. Why does a program need to be tested after it has been completed?
2. What does testing mean?
3. What does verification mean?
4. What does validation mean?
5. What is static testing?
6. What is dynamic testing? What is it used for?
7. What are the errors that may occur in a program?
8. What is debugging?
9. What kind of documentation must be produced at the end of a programming session?
10. What do we usually refer to when we speak about ‘C’?
......... /20

5. List the given actions in the right order.


• remember the language syntax
• choose a compiler or interpreter
• write the code
• choose the programming language
• choose an editor

6. Say if the given sentences are true or false and correct the false ones.
1. One of the reasons why ‘C’ is so successful is that C compiler exists for most computer
architectures.
2. Later languages have never taken inspiration directly or indirectly from C.
3. C++ was first named C with classes, and then renamed C++ in 1983.
4. C++ is a specific task programming language with low-level capabilities.
5. C++ is usually compiled and supports procedural programming, data abstraction, object-
oriented programming and generic programming.
6. Cool was the original name for C Shell and it was created for standalone machines in the
late 1970s.
7. C# is designed for the Common Leisure Interaction (CLI), which is an entertainment
platform.
8. C# was designed to work in the modern Windows environment, with mouse-controlled user
interfaces, networks and the Internet.
9. Microsoft Visual C# is a programming environment used to create computer applications
for the Microsoft Windows operating systems.
10. Lite-C is a a simple, modern, general-purpose, object-oriented programming language.
......... /20

7. Read the text and choose the right option.


A Brief History of HTML
The history of hypertext markup language is a strange and interesting tale. Recently, the battle
for control of the standard has focused on functionality, but however, the idea behind HTML was
a modest one. When Tim Berners-Lee was putting together his first elementary browsing and
authoring system for the Web, he created a quick little hypertext language that would serve his
purposes. He imagined dozens, or even hundreds, of hypertext formats in the future and smart
clients that could easily negotiate and translate documents from servers across the Net.

174

Bit By Bit.indb 174 19/03/18 08:32


It would be a system that would work on any platform and browser. The problem, however, turned
out to be in the simplicity of Berners-Lee’s language. Since it was text-based, you could use
any editor or word processor to create or convert documents for the Web. And there was just
a handful of tags – anyone could master HTML in an afternoon. The Web flourished. Everyone
started publishing. The rest is history. But as more and more content moved to the Web, those
creating browsers realised the simple markup language needed much improvement. How should
the innovation take place? Tim Berners-Lee certainly wasn’t going to be the sole developer of
HTML – he never intended to be. So the developers, in the long-held tradition of the Internet,
implemented new features in their browsers and then shipped them. If the Web community liked
them, they stayed. If not, they were removed. Look, for example, at the addition of images to
the Web. Early browsers were simply text-based, and there was an immediate desire to display
figures and icons online on a page. In 1993, a debate began exploding and, finally, a college
student named Marc Andreessen added <img> to his Mosaic browser, and left for California to
start a new browser company called Netscape.
Adapted from: https://www.wired.com/1997/04/a-brief-history-of-html/#start-of-content

1. a. Functionality has been fought while developing new kinds of markup languages.
b. Modern HTML standards are concentrated on performance.
c. Functionality is not the most important element of HTML.
2. a. Early HTML idea was very simple.
b. Early HTML was very complicated.
c. Behind HTML there is a modest person.
3. a. Tim Berners-Lee was the first to create a basic system for browsing.
b. Tim Berners-Lee found the first elementary browsing in the Web.
c. Tim Berners-Lee put authors together on the Web.
4. a. Tim Berners-Lee invented a language which was too difficult to learn.
b. Hypertexts had the purpose of making the Web quick.
c. Tim Berners-Lee invented a basic programming language for the Web.
5. a. Originally, hypertext formats included only written documents.
b. Originally, only smart clients negotiated on the Web.
c. Originally, the Net was only used to translate documents.
6. a. Hypertext language could work on any platform and browser.
b. Hypertext language could not work on any platform and browser.
c. The first hypertext language could also include pictures and videos.
7. a. Tim Berners-Lee’s language needed a particular editor.
b. Tim Berners-Lee’s language was invented in an afternoon.
c. Tim Berners-Lee’s language was so simple that anyone could learn how to use it very quickly.
8. a. HTML was created when everyone started publishing.
b. Developers realised that Hypertext language needed to be improved quickly.
c. The markup language has always been used on the Web without any improvements.
9. a. After Tim Berners-Lee, many other people worked on new features of Web browsers.
b. Tim Berners-Lee intended to be the only developer of HTML.
c. New browsers were removed from the Web community.
10. a. Marc Andreessen used only text-based browsers.
b. Netscape debated about displaying figures and icons online.
c. Netscape was founded by a college student, who first added images on a Web page.

......... /10

Total score  ......... /100

175

Bit By Bit.indb 175 19/03/18 08:32


UNIT 9? Name ............................................................................................................................

TEST 1? Class ...................... Date ....................................................................................

1. Choose the correct option.


An (1) …............... is a system software that manages computer hardware and software resources
and provides common services for computer programs. It provides a performing use of the
available equipment and memory resources and it acts as an (2) ….............. between computer
and (3) ….............. (4) ….............. are the most important part of the O/S, because they control all
the other programs in it. (5) ….............. are also very important because they provide users with
(6) ….............. Service programs are divided into two categories: (7) ….............. and
(8) …............... In fact, files can be saved, copied, renamed or deleted thanks to (9) …..............,
which can activate peripheral devices and format a disk to store information. (10) ….............. are
also very important when a user develops a program, since they include translation programs,
assemblers, interpreters and compilers.

 1. a. interface b. utility program c. operating system d. system service


 2. a. interface b. supervisory c. resource d. aid
 3. a. interface b. utility c. program d. user
 4. a. Supervisory b. Service c. System services d. System aids
programs programs
 5. a. Supervisory b. Service c. Utility programs d. Operating
programs programs systems
 6. a. operating systems b. supervisory c. system services d. programs
programs
 7. a. utility programs b. supervisory c. interfaces d. operating
programs systems
 8. a. multi-users b. interfaces c. virtual storage d. system aids
 9. a. system aids b. utility programs c. batch processing d. supervisory
programs
10. a. Virtual machines b. Supervisory c. System aids d. Interfaces
programs

......... /10

2. Describe the most important characteristics of the given items.


1. Real time processing
2. Batch processing
3. Multi-user
4. Multi-threading
5. Virtual storage
......... /10

176

Bit By Bit.indb 176 19/03/18 08:32


3. Choose the correct option.
Linux • kernel • process • menu-driven systems • graphical user interfaces (x2) • shell •
MS-DOS • user interface • command-driven interface

1. A .............................................. is how the computer appears to the user. It is the means by which
the user communicates with the O/S.
2. Originally .............................................. was used as a server operating system. It is cheap, flexible
and suitable for a wide range of applications. Now, it is often used in mobile phones and
handheld devices and also in supercomputers.
3. .............................................. show a list of options organised under various headings or menus. The
user selects the option to be carried out by pressing a key on the keyboard, or by clicking
on it with the mouse.
4. A .............................................. is one of the central O/S components. It manages time, memory,
files and communications in response to system calls.
5. A .............................................. was one of the earliest ways to interact with a computer. It showed
a blank screen to the user who typed in usually abbreviated commands, then operated by
the system.
6. .............................................. are the most popular type of communication system for most PCs and
portable devices. In general, users interact with them in most modern operating systems.
7. .............................................. are intuitive and users don’t need to learn particular commands to use
them. Actions or files are represented by icons or small pictures, which will be touched or
clicked by the user.
8. The .............................................. behaves as an interface between user and kernel. It is a command
line interpreter started when a user logs in.
9. .............................................. is one of the most common command-driven O/S. In this kind of O/S,
language is in the form of abbreviations, i.e. dir stands for directory.
10. A .............................................. in Unix is an executing program identified by a PID.
......... /10

4. Are these statements true or false? Correct the false ones.


1. PID stands for Unix program installer.
2. Linux was originally called freax.
3. Linux has historically been used as a PC operating system, because its range of
applications was quite limited.
4. Linux is widely criticised because it does not have a comfortable user interface.
5. Android is a Linux-based open source O/S.
6. The Apache Licence is the code under with Android is released by Google.
7. Microsoft Windows is a family of operating systems originally meant for servers and mobile
devices, then adapted to personal computers.
8. Microsoft windows supplies a graphical user interface, a virtual memory management and
the support for many peripherals.
9. The first versions of Windows needed the user to type short commands such as ‘dir’ for
‘directory’.
10. Windows XP is still considered one of the best Windows versions, although it had security
problems.
......... /20

177

Bit By Bit.indb 177 19/03/18 08:32


5. Talk briefly about the latest versions of Windows (from Windows 7). Use no more
than 10 lines.
......... /20

6. Answer the questions.


1. What was the name of the first Macintosh operating system? What was it used for?
2. What is the current operating system of Mac? When was it developed?
3. What are the most important characteristics of the new Mac operating systems?
4. What are the characteristics of the new Mac operating system’s kernel?
5. Has the Mac operating system recently changed name? What is the latest one?
6. What is IOS?
7. What is Ubuntu?
8. Is Ubuntu a very expensive operating system?
9. What are Ubuntu’s main characteristics?
10. What is Unity? What does it include?
......... /20

7. Read the text and find the phrases with the same meaning as the given words.
Reasons to Migrate to Ubuntu
All large desktop environments need to be managed and supported effectively – tasks
which account for a big chunk of every IT budget. However, proprietary systems push up
costs even further with per-user licences for the OS, office applications and antivirus
software. Because Ubuntu Desktop Edition, which includes OpenOffice.org and around
29,000 other applications can be downloaded for free, you can eliminate licensing
costs once and for all. As a result, there’s always more budget available for strategic IT
infrastructure and projects that deliver direct benefits to your bottom line. If this argument
wasn’t convincing enough, Ubuntu also delivers huge hardware savings over proprietary
systems. As a much lighter, more compact OS, it gives you great performance on second,
third and even fourth-generation workstations. That means you won’t break the bank ripping
and replacing existing hardware. For many large organisations, it no longer makes economic
sense to run individually licensed operating systems and applications on every desktop and,
to overcome this challenge, they move key applications to the web. Ubuntu Desktop Edition
offers tremendous benefits over proprietary software, and it can be easily customised and
reduced to meet your individual remote access requirements.
Adapted from: https://insights.ubuntu.com/wp-content/uploads/
Ubuntu_DesktopMigration_WP_AW_0.pdf

1. promoted efficiently
2. a large quantity of
3. increase prices
4. without charge
5. it won’t cost too much
6. take away and change old hardware
7. not any more
8. to deal with this difficult problem
9. huge advantages
10. built or made-to-order
......... /10

Total score  ......... /100

178

Bit By Bit.indb 178 19/03/18 08:32


UNIT 9? Name ............................................................................................................................

TEST 2? Class ...................... Date ....................................................................................

1. Choose the correct option.


In 1971, (1) …..................................... operating system was released and it was initially written in
(2) …..................................... language. In 1973, it was rewritten in programming (3) ….....................................
by Dennis Ritchie. After it was written in a (4) …..................................... language, it became much
easier to use on different computer platforms, so it grew and became widely adopted by
academic institutions and businesses. It is made up of three parts: the kernel, the shell and
the commands or programs. The (5) …..................................... is the central O/S component of Unix
and it is the core part of the operating system. It allocates time and memory to programs
and handles files and communications in response to system calls. A (6) …..................................... is
a software or a command line (7) …..................................... that enables the user to interact with the
computer, after a user logs in and username and password are checked, therefore the shell is
a (8) …..................................... which decodes the instructions the user types in and arranges them to
be carried out. Everything in Unix is either a file or a process.
A (9) …..................................... is an executing program identified by a unique process identifier (PID),
while a (10) …..................................... is a collection of data created by users using text editors,
running compilers, etc.

1. a. IOS b. Windows XP c. Java d. Unix


2. a. high level b. assembly c. language C+ d. English
3. a. language C b. operating system c. Basic d. Ubuntu
4. a. machine b. English c. high-level d. Android
5. a. shell b. kernel c. command d. program
6. a. shell b. kernel c. command d. program
7. a. shell b. language C c. interface d. Windows 7
8. a. command line b. instructions c. special keyboard d. storage system
interpreter decoder
9. a. file b. kernel c. shell d. process
10. a. process b. file c. command d. platform

......... /10

2. Describe the most important characteristics of the given items.


1. Linux
2. Android
3. Windows 1.0 and 2.0
4. Windows XP
5. Windows 7
......... /10

179

Bit By Bit.indb 179 19/03/18 08:32


3. Choose the correct option.
mobile devices • Unix • Classic Mac OS • applications • IOS • Microsoft Edge •
object-based system • GUI principles • Metro design • Windows 8

1. …..................................... was released in 2012 by Microsoft with a completely redesigned


operating system, in which users can use touch screen and they can load and start up the
computer in few seconds. It also has a new 2. …..................................... system interface that appears
as a start screen made up of live tiles, which are links to 3. …..................................... and features
that are updated in real time.
4. Windows CE and Windows 10 Mobile are O/S for …..................................... .
5. …..................................... is a modern browser that works on all systems: personal computers,

smart phones, tablets and Xbox consoles.


6. The first O/S of the family of Macintosh operating systems, developed by Apple Inc. in
1984, was called …..................................... .
7. Mac OS X has a new architecture based on …....................................., in order to remove some
technical issues of the previous O/S.
8. Mac operating systems share a common set of …....................................., including a menu bar
across the top of the screen, a finder, a desktop with icons and related concepts.
9. An …..................................... programming interface is one of the most important characteristics of
Mac OS X.
10.  …..................................... is a mobile operating system for iPhone, iPod Touch and iPad.

......... /10

4. Are these statements true or false? Correct the false ones.


1. Ubuntu is an operating system which uses the Linux kernel.
2. MacOS is based on the Ubuntu operating system.
3. Canonical is the name of the company whose mission is to provide a free software
platform for users and developers.
4. Canonical distributes programming language C.
5. MacOS is an open source software development.
6. Ubuntu has the same user interface as many others O/S.
7. Ubuntu operating systems cannot support software such as productivity applications,
media software and communication programs.
8. Ubuntu’s aim is to adapt the Linux operating system in order to make it more intuitive for
the user.
9. Unity is an O/S for mobile devices and tablets.
10. Ubuntu Touch for smartphones and tablets works with almost any kind of mobile device.

......... /20

5. Talk briefly about the most common different types of O/S. Use no more than 10 lines.
......... /20

180

Bit By Bit.indb 180 19/03/18 08:32


6. Answer the questions.
1. What is an operating system?
2. What are supervisory programs?
3. What are service programs?
4. What are utility programs?
5. What are system aids?
6. What is a user interface used for?
7. What is a command-driven interface?
8. What are menu-driven systems?
9. What are the most important characteristics of graphical user interfaces?
10. What do graphical user interfaces use in order to interact with the system?

......... /20

7. Read the text find the phrases with the same meaning as the given words.
Unix-to-Linux migration benefits
Linux migration is an appealing option to some Unix customers looking to upgrade and
save money. Customers who want to update outdated operating systems or replace
unreliable servers may seek a Linux server migration, which would also give them the
opportunity to modernise. For those who are spending a great deal of money on hardware,
software, licenses, maintenance and storage, a migration to Linux may allow them to
save a considerable amount of money. You can help them justify the server migration by
demonstrating that they can save millions by combining systems and migrating to IBM.
You know that IBM POWER5 supports both Unix (IBM’s AIX) and Linux (RHEL4 and SLES9)
on the same server, so you would have more options at your disposal than by staying with
Sun or migrating to Hewlett-Packard. You could offer help migrating to Linux and running
Linux on this hardware. Furthermore, new management may start looking to new vendors
and technologies in an attempt to make his or her mark on the company and justify a Linux
migration.
Adapted from: http://searchitchannel.techtarget.com/feature/Unix-to-Linux-migration-benefits

1. attracting possibility
2. improve
3. obsolete
4. try to get something
5. a big quantity
6. economise
7. unifying
8. moving to another system
9. effort
10. an important effect on something

......... /10

Total score  ......... /100

181

Bit By Bit.indb 181 19/03/18 08:32


UNIT
UNIT10
? Name ............................................................................................................................

TEST 1? Class ...................... Date ....................................................................................

1. Match the action with the right heading.


choosing font type • saving documents • correcting grammar and spelling •
choosing font size • bolding • printing documents • underlining • italicising •
creating documents • including illustrations

Text formatting Text editing

1. ..................................................................................................... 1. .....................................................................................................
2. ..................................................................................................... 2. .....................................................................................................
3. ..................................................................................................... 3. .....................................................................................................
4. ..................................................................................................... 4. .....................................................................................................
5. ..................................................................................................... 5. .....................................................................................................

......... /10

2. Describe the function of these items.


1. Word processors
2. Proprietary software
3. Open source
4. Free software
5. Spreadsheet
......... /10

3. Complete the text with the given words.


footer • cells • template • spreadsheets • rows • header • coordinates • revision •
formulae • layout

Page Setup
In a document, the (1) …..................................... refers to the way in which the various parts of a page
are arranged. It includes the (2) …..................................... , which is at the top of the page and can be
used to insert the title of the document, and the (3) …..................................... , which is at the bottom
of the page and is generally used to print the page number. (4) …..................................... is a function
that enables multiple users to modify or add notes to the text. They are visible to other users
until they are accepted or refused.
In order to create a document starting from a model, you can use a (5) …..................................... ,
which is a form in which the standard opening and closing parts are already written and other
variable parts can be modified. Data can also be recorded on (6) …..................................... , which in
addition are used to carry out calculations and create graphs and charts. They are made up of
(7) …..................................... and columns. These divide the sheet into individual (8) …......................................
Each one can be identified using (9) …..................................... and may contain numerical data, text
data or (10) …....................................., in order to show the results of the calculations automatically.
......... /10

182

Bit By Bit.indb 182 19/03/18 08:32


4. Are these statements true or false? Correct the false ones.
1. You can use conditional formatting to automatically change the colour of cells which
contain values greater than or less than a frame of reference.
2. Visicalc is the latest and most modern spreadsheet.
3. Excel is a proprietary software.
4. Open Office and Libre Office Calc are open source and very similar to each other.
5. Google Sheets and Zoho are proprietary software with extended functionality.
6. Presentation software creates a series of slides in a single document and each slide
contains a number of frames.
7. The speaker cannot decide when each frame appears on a page, since that is set
automatically.
8. Spreadsheets cannot have any animation effects.
9. Multimedia software only has advantages.
10. Keynote is the equivalent of PowerPoint for Mac computers.

......... /20

5. Talk briefly about electronic organisers, using no more than 10 lines.


......... /20

6. Answer the questions.


1. What is a database?
2. What is a report?
3. What is a flat-file database?
4. What is a network database?
5. What is an object-oriented database?
6. What is a relational database?
7. What is a key field?
8. How can the file size be reduced in a database?
9. Which is the most common database today: relational or non-relational? Why?
10. What are metadata?

......... /20

7. According to the text, sequence the given events in chronological order.


History of Database Applications
One of the most important purposes of development of computer systems was database
applications, in fact, data processing anticipates computers: punched cards were used
in the US for collecting data for census during the beginning of 20th century. Earliest data
processing was done by punched cards on mechanical devices. The real development
in data processing started much late i.e. from the 1950s. Magnetic tapes were used to
store data being read from it. These database applications had hierarchical structure and
used network systems. Later, in the 60s, hard disks came about and data retrieval was
faster and did not need to be stored sequentially. In the 1970s Edgar Codd, father of the
Relational Database Model, conceptualised a new structure for Database construction.
He freed database from procedural ways of querying and marked the beginning of Data
Abstraction. System R, based on Codd’s concept, was developed by IBM and it was the first
to have a language for querying called Structured Query Language.

183

Bit By Bit.indb 183 19/03/18 08:32


Later, System R was further developed to a mainstream commercial DBMS product known
as DB2. Object-oriented programming was rapidly developed in the 80s and it also helped
break into what we know as Object-Oriented Databases. The 90s was the time of the World
Wide Web, that saw data stored on the Internet. More recently, there has been a growing
trend of NoSQL database. NoSQL includes a wide variety of different database technologies
that were developed in response to the demands presented in building modern applications.
Adapted from: http://www.managementstudyguide.com/database-applications-history.htm

................ a. DB2 was developed.


................ b. Database applications had hierarchical structure.
................ c. Object oriented programming influenced the creation of databases.
................ d. Data processing was performed by punched cards read by mechanical tools.
................ e. NoSQL database use increased.
................ f. Data were recorded on magnetic tapes.
................ g. Databases were saved on the internet.
................ h. Edgar Codd created a new querying system to retrieve data.
................ i. Structured query language was born.
................ j. Hard disks were used to store data.

......... /10

Total score  ......... /100

184

Bit By Bit.indb 184 19/03/18 08:32


UNIT
UNIT10
? Name ............................................................................................................................

TEST 2? Class ...................... Date ....................................................................................

1. Match the action with the right software.


1. It is made up of slides.
2. It performs calculations based on data.
3. Images, videos and music can be added to this kind of document.
4. It is divided into cells.
5. Every slide contains frames.
6. Cells may contain formulae.
7. It can both process data and handle text.
8. It helps in attracting and keeping the attention of the audience.
9. Data can be presented by animation effects.
10. It is divided into rows and columns.

Spreadsheet Presentation Software

......... /10

2. Describe the function of these items.


1. Coordinates
2. Conditional formatting
3. Commentary
4. Calendaring software
5. Electronic diary

......... /10

3. Complete the text.


databases • query • notebook applications • non-relational • key fields • report •
electronic diaries • database • relational • fields

Virtual Notebooks and Diaries


Digital Diary, NC Diary, Secret Diary and Journal are the most popular kinds of (1)
…....................................., while Evernote is one of the most popular (2) …..................................... . In order to

collect huge quantities of data, it is better to use a (3) …..................................... , in which data are
stored and retrieved quite easily through a system interrogation called (4) ….....................................,
that supplies a (5) …..................................... to the user. (6) …..................................... can be classified into
relational or non-relational. (7) …..................................... are not based on relationships between
tables, while (8) …..................................... ones store data in separate tables and files, and data are
organised in (9) …..................................... and records. All the data are linked together by
(10) …......................................
......... /10

185

Bit By Bit.indb 185 19/03/18 08:32


4. Are these statements true or false? Correct the false ones.
1. Non-relational databases are usually divided into flat-file databases, network databases
and object-oriented databases.
2. Flat-file databases are stored as objects, belonging to a class and are defined by a
method.
3. Entity is a common relational database.
4. Network databases are made up by very complex relationships of data that may give rise
to security problems.
5. A method is the way in which object-oriented databases are defined.
6. Flat-file database can only be created by DBMS.
7. Database Management System controls who can access particular databases.
8. The key field is the password to access a particular database.
9. Coding is used to expand the file size of the database.
10. Non-relational databases are the most commonly used kind of databases.

......... /20

5. Talk briefly about metadata in a database, using no more than 10 lines.


......... /20

6. Answer the questions.


1. What is the SQL?
2. What is an accounting application? What is it used for?
3. What are CRMs? What are the most common ones?
4. How are databases used by online retail stores?
5. What are word processors used for?
6. What are the main actions of text formatting?
7. What are the main actions of text editing?
8. What are layout and revision in a word processor?
9. What is a header and a footer?
10. What is a template?
......... /20

7. Read the text and put the given events into chronological order.
History of Word Processors
Word processing did not develop out of computer technology. It evolved from the needs
of writers, only later joining the computer field. The history of word processing starts
with the invention of printing at the end of the Middle Ages. But the real first major
advance from manual writing was the typewriter. Henry Mill, an English engineer of the
early eighteenth century, is credited with this invention, but there are no records of this
creation until Christopher Latham Sholes invented the first successful manual typewriter
in 1867, which began to be marketed commercially in 1874 by E. Remington and Sons,
a gun manufacturing company. In the early 1900s, portable models were developed and
marketed. Thomas Edison patented an electric typewriter in 1872, but the first workable
model was not introduced until the 1920s. In the 1930s IBM introduced a more refined
version, the IBM Electromatic. This was soon followed by the M. Shultz Company’s
introduction of the automatic or repetitive typewriter, whose main innovation was the
automatic storage of information for later retrieval.

186

Bit By Bit.indb 186 19/03/18 08:32


In 1964, IBM brought out the MT/ST (Magnetic Tape/Selectric Typewriter), which used a
magnetic tape as the first reusable storage medium for typed information. This development
marked the beginning of word processing as it is known today. The term ‘word processing’
was a translation of the German word textverarbeitung, coined in the late 1950s by Ulrich
Steinhilper, an IBM engineer. In 1972 Lexitron and Linolex developed a similar word
processing system, but included video display screens and tape cassettes for storage, so
that text could be entered and corrected without having to produce a hard copy. The floppy
disk marked a new stage in the evolution of storage media. Developed by IBM in the early
1970s for use in data processing, it was soon adopted by the word processing industry.
Adapted from: https://www.cs.umd.edu/class/spring2002/cmsc434-0101/
MUIseum/applications/wordhistory.html

..................  1. E. Remington and Sons started to sell typewriters.


..................  2. The automatic storage of information was introduced.
..................  3. A magnetic tape became the reusable storage medium for typed information.
..................  4. The floppy disk marked the evolution of word processing.
..................  5. The printing press was invented.
..................  6. Thomas Edison invented an electric typewriter.
..................  7. The first manual typewriter was created.
..................  8. The term ‘word processing’ was coined.
..................  9. IBM Electromatic was introduced.
.................. 10. Portable typewriters were designed.

......... /10

Total score  ......... /100

187

Bit By Bit.indb 187 19/03/18 08:32


UNIT
UNIT11
? Name ............................................................................................................................

TEST 1? Class ...................... Date ....................................................................................

1. Complete the crossword.


Across
3. A common program you can use online to share your photos.
7. A kind of software that allows the modification of existing images and photos.
8. A basic type of image file format used to store digital images.
9. A compressed bitmap.
10. A process to eliminate flaws or degradation in a photo.

Down
1. It is a vector-based or an object-based software.
2. One formula or set of formulae that can represent many sizes of the object.
4. A technique that distorts the original image.
5. An editor tool that allows you to select part of the image and get rid of the rest.
6. A series of coloured dots used in painting software.

3 4

5 6

9 10

......... /10

2. Choose the correct option.


desktop publishing • contrast • red-eye removal • false-colouring • frame-based •
air brushing • frames • brightness • layers • pasteboards

1. …..................................... is an effect used to cover up skin imperfections, change eye colour and
make people look slimmer in the photos.
2. …..................................... is an effect to correct the effect a flash can have on eye colour.
3. …..................................... is the effect that allows you to make the photo lighter or darker.

188

Bit By Bit.indb 188 19/03/18 08:32


4. …..................................... is the effect that allows you to adjust the richness of colours in a photo.
5. …..................................... are the effects that allow you to add elements to an existing photo.
6. …..................................... is the effect that allows you to change the colour of the whole image or
assign colours to a selection of the image.
7. …..................................... is the process of using particular kinds of software to match
text, images and artwork to create documents properly formatted to be printed.
8. Desktop publishing software is usually …..................................... .
9. …..................................... is another name for the pages in a DTP document.
10. …..................................... are invisible bounding boxes around objects or images in a DTP document.
......... /10

3. Complete the sentences changing the prompt into the missing word, in order to
complete the text (you can add suffixes, plurals, prefixes or missing parts or just
change the word form. The first sentence is given as an example).

0. An …............input…............ is data that a computer receives. 0. in


DTP Development
(1) …..................................... publishing (DTP) refers to the practice of producing 1. desk
high quality printed (2) …....................................., fully paginated and including 2. out
3. graph
(3) …....................................., using personal computers, page layout
4. soft
(4) …....................................., and (5) …..................................... designed to create near 5. print
typeset-quality pages. The core (6) …..................................... were developed at the 6. tech
Xerox Palo Alto Research Center in the 1970s. The emergence of DTP was a
major event in the history of (7) …..................................... because it allowed almost 7. publish
any small organization or individuals to produce hardcopy printed pages
suitable for use as printing masters. These had the potential to be nearly
comparable in aesthetic appearance and typesetting (8) …..................................... 8. feat
to what had previously required far more costly, time consuming, and hard-
to-use technologies. Desktop publishing also positioned its users to take
advantage of (9) …..................................... inputs, which was important as word 9. digit
(10) …..................................... became the routine method for document creation. 10. process
Adapted from: http://www.encyclopedia.com/science-and-technology/
computers-and-electrical-engineering/computers-and-computing/desktop
......... /10

4. Are these statements true or false? Correct the false ones.


1. The phrases text frames and graphic frames are synonyms.
2. Blocks are frames that can be moved or resized.
3. The frame is always visible either when the object is selected or when it is de-selected.
4. The quality of the printed document is limited by the quality of the printer.
5. Microsoft Publisher of the Office Suite is one of the most common DTPs.
6. Scribus, Adobe InDesign, QuarkXPress, Serif PagePlus and Adobe FrameMaker are word
processors.
7. CAD stands for Computer Automotive Design.
8. CAD is a vector-based software.
9. CAD does not have any drawbacks.
10. A special printer or plotter is usually required for printing CAD projects.
......... /20

189

Bit By Bit.indb 189 19/03/18 08:32


5. Talk briefly about the activities that can be carried out using CAD. Use no more
than 10 lines.
......... /20

6. Answer the questions.


1. What is professional design rendering?
2. What OS does CAD need in order to work on a PC?
3. What is the most popular CAD system? Is it a free source one?
4. How can a user interact with the computer while using CAD?
5. What is CADD?
6. What is CAGD?
7. What is digital mapping? What are its most important characteristics?
8. How many types can digital mapping be divided into? Which ones?
9. What are the most important features of GIS programs?
10. What is CAC software?
......... /20

7. Read the text and choose the correct option.


GfK Launches RegioGraph 2017
GfK released a completely new version of its geomarketing software RegioGraph at the end of
March. RegioGraph 2017 features a new and simplified interface, faster results and numerous
new options for analysing and optimising locations and sales territories. For the first time,
users can work directly with online maps and aerial images. RegioGraph 2017 gives users
from all industries an innovative and reliable basis for any location-based decision.
Users can visualise customers, target groups and potential on up-to-date digital maps and
carry out analyses based on detailed integrated data on potential, such as GfK Purchasing
Power. Users working in expansion, sales or marketing can use RegioGraph to pinpoint
market weaknesses, identify new turnover opportunities and come up with strategies for
more efficiently exploiting potential. “Our geomarketing software offers a reliable basis
for making more informed decisions in today’s complex and dynamic markets,” explains
Friedrich Fleischmann, Managing Director of GfK’s Geomarketing solution area. “RegioGraph
2017 brings together our more than 25 years of experience as geomarketing consultants.
As such, the software is a powerful and innovative solution for location-based planning
and analyses. RegioGraph gives users from all industries the ability to more successfully
connect their products or services to their customers. Achieving this is absolutely essential
in the digital age and should be the goal of all company activities, from strategic marketing
to specific target groups to prospecting for promising new business sites.”
Adapted from: https://www10.giscafe.com/nbc/articles/view_article.php?articleid=1485061

1. a. RegioGraph was issued for the first time at the end of March.
b. An updated version of RegioGraph was issued at the end of March.
c. GfK invented RegioGraph at the end of March.
2. a. The new RegioGraph is easier to use but more complete, with new functions.
b. The new RegioGraph has more options but it is more complex.
c. The new RegioGraph has a fast research system to find new options.
3. a. RegioGraph maps are taken from a plane.
b. New RegioGraph can be used directly on the Internet.
c. RegioGraph research results can be published online.
4. a. RegioGraph helps companies to find the location of new factories.
b. The new system finds basis for mapping sites.
c. The new system helps factories to make sales location decisions.

190

Bit By Bit.indb 190 19/03/18 08:32


5. a. Maps on RegioGraph show the details of the customers.
b. Maps on RegioGraph show the possible clients in a certain area.
c. Maps on RegioGraph show GfK Purchasing Power.
6. a. The new RegioGraph can underline the possible sales problems in a certain location.
b. The new RegioGraph exploits customers.
c. The new RegioGraph uses market weaknesses.
7. a. Friedrich Fleischmann explains where new RegioGraph can be bought.
b. Friedrich Fleischmann informs people about the new system’s essence.
c. Friedrich Fleischmann explains why RegioGraph could be very useful to modern
businesses.
8. a. The new system employs geomarketing consultants who are 25.
b. The new system uses the knowledge of experts who have worked 25 years in this field.
c. RegioGraph sends 25 geomarketing consultants to the sales location.
9. a. RegioGraph experts call the customers to connect them to the new businesses.
b. RegioGraph helps modern companies to match customers’ requirements to their
products according to a digital analysis.
c. RegioGraph gives the connection to the new businesses.
10. a. RegioGraph is the objective of the incoming companies.
b. RegioGraph’s goal is to aim at specific target groups.
c. RegioGraph can also be suitable for market research for opening activities.
......... /10

Total score  ......... /100

191

Bit By Bit.indb 191 19/03/18 08:32


UNIT 11 Name ............................................................................................................................

TEST 2 Class ...................... Date ....................................................................................

1. Complete the crossword.


Across
3. A feature that makes something less acceptable and can represent a disadvantage or
problem.
7. Invisible bounding boxes around objects in DTB.
8. DTP.
9. Kind of software CAD usually has.
10. Pages in DTB.

Down
1. The primary DTP of the Office Suite.
2. Computer-Aided Design.
4. In 3D graphic design the process of add shading or colour to a 2-D or 3-D image in order to
make it more realistic.
5. Frames that can be moved or resized with the help of special handles in DTB.
6. Computer-Aided Geometric Design.

6 7

10

......... /10

192

Bit By Bit.indb 192 19/03/18 08:32


2. Choose the correct option.
platforms • plotter • three-dimensional • memory • two-dimension •
Computer–Aided design • graphic tablet • expensive • powerful hardware • training

1. …..................................... produces the design and drafting of objects and materials through the
use of specialised software.
2. CAD packages often need a lot of …......................................
3. CAD allows users to design an object in …..................................... and then process it into a
…..................................... design.
4. Professional CAD systems need …..................................... such as microcomputers with special
chips. CAD software is very …..................................... and complex, so users need a lot of
…..................................... to use it.
5. A special printer or …..................................... is usually required for printing professional CAD
design.
6. CAD systems are available for the major computer , including Windows,
….....................................

Linux, Unix and Mac.


7. The user interface generally centres around a computer mouse, but a pen or a
…..................................... can also be used.
......... /10

3. Complete the sentences changing the prompt into the missing word, in order to
complete the text (you can add suffixes, plurals, prefixes or missing parts or just
change the word form. The first sentence is given as an example).

0. An ...........input…................... is data that a computer receives. 0. in

Enhanced analysis, planning and modelling

RegioGraph 2017 offers (1) …..................................... new 1. innovation


(2) …..................................... for data mining, allowing (3) …..................................... 2. opt
to filter data even faster and more comprehensively for the sake of 3. use
(4) …..................................... new market (5) …...................................... Results are 4. location
shown in real time on a map, so users can get quick insights into 5. potent
their (6) …..................................... market regions. RegioGraph 2017 also 6. act
features (7) …..................................... and simplified sales territory (8) 7. prove
…..................................... options. The latest (9) …..................................... version 8. optimise
also delivers new (10) …..................................... for planning 9. soft
and evaluating locations. 10. possible

Adapted from: https://www10.giscafe.com/nbc/articles/view_article.php?articleid=1485061

......... /10

193

Bit By Bit.indb 193 19/03/18 08:32


4. Are these statements true or false? Correct the false ones.
1. Digital mapping is a type of software that allows the representation of cartographic
features.
2. Cartographic features of digital mapping have values and attributes that cannot be
manipulated and stored.
3. Digital mapping can be divided into three different kinds: GPS Internet Systems, Computer
Maps and mapping programs.
4. The first GIS standard packages were created in the 1990s to analyse spatial data.
5. The most important feature of GIS is its topological structure that allows the user to work
with logical relations between different geometric elements.
6. GIS applications have expanded in the last few years because they are user-friendly, easy
to learn, and not very expensive.
7. CAC software has a large number of special functions and tools used for high quality
visualisation of spatial data.
8. CAC software works with data layers instead of topological relations.
9. The most common types of CAD used for digital mapping are Microstation and AutoCad.
10. Microstation and AutoCad were initially designed for digital cartography, then adapted for
engineering.

......... /20

5. Talk briefly about painting software. Use no more than 10 lines.


......... /20

6. Answer the questions.


1. What is drawing software?
2. What kind of software is the drawing one?
3. What is the drawing image made up by?
4. How are drawing software objects saved?
5. What is the most important advantage of a vector approach?
6. What does the word scalability mean?
7. What does photo editing software do?
8. What is JPEG?
9. How can photos be edited?
10. What are the most common photo editing computer programs?

......... /20

7. Read the text and choose the correct option.


Professional Photo Editing Software: What to Look For
Whether you’re a professional photographer or a serious enthusiast, post-processing and
organising are an essential part of photography. As digital resolution improves, the file size
of photos increases, so you can really benefit from software that can quickly process large
files, and that also incorporates editing tools for fixing small details. While professional
photographers take perfectly composed shots with flawless exposure levels, most
photos could still use subtle touch-ups. While Adobe Photoshop has been a benchmark
for professional photographers and digital artists, there are many other substantive
competitors to consider. The best choice for photography software will depend on your
preferences.

194

Bit By Bit.indb 194 19/03/18 08:32


Many people like using one program for organising and another for editing. Some programs
are often used in tandem, such as Photoshop and Lightroom. Some programs, like Portrait
Professional, can be used alone or as plugins for Photoshop. Features to look for when
you choose professional photo editing software include organisation and importing tools,
the ability to edit individual photos, the ability to customise your workflow and the options
for publishing and output. Some sports photographers will shoot thousands of photos to
publish only a handful from a single event. Wedding photographers also take hundreds
of shots to document one significant event. For these and many other instances, the
most important part of post processing involves the ability to quickly sort through large
quantities of photos rather than make significant changes to individual photos. Once you’ve
established a unique style and pattern of processing, you’ll want photo editing software that
can automate those actions to save you hours of extra work. Some photo editing software
can include sharpening, resizing, adding colour profiles and making other finishing touches
to batches of photos. Likewise, if the majority of your work goes online for sale, blogging
or other methods of publishing, some professional photo editing software can do this
automatically.
Adapted from: http://www.toptenreviews.com/software/articles/
best-professional-photo-editing-software-review

1. a. Post-editing and organisng are only important for professional photographers.


b. Amateurs are not able to post-process their photos without specific software.
c. Post-editing and organising are important for both professional and amateurs of the
photography world.
2. a. The file size of photos grows alongside digital resolution.
b. New digital resolution has made photos lighter.
c. Digital resolution increases when file size of the images is smaller.
3. a. Photography software is only used by photographers.
b. New photography software is mostly used by non-experts.
c. New photography software can quickly process large files and also includes editing
tools to edit them.
4. a. Professional photographers control exposure levels to take their photos without using
the automatic settings of the camera.
b. Professional photographers don’t need photography software to adjust photos.
c. Professional photographers always use the setting of their professional cameras.
5. a. Adobe Photoshop is still the only photo editing system.
b. Adobe Photoshop was the first very important photo editing system.
c. Adobe Photoshop is used only to upload files on the Internet.
6. a. There are no photo editing systems to choose from online.
b. At the moment there are several photo editing systems you can choose according to
their characteristics.
c. Photo editing systems continuously improve Adobe Photoshop.
7. a. Lightroom is developing photo editing software.
b. Only one program can be used for photo editing.
c. More than one program can be used for photo editing.

195

Bit By Bit.indb 195 19/03/18 08:32


8. a. In photo editing software it is important to check organisation and importing tools, the
possibility of editing photos and the options for publishing and output.
b. In photo editing software it is important to check how many photos you can edit, the
colours of the table and the availability online.
c. In photo editing software it is important to check if pictures can be modified
autonomously.
9. a. It is more important to take few good photos than to select from big quantities.
b. Professionals can quickly choose good shots from large quantities of pictures, instead
of wasting time correcting every single photo.
c. Professionals make significant changes to every single individual photo.
10. a. Photo editing software only sharpens the colours of the photos.
b. Photo editing for blogging is automatic.
c. Photo editing software allows you to apply your style automatically to the photos in
order to save time.

......... /10

Total score  ......... /100

196

Bit By Bit.indb 196 19/03/18 08:32


UNIT
UNIT12
? Name ............................................................................................................................

TEST 1? Class ...................... Date ....................................................................................

1. Explain the meaning of the given vocabulary.


1. Virtual Reality
2. Haptics
3. Videogame
4. Audiovisual apparatus
5. Trilateration
......... /10

2. Fill in the gaps with the given vocabulary.


triangulation • broadcast • satellites • speed of light • Global Positioning System •
transmits • navigation • position • intervals • pinpoint

How Does GPS Work?


The (1) …..................................... is a network of about 30 (2) …..................................... orbiting the Earth
at an altitude of 20,000 km. The system was originally developed by the US government for
military (3) …....................................., but now anyone with a GPS device can receive the radio signals
that the satellites (4) …...................................... Wherever you are on the planet, at least four GPS
satellites are ‘visible’ at any time. Each one (5) …..................................... information about its
(6) …..................................... and the current time at regular (7) …...................................... These signals,
travelling at the (8) …....................................., are intercepted by your GPS receiver, which calculates
how far away each satellite is, based on how long it took for the messages to arrive.
Once it has information on how far away at least three satellites are, your GPS receiver can
(9) …..................................... your location using a process called (10) …......................................
Adapted from: http://www.physics.org/article-questions.asp?id=55
......... /10

3. Complete the sentences with the right option.


1. …................. effects, also called SFX, SPFX or FX, are illusions or visual tricks used to simulate
real events in film making.
2. SFX are usually divided into two groups: …................. effects.
3. Physical effects is another name for …................. effects.
4. Physical effects may include the use of …................. .
5. Scale models, animatronics and atmospheric effects are …................. effects.
6. …................. makeup is used to make an actor look like a non-human creature.
7. …................. effects can be added to a given background and can also be used in post-
production.
8. Photographic effects is another name for …................. effects.
9. …................. effects are a new category of SFX that started to develop in the 1990s and refer
to digital postproduction.
10. …................. (CGI) has gradually replaced the traditional SPX.

197

Bit By Bit.indb 197 19/03/18 08:32


1. a. Skin b. Scale c. Special d. Static
2. a. visual and b. mechanical and c. visual and optical d. mechanical and
interactive optical practical
3. a. optical b. visual c. mechanical d. digital
4. a. props b. visuals c. animation d. engineering
5. a. optical b. visual c. photographic d. mechanical
6. a. Static b. Prosthetic c. Anatomical d. Photographic
7. a. Optical b. Mechanical c. Practical d. Visual
8. a. mechanical b. practical c. optical d. visual
9. a. Photographic b. Visual c. Optical d. Physical
10. a. Computer b. Computer Graphics c. Computer Global d. Computer Graphics
Generated Images Interaction Imagination
Imagery
......... /10
4. Are these statements true or false? Correct the false ones.
1. Reverse engineering is a CGI technique used to recreate historical buildings in film making.
2. MIDI is the acronym for Musical Instrument Digital Interface.
3. MIDI files are the actual recording of a piece of audio, therefore they use the same disk
space as MP3 files.
4. The Normal MIDI file is a standardised file format to save music sequences in order to
transport and open them in other systems.
5. Notation software is used to generate titles and text lines in a karaoke program automatically.
6. Score writers allow users to write musical notes and play them back.
7. Finale and Sibelius are the most popular DAWs.
8. DAW stands for Digital Automatic Writer.
9. DAW are programs that include specific tools for the entire music creation process, such
as recording, editing, writing and producing audio files.
10. DAW has a main interface from which a user can change and mix different recordings to
produce a final musical product.
......... /20

5. Talk briefly about domotics and define what a smart home is. Use no more than 10 lines.
......... /20

6. Answer the questions.


1. What is a business application?
2. What is Computer Aided Manufacturing used for?
3. What is the main function of Computer Integrated Machinery?
4. What does Enterprise Resource Planning imply?
5. What is the Supply Chain Management System?
6. What is Computer Aided Design used for?
7. What kind of software do small businesses use in order to manage their accounting?
8. What is the Customer Relationship Management?
9. What do shops usually use to code goods?
10. What is an Electronic Point of Sale?
......... /20

198

Bit By Bit.indb 198 19/03/18 08:32


7. Read the text and decide if these statements are true or false. Correct the false ones.
The Positive and Prospective Aspects of Online Learning
Distance education has scored high in terms of the flexibility it offers. Remote access to
distance learning courses help students worldwide to study from their own comfort zone.
Greater than flexibility, distance learning provides students’ independency, in terms of
allowing them to focus more on acquiring knowledge or skills they need to work on and skip
aspects they already know. Apart from this advantage, the teaching style in terms of faculty
and course structure has evolved in order to align with the required standards of the current
job market.
Distance learning courses range from humanities to management courses, helping
students to make their curriculum more relevant, applicable and accountable in the job
industry. Instant access and quality resources are important aspects of learning in distance
education. The online medium, with its 24/7 connectivity, serves as a global interface
for students to network with their peers, share knowledge, learn from the experts and
grow in all terms. All these aspects of new-age distance education lead to a credible and,
sometimes, more valuable consideration in the eyes of future employers.
Distance education has become an important and extremely valued part of tertiary
education, with colleges and universities providing certifications that are equally
acknowledged with the certifications students receive from a traditional study programme.
Online education, including courses and distance degrees, has managed to make education
more accessible and to bring a significant contribution to the global education goal –
“education for all”.
Adapted from: https://www.distancelearningportal.com/articles/143/
how-distance-learning-degrees-are-changing-higher-education-for-the-better.html

1. Distance education can easily be adapted to the various situations.


2. Distance learning obliges users to attend lessons in a comfortable place.
3. Online learning must be done step by step, without passing over any topics.
4. Distance learning suits job market requirements better than traditional study programmes. 
5. Distance learning courses can extend from social studies to business subjects.
6. The most important features of distance study are the lack of excellence and little
consideration in the job market.
7. Online students don’t have the chance to meet their peers and share knowledge.
8. Future employers don’t recommend distance education.
9. Nowadays distance learning programmes and traditional study ones can have the same
value.
10. Distance education makes a higher number of resources available to those who cannot
attend a normal study programme.

......... /10

Total score  ......... /100

199

Bit By Bit.indb 199 19/03/18 08:32


UNIT
UNIT12
? Name ............................................................................................................................

TEST 2? Class ...................... Date ....................................................................................

1. Explain the meaning of the given vocabulary.


1. E-learning
2. Interactive Whiteboard
3. Edutainment
4. Classroom Performance System
5. Computer-based training
......... /10

2. Fill in the gaps with the given vocabulary.


materials • online learning • web • teaching • access • e-learning • assessment •
content • virtual learning environment • functions

Web-based Learning
Web based learning is often called (1) …..................................... or (2) …..................................... because it
includes online course (3) …...................................... Discussion forums via email, videoconferencing,
and live lectures are all possible through the (4) …......................................
Web based courses may also provide static pages such as printed course
(5) …...................................... One of the values of using the web to (6) ….....................................course
materials is that web pages may contain hyperlinks to other parts of the web, thus enabling
access to a vast amount of web based information. A (7) …....................................., or managed
learning environment (MLE), is an all in one (8) ….....................................and learning software
package. A VLE typically combines (9) ….....................................such as discussion boards, chat
rooms, online (10) …....................................., tracking of students’ use of the web, and course
administration.
Adapted from: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC1125774/

......... /10

3. Complete the sentences with the right option.


1. …............. is any software that carries out functions to increase and measure productivity.
2. …............. is an accurate and fast system of production in which a computer controls the
devices performing the work and helps the reduction of labour fees.
3. …............. is a system controlled by a computer in which robots carry out routine and
dangerous work on a production line.
4. …............. is a large database that allows the organisation, automation and synchronisation of
different business procedures.
5. …............. is an application that permits payments with credit and debit cards.
6. An …............. delivers cash or takes deposits 24 hours a day.

200

Bit By Bit.indb 200 19/03/18 08:32


7. …............. are largely used and read by a portable device in order to code the various goods in a
shop.
8. …............. is another way to code the various goods in a shop. It is a square shape and the
image can be read by a smartphone or a tablet.
9. …............. is an application software used to generate models and 3D drawings in order to
reduce the necessity of physical models and prototypes to test certain conditions.
10. A …............. is usually used by smaller companies to perform their business management.

1. a. Blended learning b. Business c. Learning platform d. Pinpoint


application
2. a. Computer Aided b. Computer c. Customer d. Electronic Point
Manufacturing Integrated Relationship of Sale
Machinery Management
3. a. Customer b. Home accounting c. Computer d. Computer Aided
Relationship software Integrated Manufacturing
Management Machinery
4. a. Computer Aided b. Customer c. Automated Teller d. Deposit
Design Relationship Machine machinery
Management
5. a. Computer b. Ground receiver c. Electronic Point of d. Barcode
Integrated Sale
Machinery
6. a. Automated Teller b. QR code c. Customer d. Electronic Point
Machine Relationship of Sale
Management
7. a. Web platforms b. Text writers c. Electronic points d. Barcodes
of sale
8. a. QR Code b. Barcode c. Automated Teller d. Electronic point
Machine of sale
9. a. Computer Aided b. Computer Aided c. Computer d. Customer
Manufacturing Design Integrated Relationship
Machinery Management
10. a. blended learning b. Electronic Point c. home accounting d. ground receiver
of Sale software

......... /10

4. Are these statements true or false? Correct the false ones.


1. The Global Positioning System is composed of 9 satellites in orbit around the Earth.
2. People can pinpoint their geographical position thanks to ground receivers.
3. The owner and operator of the GPS system is the US Ministry of Foreign Affairs and it is
rented by famous companies such as Tom Tom, Garmin etc.
4. Satellites are aligned in such a way that, from any point on Earth, four satellites are placed
above the horizon.
5. Every satellite continuously broadcasts its changing position in time, while following a
particular orbit.
6. GPS ground receivers are able to triangulate satellites’ positions.

201

Bit By Bit.indb 201 19/03/18 08:32


7. The various positions received from the satellites are called ‘relevances’.
8. Mobile GPS technology enables users to receive navigation instructions thanks to a global
positioning system process called pinpoint.
9. Haptics is an artificial environment created with software and presented as a real
environment.
10. ‘VRML’ is the acronym for Video Recording Music Listening.

......... /20

5. Talk briefly about videogames and the devices needed for the interaction between
user and computer. Use no more than 10 lines.

......... /20

6. Answer the questions.


1. What are mechanical effects?
2. What are optical effects?
3. What is Computer Generated Imagery?
4. What is a Musical Instrument Digital Interface?
5. What is a DAW?
6. What is a SFX?
7. How many kinds of special effects are used in film shooting?
8. Can you mention some types of computer generated images?
9. What kind of standardised file format do users use to save music sequences?
10. What is notation software used for?
......... /20

7. Read the text and decide if these statements are true or false. Correct the false ones.
Domotics as an Eco-friendly Approach to Improve Domestic Life
Domotics makes your home smart: locks that open at a touch, appliances that do whatever
you want when you’re not at home, thermostats that can be programmed according to
your working needs. Everything can be monitored and managed via cell phone. Since new
technologies and telecommunications have spread, experts have started to develop a new
science, domotics, whose name comes from “domus” and “robotics”. Domotics, or home
automation, studies the technologies applied to the domestic environment with a particular
focus on environmental issues, energy saving, and the improvement of people’s lifestyles.
Traditional installations have a control device such as a light switch or a thermostat. Since
domotics and smart installations have been invented, these functions can be managed
through a remote system directly connected to a smartphone, tablet, PC. This makes it
possible to monitor the situation at home at any moment, even when you’re far from it. The
house of the future will be smart because it will imply high levels of interaction between
users and the appliances they have within their homes, guaranteeing control, safety and
energy saving. Smart electric power systems aim to reduce the electricity demand by remotely
controlling appliances to avoid exceeding the maximum limit of the electricity metre; recording
and communicating potential anomalies in the system; warning you if there are functioning
devices when you’re not at home.

202

Bit By Bit.indb 202 19/03/18 08:32


By simplifying the way we manage devices and appliances it is possible to reduce energy
waste, which has a negative impact on the environment and increases costs. Smart homes
are made of systems aimed at avoiding domestic waste. Domotics today is not as expensive
as it was once: it doesn’t require high-priced systems and cables. It is connected to the Wi-Fi.
With controllable management you can remotely use the oven, washing machine and induction
hob in the period of the day when electricity is cheaper, or even recharge your electric car if
you have one.
Adapted from: http://www.lifegate.com/people/lifestyle/seoullo-7017-seoul-south-korea

1. Thanks to domotics setting the temperature of your flat is possible before you reach home.
2. Domotics is a science studying automotive technologies.
3. Domotics focuses on pollution and eco-friendly approaches.
4. Domotics systems can be controlled through a remote control connected to digital devices
such as smartphones or tablets.
5. Domotics does not allow the security systems to be checked when you are abroad.
6. Houses in the future will be smart because there won’t be any interaction between users
and appliances, but computers will control everything automatically.
7. Domotics aims at reducing electricity demand, controlling the performance of the electrical
systems of the house.
8. Domotics also aims at reducing costs.
9. Smart homes are still very expensive.
10. Domotics cannot work remotely in the period of the day when electricity is cheaper.
......... /10

Total score  ......... /100

203

Bit By Bit.indb 203 19/03/18 08:32


UNIT 13 Name ............................................................................................................................

TEST 1 Class ...................... Date ....................................................................................

1. Complete the sentences using the correct option.


(1) …................ is the action of sending information from one place to another.
(2) …................ is the transmission of signals over long distances. The first invention in this field is
the (3) …................, which came out in 1837, followed by the (4) …................ in 1876. Their aim was
to (5) …................ the messages sent as signals that could be transmitted through copper
(6) …................. A message is usually transmitted along a (7) …................, between a (8) …................,
that is the source of a message, and a (9) …................, that is the actual destination of the
message. The (10) …................ in the microphone takes the message from the source and
translates it into a form that can be transferred along the communication channel.

 1. a. Telephoning b. Converting c. Receiving d. Communicating


 2. a. Telecommunications b. Wire c. Channel d. Message
 3. a. mobile phone b. telegraph c. transmitter d. transducer
 4. a. telegraph b. transducer c. telephone d. telefax
 5. a. convert b. read c. record d. store
 6. a. cable b. wires c. disks d. infrared
 7. a. channel b. corner c. receiver d. transducer
 8. a. transducer b. receiver c. transmitter d. channel
 9. a. receiver b. transmitter c. transducer d. channel
10. a. wire b. transducer c. disk d. translator
......... /10

2. Describe the most important characteristics of the given items.


1. Simplex
2. Duplex
3. Multiplex
4. Synchronous transmission
5. Asynchronous transmission
......... /10

3. Complete the sentences with the given options.


network card • client-server • ports • point-to-point • network • hub • packet switching •
network interface card • peer-to-peer • circuit switching

1. A …..................................... transmission refers to a communications connection between two


nodes or endpoints.
2. Data can travel inside a …..................................... or …..................................... network: in the first, a
dedicated channel has to be established between users before sending the message, in
the second it is not necessary to establish an initial connection.

204

Bit By Bit.indb 204 19/03/18 08:32


3. In a …....................................., a number of computers are linked together, so that they are able to
share resources, software, data and even a connection to the Internet. There are two ways
of operating it: …..................................... and …......................................
4. A …..................................... or an adaptor called …....................................., are the equipment needed by a
computer to connect to a particular network.
5. A …..................................... is a common connection point for devices in a network. It is a small,
simple, inexpensive device that joins several cables into a single output, which contains
small holes called …......................................
......... /10

4. Are these statements true or false? Correct the false ones.


1. A bridge is a device that acts as the central point between computers and networks in
order to select the right path for communication traffic.
2. A broadband router is used for home networks with a high-speed cable modem or DSL
Internet service.
3. A network switch is like a hub, and is used to join multiple computers in a network, but is
more intelligent.
4. A router is used to filter data traffic by dividing the network into two segments, deciding if
incoming data have to be forwarded or discarded.
5. A repeater repeats the incoming message many times, until the receiver connects the
data.
6. A gateway is a passage that connects two networks which belong to different networking
models.
7. LAN and WAN are the most common types of computer networks.
8. A VPN is a Verified Public Network.
9. Computer networks are only classified according to their geographical area.
10. The three main types of VPNs are Intranet VPNs, Extranet VPNs and Access VPNs.
......... /20

5. Talk briefly about network topologies. Use no more than 10 lines.


......... /20

6. Answer the questions.


1. What is an Open System Interconnection?
2. What organisation developed the open system interconnection?
3. What kind of architecture does OSI have?
4. What is the physical layer? What is its function?
5. What does a data link layer do?
6. What does a network layer do?
7. What is the transport layer? What is its function?
8. What does a session layer do?
9. What is the presentation layer? What is its function?
10. What does an application layer do?
......... /20

205

Bit By Bit.indb 205 19/03/18 08:32


7. Find the phrases with the same meaning as the given words in the text.
Networking 101: Understanding the Internet Protocol
Internet Protocol (IP) is responsible for getting datagrams to their destination (We’ll be
using “datagram” to refer to an entire IP message, and “packet” to identify an individual
IP packet.). Originally defined in RFC 791, IP has changed and been clarified a few times
since, but the fundamental design remains the same. The IP layer does not provide any
type of flow-control or sequencing capabilities – that’s left to the upper layers. IP sends
and receives packets to and from IP addresses, but doesn’t promise reliable delivery.
For various reasons, packets may be lost, corrupted, duplicated, delivered out of order or
otherwise delayed. IP is also responsible for dealing with IP options and giving feedback in
the form of ICMP error and control messages.
Adapted from: http://www.enterprisenetworkingplanet.com/netsp/article.php/3585916/
Networking-101-Understanding-the-Internet-Protocol.htm

1. from then on ���������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������


2. supply ������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������
3. abilities to perform �����������������������������������������������������������������������������������������������������������������������������������������������������������������������������
4. you can rely on ���������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������
5. the sending or transportation to a user �����������������������������������������������������������������������������������������������������������������������������
6. altered �����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������
7. broken �����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������
8. alternatively �����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������
9. having to do with �����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������
10. response �����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������

......... /10

Total score  ......... /100

206

Bit By Bit.indb 206 19/03/18 08:32


UNIT
UNIT13
? Name ............................................................................................................................

TEST 2? Class ...................... Date ....................................................................................

1. Complete the sentences using the correct option.


• A number of computers that are connected in a group in order to share resources,
software, data and even a connection to the Internet is called a (1) …..............
• (2) …............. is a kind of (3) …............. in which all the computers have equal status and every
computer can share other computer’s resources; the system is slowed down when more
people use it at the same time.
• A (4) …............. is a system of connections in which a powerful computer, called the
(5) …............., is used to store the data and programs needed by the whole group of
computers linked together.
• Data signals can travel from one computer to another passing through metal
(6) …............., (7) …............. cables or a (8) …............. connection.
• In order to connect to a network, a computer must have a network card or adaptor called
(9) …............. which prepares the data to be sent into the system.
• A (10) …............. is a small, simple, and inexpensive device that joins several cables into a
single output.

1. a. connection b. network c. client-server d. bridge


2. a. Peer-to-peer b. Client-server c. Bridge d. Gateway
3. a. client-server b. gateway c. network d. bridge
4. a. client-server b. peer-to- peer c. gateway d. broadband
5. a. router b. repeater c. bridge d. server
6. a. Wi-Fi b. wires c. cards d. ports
7. a. fibre optic b. bluetooth c. infrared d. gateway
8. a. connective b. client-server c. wireless d. hub
9. a. network interface b. network c. network d. ethernet
card gateway repeater
10. a. server b. hub c. router d. network interface card

......... /10

2. Describe the most important characteristics of the given items.


1. Router
2. Network switch
3. Bridge
4. Repeater
5. Gateway

......... /10

207

Bit By Bit.indb 207 19/03/18 08:32


3. Complete the sentences with the given options.
terminator • star • point-to-point • nodes • network topology • links • line bus • backbone
• gateways • central switch

Layout of Workstations
In computer networking, (1) …..................................... refers to the layout of connected devices, i.e.
computers and other electronic devices usually referred to as (2) …......................................
They are (3) …..................................... that can receive, store and send information along different
routes through a distributed network and, in small networks, they are simply devices that
perform particular functions. Every node has one or more (4) …..................................... to the others,
therefore they can appear in a variety of different shapes. The simplest connection is
(5) …....................................., which is a dedicated link between two endpoints. It can be a one-
way link, or a two-way communication when a return link is added. Other kinds of network
topologies are: (6) …....................................., in which data are sent to every device at the same time
and these devices are along a line and have the same status; a bus, in which workstations
are connected through a communication cable called (7) …....................................., in which data
travel in both directions and at the end of which there is a (8) …....................................., preventing
the signal from being reflected back down the line. Another common type of connection is the
(9) …....................................., in which a (10) …..................................... acts as a router to transmit messages.
......... /10

4. Are these statements true or false? Correct the false ones.


1. An Intranet VPN is used to link the branches of the internal company of a network, with
limited access for the various employees.
2. An Extranet VPN is used to link the various Internet networks around the World.
3. An Access VPN is used to provide remote access to the Intranet or Extranet of the
company, from home or from a small office.
4. A ring is a kind of network topology in which each node is connected to two other nodes,
so as to create a ring that is very common and efficient.
5. A mesh is a kind of network topology in which messages can take various several routes
from source to destination.
6. OSI is a reference model for how applications can communicate over a network.
7. The OSI model is a three-layer architecture which defines the levels of a complete
communication system.
8. The first layer of the OSI model is the transport layer.
9. The link layer synchronises the information transmitted over the physical layer.
10. The network layer conveys the signal through different channels and from one node to the
other, deciding which way the signal has to go.

......... /20

5. Talk briefly about the various types of networks according to their dimensions.
Use no more than 10 lines.
......... /20

208

Bit By Bit.indb 208 19/03/18 08:32


6. Answer the questions.
1. How can we define telecommunications?
2. How is a message transmitted in telecommunications?
3. What’s the name of the source of the message in telecommunications?
4. What’s the name of the destination of the message in telecommunications?
5. What is a transducer?
6. What is an amplifier used for in telecommunications?
7. What are the encoder and the decoder used for?
8. What is a duplex?
9. What is a broadcast?
10. What is a multiplex?

......... /20

7. Find phrases with the same meaning as the given words in the text.
Packet-Switched vs Circuit-Switched Networks
Packet-switched networks move data in separate, small blocks – packets – based on the
destination address in each packet. When received, packets are reassembled in the proper
sequence to make up the message. Circuit-switched networks require dedicated point-to-
point connections during calls. Circuit-switched networks and packet-switched networks
have traditionally occupied different spaces within corporations. Circuit-switched networks
were used for phone calls and packet-switched networks handled data. However, because
of the reach of phone lines and the efficiency and low cost of data networks, the two
technologies have shared chores for years. Designed in 1878, circuit-switched networks
reserved a dedicated channel for the entire communication and their primary hardware was
the private branch exchange (PBX) system. In modern circuit-switched networks electronic
signals pass through several switches before a connection is established and, during a call,
no other network traffic can use those switches.
Adapted from: https://www.computerworld.com/article/2593382/networking/
networking-packet-switched-vs-circuit-switched-networks.html

1. information
2. rebuilt
3. appropriate
4. demand
5. companies
6. managed
7. extent
8. tasks
9. not public
10. settled

......... /10

Total score  ......... /100

209

Bit By Bit.indb 209 19/03/18 08:32


UNIT 14 Name ............................................................................................................................

TEST 1 Class ...................... Date ....................................................................................

1. Put the words below under the correct heading.


modem • E-commerce • leisure • URL • Information Retrieval • DNS • education •
temporary IP address • emails • ISP

Internet connection Types of Internet services

1. .................................................................................................. 1. ..................................................................................................
2. .................................................................................................. 2. ..................................................................................................
3. .................................................................................................. 3. ..................................................................................................
4. .................................................................................................. 4. ..................................................................................................
5. .................................................................................................. 5. ..................................................................................................

......... /10

2. Describe the meaning and the function of these items.


1. The Internet
2. ARPANET
3. TCP/IP
4. WWW
5. Service provider
......... /10

3. Complete the sentences with the given words.


HTML • hypermedia • world wide web • hypermedia • website • URL • hypertext links •
bookmark • hypertexts • browser

1. The …..................................... was developed by the English scientist Tim Berners-Lee in 1989.


2. The Web is an Internet-based …..................................... system for global information and sharing
of resources.
3. The …..................................... is the address of a specific webpage or file on the Internet.
4. Uniform Resource Locators are interlinked on the Web by …......................................
5. …..................................... is a text that links to other relevant information on the net.
6. …..................................... are documents that contain or have links to other types of media such as
pictures, sound and video.
7. A …..................................... is a collection of web pages.
8. A …..................................... is a program aimed at entering and viewing websites. The most
common ones are Explorer, Chrome, Firefox and Safari.
9. …..................................... is the language used to create webpages.
10. A …..................................... is a shortcut which is recorded in order to direct your browser directly to
a specific webpage.

......... /10

210

Bit By Bit.indb 210 19/03/18 08:32


4. Are these statements true or false? Correct the false ones.
1. A browser can save a list of favourites, that is, an archive of website addresses you can
enter directly, without typing them again.
2. Modern browsers still have the problem that they cannot support multiple types of HTML.
3. Websites can work perfectly in every browser.
4. A search engine is a website that has the function of looking for other websites.
5. A search engine is a type of software that randomly picks up Internet sites according to the
search details.
6. A search engine interface can vary from one search engine to the other.
7. The results of a search engine enquiry are usually presented in hypertexts, which can be
clicked and directly lead to the actual file.
8. Search engines use multiple web spiders to crawl large quantities of pages and generate a
wide variety of results.
9. Spiders check the titles of the various websites and then build an index of titles, which can
be clicked by the user.
10. Users can restrict the results of a search by using more than one keyword and logical
operators.
......... /20

5. Talk briefly about Wikis, using not more than 10 lines.


......... /20

6. Answer the questions.


1. What is an electronic mail?
2. What means of transmission does a user need in order to send an electronic mail?
3. What is an email client?
4. Is it necessary to connect to the Internet in order to write emails? Why?
5. What are the most common email clients?
6. What do desktop email clients usually offer?
7. What is a web based email?
8. What are the most common examples of web based email?
9. What is cloud computing?
10. How many types of cloud computing are there? What are their names?
......... /20

7. According to the text, put the given events into chronological order.
A Brief History of Cloud Computing
When we think of cloud computing, we think of situations, products and ideas that started
in the 21st century, but cloud concepts have existed for many years. It was a gradual
evolution that started in the 1950s with mainframe computing. Multiple users were
capable of accessing a central computer through dumb terminals, whose only function
was to provide access to the mainframe. Because of the cost of buying and maintaining
mainframe computers, providing shared access to a single resource was the solution that
made economical sense for this sophisticated piece of technology. After some time, around
1970, the concept of virtual machines (VMs) was created. Using virtualisation software like
VMware, it became possible to execute one or more operating systems simultaneously in
an isolated environment. Complete virtual computers could be stored inside one physical
hardware which, in turn, could run a completely different operating system.

211

Bit By Bit.indb 211 19/03/18 08:32


The VM operating system took the 1950s’ shared access mainframe to the next level,
permitting multiple distinct computing environments to reside on one physical environment.
Virtualisation came to drive the technology, and was an important catalyst in the
communication and information evolution. In the 1990s, telecommunications companies
started offering virtualised private network connections. The newly offered virtualised
private network connections had the same service quality as their dedicated services at a
reduced cost. Instead of building out physical infrastructure to allow for more users to have
their own connections, telecommunications companies were now able to provide users with
shared access to the same physical infrastructure. In the end, the story does not finish
here. The evolution of cloud computing has only just begun.
Adapted from: https://www.ibm.com/blogs/cloud-computing/2014/03/a-brief-history-of-cloud-computing-3/

................ a. Companies supplied a shared access to the same very expensive resource.
b. Mainframe computing marked a step forward to the first cloud computing
................ concepts.
c. Several virtual computers could be run in a unique hardware executing different
................ operating systems in turns.
................ d. Virtual private network connections were offered on the market.
................ e. Virtual machines were invented.
................ f. Cloud computing concepts started to come out.
................ g. The execution of several operating systems at the same time became possible.
h. A shared access to the same physical system was now supplied by
................ telecommunication companies.
................ i. Several users could enter the same mainframe contemporarily.
................ j. Different computing environments could work in the same physical environment.

......... /10

Total score  ......... /100

212

Bit By Bit.indb 212 19/03/18 08:32


UNIT
UNIT14
? Name ............................................................................................................................

TEST 2? Class ...................... Date ....................................................................................

1. Put the words below under the correct heading.


web spiders • interface with a blank field • IaaS • hypertext • PaaS • logical operators •
SaaS • pay-as-you-go model • indexes of databases • cloud storage

Search engines Cloud computing

1. ….....................................…......................................................... 1. ….....................................….........................................................
2. ….....................................….......................................................... 2. ….....................................…..........................................................
3. ….....................................….......................................................... 3. ….....................................…..........................................................
4. ….....................................….......................................................... 4. ….....................................…..........................................................
5. ….....................................…........................................................... 5. ….....................................…...........................................................

......... /10

2. Describe the function of these items.


1. Crawl
2. Keyword
3. Wiki
4. Collaborative trust
5. Nupedia
......... /10

3. Complete the sentences with the given words.


Virtual Private Cloud Hosting • Wikipedia • Cloud computing • email • email client •
Private Cloud Computing • offline • Public Cloud Computing • Web based emails • WAP

1. …..................................... is the best known example of a wiki web site and is the fifth most visited
website.
2. An …..................................... is a way of sending messages and documents from one computer to
another.
3. Messages can also be sent using …..................................... on a mobile phone.
4. An …..................................... is a desktop application that allows one or more email addresses to
receive, read, compose and send emails through the desktop interface.
5. An internet connection is not always necessary in order to write or read messages, in fact you
can write them …..................................... and send them as soon as you connect your PC to the internet.
6. …..................................... are usually managed from a website from which users can enter their
email accounts as long as they have an Internet connection.
7. …..................................... is a type of service that works on the idea of sharing resources; different
services – such as servers, storage and applications – are delivered to an organisation’s
computers and devices through the Internet.

213

Bit By Bit.indb 213 19/03/18 08:32


8. …..................................... is a multi-tenant environment in which a server shares the same
hardware, storage and network devices as other users of the cloud.
9. …..................................... is a single-tenant environment where hardware, storage and network are
dedicated to a single client or company.
10. …..................................... is a multi-tenant environment where companies get a kind of networking
detachment creating private subnets, while saving on hardware costs which are bought
with other tenants.
......... /10

4. Are these statements true or false? Correct the false ones.


1. Cloud storage is a service addressed both to big companies and private users.
2. A mailbox is an online space that can be used to store data remotely and in a secure way.
3. The first reason why Internet was invented is that the US government needed a faster way
to share information stored on the large computers of the 1960s.
4. The Internet is a global network of computer networks that can only work through physical
cables.
5. The first basic version of the Internet was a switching WAN called ARPANET established in
1969.
6. ARPANET was a great success because it was free and open to every user.
7. Internet was launched officially in 1983 with the communication protocol TCP/IP.
8. TCP/IP allowed certain and defined networks to connect through a specific language.
9. The World Wide Web was developed in the 1990s by Tim Berners-Lee and other CERN
scientists.
10. The Internet bubble is a virtual storage service that allows uses to keep their data online.
......... /20

5. Talk briefly about the Internet connection and its means, using not more than 10 lines.
......... /20

6. Answer the questions.


1. How many categories of services can the Internet offer? Which ones?
2. What are blogs? Which of these categories do they belong to?
3. Can you give some examples of the kind of information you can retrieve on the Internet?
4. What kind of entertainment can the Internet offer?
5. Is any education support available on the Internet? Which one?
6. How can we find information on the Internet?
7. What are the tasks of a search engine?
8. How are the results of a search engine presented?
9. What do search engines use to find information on the net?
10. How can a user restrict the number of results while looking for specific information?

......... /20

214

Bit By Bit.indb 214 19/03/18 08:32


7. According to the text, put the given events into chronological order.

The History of Email


Early email was just putting a message in another user’s directory in a spot where they
could see it when they logged in. Probably, the first email system of this type was MAILBOX,
used at Massachusetts Institute of Technology from 1965. Before internetworking began,
email could only be used to send messages to various users of the same computer. Once
computers began to talk to each other over networks, the problem became a little more
complex: we needed a way to indicate an address. This is why Ray Tomlinson is credited
with inventing email in 1972. He picked the @ symbol from the computer keyboard to
denote sending messages from one computer to another. By 1974 there were hundreds
of military users of email because ARPANET eventually encouraged it. Email became the
saviour of Arpanet and caused a radical shift in Arpa’s purpose. Things developed rapidly
from there. Larry Roberts invented some email folders for his boss so he could sort his
mail, a big advance. In 1975, John Vittal developed some software to organise email. By
1976, email had really taken off, and commercial packages began to appear. Within a
couple of years, 75% of all ARPANET traffic was email. Email took us from Arpanet to the
Internet. One of the first very important developments were the offline readers, which
allowed email users to store their email on their own personal computers, and then read
it and write replies without actually being connected to the network. This was particularly
useful in parts of the world where telephone costs were expensive. The first important
email standard was called SMTP, or simple message transfer protocol. SMTP was very
simple, but a fairly naïve protocol that did not check whether the person claiming to send a
message was the right person. These basic flaws in the protocol were later to be exploited
by viruses and worms, and by security frauds and spammers forging identities. Some of
these problems were still being addressed in 2004. When Internet standards for email
began to mature, the POP (or Post Office Protocol) servers began to appear as a standard –
before that each server was a little different. POP was an important standard to allow users
to develop mail systems that would work with each other.
Adapted from: http://www.nethistory.info/History%20of%20the%20Internet/email.html

................ a. Imperfections in the SMTP were taken advantage of by hackers.


b. Ray Tomlinson used the @ symbol to indicate that a message was addressed to
................ another computer.
................ c. Larry Roberts invented some email folders for his boss.
................ d. Offline readers made email writing much easier.
................ e. SMTP became the most important transfer protocol.
................ f. John Vittal developed some software to organise emails.
................ g. POP became a standard.
h. Email could only be used to send messages to the users of the same
................ computers.
................ i. Soldiers used email on ARPANET.
................ j. 75% of ARPANET traffic was made up of emails.

......... /10

Total score  ......... /100

215

Bit By Bit.indb 215 19/03/18 08:32


UNIT 15 Name ............................................................................................................................

TEST 1 Class ...................... Date ....................................................................................

1. Explain the meaning of the given vocabulary.


1. Social network
2. Sign up
3. Newsgroup
4. Chat room
5. Thread
......... /10

2. Fill in the gaps with the given vocabulary.


Internet forums • Microblogging sites • Social networks • Media sharing •
Bookmarking sites • media • Social news • Internet forums • Blog comments • share

The 6 Types of Social Media


Social media has expanded over the years to include six primary categories, each with
its own unique set of characteristics. They include the following: (1) ….....................................:
media sites that allows users to connect and share with people who have similar interests
and backgrounds. Facebook is the most popular example of this kind of media; (2)
….....................................: these sites allow users to save and organise links to any number of online

resources and websites. A great feature of these services is the ability to “tag” links, which
makes them easier to search, and share with followers. StumbleUpon is a popular example of
this kind of site; (3) ….....................................: it allows its users to post news links and other items to
outside articles. Users then vote on said items, and the items with the highest number
of votes are most prominently displayed. A good example of this type of site is Reddit;
(4) …..................................... websites: they allow users to (5) …..................................... different types of
(6) …....................................., such as pictures and video. Most of these sites also offer social
features, like the ability to create profiles and the option of commenting on the uploaded
images. YouTube is the most well-known one in the world; (7) ….....................................: they allow
users to submit short written entries, which can include links to product and service sites,
as well as links to other social media sites. These are then posted on the ‘walls’ of everyone
who has subscribed to that user’s account. The most commonly used one is Twitter;
(8) ….....................................: they are sites that let users engage in conversations by posting and
responding to community messages; (9) ….....................................: they are like (10) ….....................................,
but a little more focused. The comments are usually centred around the specific subject.
Blogger is a very famous Google site of this kind.
Adapted from: https://seopressor.com/social-media-marketing/types-of-social-media/

......... /10

3. Complete the sentences with the right option.


a. (1) …................. are audio and video broadcasts that can be played on an iPod. They are often
produced in episodes that are made available to users on a regular basis.

216

Bit By Bit.indb 216 19/03/18 08:32


b. (2) …................. allows a number of people to use the same public or private computer data or
space in a network. This system usually has one or more (3) ….................. Users may have the
same or different levels of access (4) …..................
c. On the Internet, a system called (5) …................. can be used to enter data shared in a server.
Many sites of this kind offer a public service or at least the ability to view or copy files by
downloading them anonymously.
d. (6) …................. is the most popular kind of file sharing, but it is controversial because its
technology allows the download of a file from multiple sources at the same time to speed
up the process.
e. Emule is a typical example of (7) …................. file sharing.
f. (8) …................. are service websites that usually host a broad selection of online materials to
allow users to download them.
g. File sharing applications are usually at risk of (9) …................., as some websites install
unauthorised programs on users’ computers without their consent and awareness.
h. YouTube is the most popular (10) …..................

 1. a. Image sharing b. Podcasts c. peer to peer d. audio distribution


platforms
 2. a. File sharing b. LAN c. Stand-alone d. OTA
 3. a. Users b. administrators c. readers d. cables
 4. a. Passwords b. permit c. privilege d. card
 5. a. LAN b. NFS c. OTA d. FTP
 6. a. Peer-to-peer b. File hosting c. Video hosting d. Image hosting services
services services
 7. a. File hosting b. peer-to-peer c. image hosting d. video hosting services
services services
 8. a. file hosting b. peer-to-peer c. Video hosting d. audio distribution
services services platform
 9. a. overload b. copyright c. spyware d. hidden links
10. a. file hosting b. audio distribution c. Image hosting d. video hosting service
service platform service
......... /10

4. Are these statements true or false? Correct the false ones.


1. A smart TV is a digital television which integrates the Internet and web 2.0 features.
2. Connected TV is another name for smart TV.
3. A hybrid TV is a kind of TV that can work either with electric cables or with rechargeable batteries.
4. Smart TVs are able to receive cable, satellite or OTA transmissions.
5. Smart TVs are equipped with extra hardware to connect to the Internet, but their services
don’t include social networking and access to pictures, music and videos from connected
storage devices.
6. Smart TVs are defined stand-alone products because they are made smart through
external tools that enable advanced functions.

217

Bit By Bit.indb 217 19/03/18 08:32


7. Set-up boxes are applications with the most common connections of smart TVs.
8. Streaming is a technique used to transfer data as a steady and continuous stream.
9. Streaming allows listening to music or watching videos after downloading a file on a
computer and watching it later.
10. Since smart TVs are not computers, they don’t have problems related to privacy and security.
......... /20

5. Talk briefly about VoIP. Use no more than 10 lines.


......... /20

6. Answer the questions.


1. What is Skype?
2. What kind of services does Skype offer?
3. Can Skype be used only by computers?
4. What is a videoconference?
5. What kind of data can videoconferencing transmit?
6. What kind of messaging service can modern technologies offer?
7. What is IM?
8. What are the most important characteristics of IM?
9. What are the most popular IM applications?
10. What is Microblogging?
......... /20

7. Read the text and decide if these statements are true or false. Correct the false ones.
Telling Android Widget From App
Q.: What is the difference between a widget and an app on my Android phone? Or are they the
same thing?
A.: Widgets and apps are separate types of programs that run on an Android phone and they
serve different purposes. Widgets are basically self-contained mini programs that live and run
on the phone’s home screen. They tend to perform simple functions – like the Clock widget
showing the time and temperature – but do so dynamically, so you do not have to fiddle
around to update them. In addition to showing current information at a glance, widgets can
work like control switches for other parts of the system. For example, a widget can be used to
turn the phone’s Bluetooth function on or off.
Apps, on the other hand, are typically programs you tap open and run. Apps can be very
multifunctional, like a program that lets you create and edit spreadsheets right on your phone.
Some apps include their own widgets to sit out on the phone’s home screen while grabbing
information from that app – like a weather app that has a widget for showing the current
conditions and any storm alerts in the area.
Certain widgets can help save the phone’s battery power by making it easy to turn off power-
draining features. However, running a lot of widgets that constantly check the Internet for
fresh information can run down the battery as well. Although there are plenty of battery-
monitor widgets out there, you can check it yourself. In many versions of Android, click the
Menu button, choose Settings and scroll down to About Phone. Select the Battery or Battery
Use option to see the current state of the phone’s battery, and what hardware and software
components are drawing the most power from it.
Adapted from: https://gadgetwise.blogs.nytimes.com/2012/09/04/qa-telling-android-widget-from-app/

218

Bit By Bit.indb 218 19/03/18 08:32


1. Q. thinks that widgets are software only running on Android systems. ����������������������������������������������������
2. Widgets and apps are the same thing. �������������������������������������������������������������������������������������������������������������������������������
3. Widgets do their work on the phone’s home screen. ����������������������������������������������������������������������������������������������
4. You often need to update widgets in order to get the information you need. ��������������������������������������
5. Widgets can be used to turn on and switch off other functions of the system. ���������������������������������
6. Widgets need to be tapped on in order to run. ������������������������������������������������������������������������������������������������������������
7. Apps need to be started in order to work. �����������������������������������������������������������������������������������������������������������������������
8. Apps are programs that allow users to work directly on the system. ���������������������������������������������������������
9. Widgets can include different apps. ��������������������������������������������������������������������������������������������������������������������������������������
10. Widgets can both control and exhaust the battery of a mobile device. ����������������������������������������������������

......... /10

Total score  ......... /100

219

Bit By Bit.indb 219 19/03/18 08:32


UNIT
UNIT15
? Name ............................................................................................................................

TEST 2? Class ...................... Date ....................................................................................

1. Explain the meaning of the given vocabulary.


1. Smart TV
2. Stand-alone products
3. Set-top boxes
4. Media streaming
5. VoIP
......... /10

2. Fill in the gaps with the given vocabulary.


code • peer-to-peer • low cost • browsers • programmers • software • implementations •
voice and video • applications • open source.

The Growing Role of WebRTC in VoIP


Voice over IP is undergoing a quiet revolution thanks to Web Real-Time Communications
(WebRTC), a technology that embeds (1) …..................................... within the browser. Open source,
(2) …..................................... and ease of use are bringing everyone to embrace WebRTC as the next
big thing in bringing voice and video directly into (3) …..................................... and Web pages. WebRTC
is a standardised application programming interface (API) that supports voice calling, video
chat, and (4) …..................................... file sharing between browsers. Google released its initial open
source specifications in May 2011, and nowadays (5) …..................................... supporting WebRTC
include Chrome, Mozilla Firefox, and Microsoft’s new Edge. Because the browser contains all
the (6) …..................................... for moving audio, video, and text, (7) …..................................... can add those
functions to any HTML5 Web page by using the WebRTC API. There’s no need to download
specialised third-party (8) …..................................... to create a voice session, and anyone can
incorporate voice into any Web-based application. Google has made all its code for WebRTC
(9) …....................................., so any developer can incorporate it into their applications. WebRTC
(10) …..................................... can be seen through a full range of applications, from consumer
to enterprise.
Adapted from: http://www.voip-news.com/articles/voip-blog/the-growing-role-of-webrtc-in-voip-67996a/
......... /10

3. Complete the sentences with the right option.


a. VoIP needs a (1) to encapsulate audio.
…...............

b. VoIP (2) …............... include dedicated desktop VoIP phones, softphone applications on PCs
and mobile devices, and webRTC-enabled browsers.
c. VOIP does not provide real (3) …............... communication.
d. (4) …............... is a VoIP software application used for voice, video, and instant messaging
communications, which uses a (5) …............... technology.
e. A (6) …............... is a live, visual connection between two or more people in different
locations.
f. Companies use a cloud-based (7) …............... in order to use videoconferencing with minimal
infrastructure investment.

220

Bit By Bit.indb 220 19/03/18 08:32


g. SMS text messaging and (8) …............... have the same function, but the second is gradually
taking the place of the first because messages can be sent in real time.
h. When we send an IM to someone who is not online, we receive a (9) …............... that the
transmission cannot be completed.
i. (10) …............... is a combination of blogging and instant messaging.

1. a. full-duplex b. notification c. codec d. browser


2. a. endpoints b. devices c. meeting rooms d. messages
3. a. half-duplex b. full-duplex c. delayed d. peer-to-peer
4. a. Whatsapp b. Google drive c. You tube d. Skype
5. a. peer-to-peer b. full-duplex c. microblogging d. cloud-based
6. a. instant b. videoconference c. sms messaging d. VOIP
messaging
7. a. microblogging b. instant c. virtual meeting d. web conferencing
messaging room
8. a. Instant b. videoconference c. microposts d. microblogging
messaging
9. a. phone call b. e-mail c. notification d. transmission
10. a. Microblogging b. Widget c. Portability d. Web conferencing

......... /10

4. Are these statements true or false? Correct the false ones.


1. The phrase mobile application is a synonym of app.
2. Apps supply much more limited functions than those provided by PCs.
3. Native apps are stored on a remote server and delivered over the Internet.
4. Web apps are developed for use on a particular platform and downloaded via app stores.
5. Hybrid apps are a combination of both native and web software.
6. Killer apps are designed by hackers and aim at entering other users’ systems in order to
get personal information.
7. A legacy app is a software program that is outdated or obsolete.
8. A widget both displays information and provides a way to interact with the operating
system or applications.
9. Widgets include icons, pull-down menus, buttons, selection boxes, progress indicators,
on-off checkmarks, scroll bars, windows, and many other devices for displaying information
and for inviting, accepting, and responding to user’s actions.
10. A widget only runs when you want it to run.
......... /20

5. Briefly talk about social networks. Use no more than 10 lines.

......... /20

6. Answer the questions.


1. What are customer communities?
2. What are employee social networks?
3. Can you give any example of image sharing social networks?
4. Can you give any example of audio and video sharing social networks?

221

Bit By Bit.indb 221 19/03/18 08:32


5. Are social networks used by small businesses? How?
6. What are banners?
7. What is a blog?
8. What is the basic structure of a blog?
9. Can you give any example of business blogs?
10. What is an internet forum?

......... /20

7. Read the text and decide if these statements are true or false. Correct the false ones.
Problems of peer-to-peer file-sharing
File sharing is a great way to distribute film, music and software online. Unfortunately,
it’s also a great way to get into trouble for sharing illegally gathered files or to download
viruses hidden in such programmes. The question is, do the costs outweigh the benefits?
An HD movie takes up multiple gigabytes. If multiple computer users try to download it
simultaneously, the server is bound to collapse. But decentralised peer-to-peer file-sharing
networks get around this problem by allowing quick data transfers online, made possible
because the network is made up of multiple users who have installed special client
software. Most fee-based services store user’s files on a server from which others can
access it in a semi-encrypted form that makes the user’s IP address unreadable. “The
network distributes the contents in pieces via multiple end-use devices,” explains Volker
Zota of the German computer magazine c’t. It’s also much quicker than a direct connection
to a site when multiple users are online. But the dangers remain: “Using these distribution
networks, in and of itself, is not illegal,” says Munich lawyer Jan Christian Seevogel. But,
in most cases, the downloads are illegal since the network users have no rights to offer or
download the contents. Seevogel says the safest thing to do is keep a safe distance from
movies and music that are usually sold for money or are currently in theatres or on the
charts. However, there are legal alternatives for using the networks. For example, there is
no legal problem with the publishing of self-composed and performed songs or self-made
videos. And ever more contents and open source software is coming out with a special
license, akin to the Creative Commons (CC), says Seevogel. The CC label means that the
use, copying, distribution and, in some cases, altering of the contents is allowed.
Adapted from: http://www.thehindu.com/sci-tech/technology/internet/
problems-of-peertopeer-filesharing/article2021388.ece

1. File sharing allows an easy distribution of multimedia on the Internet.


2. File sharing has many risks.
3. You can share whatever kind of file you want on the Internet, without any legal problem.
4. Peer-to-peer file sharing always makes the server collapse.
5. Volker Zota explains that files can only be downloaded paying a fee to get them.
6. The multiple end-use devices system is much faster than a direct connection to a site.
7. Using file sharing systems is not legal.
8. Seevogel suggests not to go to the cinema or to the theatre.
9. Publishing self performed songs online is illegal.
10. CC stands for Creative Commons, i.e. an acronym that shows the open source material
which users can copy, distribute and modify.

......... /10

Total score  ......... /100

222

Bit By Bit.indb 222 19/03/18 08:32


UNIT
UNIT16
? Name ............................................................................................................................

TEST 1? Class ...................... Date ....................................................................................

1. Complete the sentences using the correct option.


Cybersecurity
(1) …..................................... is short for malicious software, software that can be used to compromise
computer functions, steal data, bypass access controls, or otherwise cause harm to the host
computer. This is a broad term that refers to a variety of (2) …...................................... Some of the
most common types of malicious software are: (3) …....................................., a type of malware that
automatically delivers advertisements. While some software of this kind is only designed to
deliver advertisements, it is not uncommon that they come bundled with (4) ….....................................
that is capable of tracking user activity and stealing information. (5) …..................................... is the
electronic sending of mass unsolicited messages. The most common medium to transmit
it is (6) …....................................., but it is not uncommon for (7) …..................................... to use instant
messages, texting, blogs, web forums, search engines, and social media. Users can prevent it
by avoiding unfamiliar emails and keeping their email addresses as private as possible. In the
context of software, a (8) …..................................... is usually the result of human error and typically
exist in the (9) …..................................... or compiler of a program. They can be small ones that only
slightly affect a program’s behaviour, but more significant ones can cause crashing or freezing
or even represent a (10) …....................................., since they can allow attackers to bypass user
authentication, override access privileges or steal data.
Adapted from: https://www.veracode.com/blog/2012/10/common-malware-types-cybersecurity-101

 1. a. Adware b. Malware c. Spyware d. Ransomware


 2. a. malicious programs b. spammers c. applications d. users
 3. a. hacker b. adware c. trojan d. worm
 4. a. bugs b. spam c. spyware d. email
 5. a. Spam b. Spyware c. Worms d. Ransomware
 6. a. cables b. Wi-Fi c. banners d. email
 7. a. hackers b. spammers c. users d. bloggers
 8. a. bug b. adware c. spyware d. virus
 9. a. top page b. link c. source code d. presentation
10. a. security threat b. attack c. junk mail d. mobile malware

......... /10

2. Describe the most important characteristics of the given items.


1. Virus
2. Worm
3. Payload
4. Downloader
5. Backdoor
......... /10

223

Bit By Bit.indb 223 19/03/18 08:32


3. Complete the sentences with the given options.
ransomware • dialer • rootkit • rogue security • browser hijacker • Trojan horse •
keylogger • phishing • spyware • crimeware

1. A …..................................... behaves like a program which removes malware infections, but actually
it is malware that turns off the real antivirus program installed in the computer.
2. The term …..................................... refers to a set of programs which are designed to gain
financially in a fraudulent way by either stealing money or sensitive data.
3. A …..................................... is a kind of crimeware that redirects dial-up connections to other phone
numbers abroad.
4. A …..................................... redirects a normal search activity and gives the results wanted by the
developers in order to make money and take advantage of the users surfing on the web.
5. A …..................................... is a kind of crimeware that restricts users’ access to the computer by
encrypting files on the hard disk, locking down the system and displaying messages to ask
the user to pay in order to get access to their data on the computer.
6. A …..................................... records everything which is typed on a computer to get passwords and
other sensitive information to be sent to a source.
7. …..................................... is a kind of malicious activity in which a message tries to get passwords
for accessing online services from the users in a fraudulent way.
8. A …..................................... is a kind of crimeware that is designed to access or control a computer
remotely, without being detected. It can execute files, access and steal data, modify the
system configuration and install other types of malware.
9. A …..................................... is a kind of malware that spies on users by monitoring their activities
and collecting sensitive data such as account information, logins and financial data.
10. A …..................................... appears as a normal file or program in order to trick users into
downloading and installing malware. Its programmer can get a malicious remote access to
the infected computer, steal data, modify files and install more malware.
......... /10

4. Are these statements true or false? Correct the false ones.


1. Social engineering is the designing or designing of malware.
2. When someone has stolen a user’s sensitive data and pretends to be him/her we usually
say that an identity theft has occurred.
3. Cookies are a malicious form of spyware that stores users’ information on a server without
his/her approval.
4. A cookie is a piece of information about the user that is stored on the user’s hard disk for
future use.
5. A cookie records the user’s preferences when visiting a particular site.
6. Spyware is a kind of software that can only ‘spy’ users in order to get information, but it
can’t actually perform any practical task.
7. A Trojan horse is usually hidden as a link to an enjoyable picture.
8. A worm is usually transmitted via text messages.
9. A worm does not need to be directly executed by a user.
10. Bluebugging is a malicious attack that stops the computer activity. The user is usually
interrupted by a blue window appearing on the screen.

......... /20

224

Bit By Bit.indb 224 19/03/18 08:32


5. Talk briefly about mobile malware. Use no more than 10 lines.
......... /20

6. Answer the questions.


1. What is a root access?
2. Are mobile malware threats easy to detect?
3. In what kind of IT device can security threats occur?
4. What do network attacks aim at?
5. What are the most common types of network attacks?
6. What is a denial of service?
7. What is Packet sniffing?
8. What is Port stealing?
9. What is Spoofing?
10. What is unauthorised access?

......... /20

7. Find the phrases with the same meaning of the given words in the text.
How Do Computer Hackers “Get Inside” a Computer?
Julie J.C.H. Ryan, an assistant professor at The George Washington University, explains:
“This seems like a straightforward question but it’s actually quite complex in its
implications, and the answer is anything but simple. The trivial response is that hackers
get inside a target computer system by exploiting vulnerabilities. The term hacker is fairly
controversial in its meaning and interpretation. Some people claim that hackers are good
guys who simply push the boundaries of knowledge without doing any harm, whereas
crackers are the real bad guys. In this context we will just call them unauthorized users
(UUs). In order to perform the various kinds of attacks, UUs use a set of skills and target a
different set of vulnerabilities. To employ technical exploits a UU must first determine the
specifications of the target system. The UU must know what the target system is, how it is
configured, and what kind of networking capabilities it has. Once these parameters (which
can be determined remotely through a variety of methods) are known, then the UU can
exploit the configuration’s known vulnerabilities.
Adapted from: https://www.scientificamerican.com/article/how-do-computer-hackers-g/

1. easy �����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������

2. meanings ����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������
3. not important �������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������
4. enter ���������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������
5. employing in a negative way ��������������������������������������������������������������������������������������������������������������������������������������������������������
6. causing disagreement or discussion ������������������������������������������������������������������������������������������������������������������������������������
7. declare ����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������
8. limits ���������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������
9. carry out ������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������
10. characteristics ����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������

......... /10

Total score  ......... /100

225

Bit By Bit.indb 225 19/03/18 08:32


UNIT
UNIT16
? Name ............................................................................................................................

TEST 2? Class ...................... Date ....................................................................................

1. Complete the sentences using the correct option.


Mobile Malware: What It Is and How to Stop It
While the total volume of mobile malware is a fraction of that created for desktops, it is a
growing security concern, as more and more high-value and sensitive tasks are performed on
mobile devices.
There are several different forms of mobile malware, not all of which are the same
as those affecting desktop operating systems: (1) …....................................., inserted into an
interesting executable file or app that are downloaded into the device and executed by the
user, which provide a (2) …..................................... to find a secret way to enter the computer system
or the network connection, enabling a/an (3) …..................................... to remotely execute code
or control a device; (4) …....................................., a malware program that targets Android devices,
getting root access and then pushing software updates or malicious ads onto a user device;
(5) …....................................., which collects information on user activities; (6) …....................................., that
targets mobile meters for additional phone billing;
(7) …....................................., which can be transmitted via text messages and typically do not require
the user’s interaction for execution.
There are a variety of mechanisms by which different forms of mobile malware are able to
(8) …..................................... and exploit mobile devices. For example attacking known
(9) …..................................... is one of the most obvious forms of violations, when hackers simply go
after known issues. There are several different ways to keep mobile devices and users safe
from mobile malware, but the most obvious one is to (10) …..................................... mobile operating
systems as quickly as attackers put out mobile malware.
Adapted from: https://www.esecurityplanet.com/mobile-security/mobile-malware.html

 1. a. Trojan horses b. backdoors c. ghost pushes d. spywares


 2. a. worm b. ghost push c. backdoor d. attack
 3. a. user b. advertisement c. update d. attacker
 4. a. Ghost Push b. Trojan horse c. Backdoor d. Expander
 5. a. Ghost Push b. spyware c. permission abuse d. ransomware
 6. a. Trojan horse b. Ghost Push c. Expander d. bank Trojan
 7. a. worms b. banners c. adwares d. ghost pushes
 8. a. update b. infect c. convert d. authenticate
 9. a. passwords b. users c. vulnerabilities d. permissions
10. a. update b. infect c. affect d. exploit

......... /10

2. Describe the most important characteristics of the given items.


1. Bluetooth hacking
2. Bluejacking
3. Bluesnarfing
4. Bluebugging
5. Spoofing
......... /10

226

Bit By Bit.indb 226 19/03/18 08:32


3. Complete the sentences with the given options.
hacking • destructive attacks • rogue packet analyser • port stealing • cyber attacks •
network security threats • packets • packet sniffing • denial of service •
unauthorised access

1. …..................................... are a growing problem for people and organisations of the World and they
are getting worse with every passing day.
2. A …..................................... is one of the worst kind of attacks, since it is easy to launch and
difficult to track. The attacker sends more requests than the ones that a machine can
perform.
3. …..................................... is a kind of fraudulent activity involving a tool used by technicians
to monitor packets in the network and maintain efficient data transmission. A
…..................................... captures traffic as it crosses the network, then stores it so that all the

data can be retrieved.


4. …..................................... is a kind of attack in which someone steals traffic that is directed to
another port of an Ethernet switch. This kind of fraudulent activity allows someone to
receive …..................................... that were originally directed to another computer, pretending that
the hacker’s port is the correct destination.
5. An …..................................... can happen through different kinds of attacks in which user’s
information is accessed fraudulently. Data can be accessed by using someone else’s
account or other illegal methods.
6. …..................................... are carried out in order to destroy or delete files. These illegal activities
are also called …..................................... and are offensive operations against computer
information systems, infrastructures or computer networks in order to steal, alter or
destroy data by …..................................... into the system.

......... /10

4. Are these statements true or false? Correct the false ones.


1. Malware is the short form for malicious hardware.
2. The term malware refers to several fraudulent programs or applications that are usually
used to menace computer functions, steal data, bypass access controls and analyse
users’ activities.
3. Not every malware aims at destroying systems or harm users.
4. Malicious programs threaten computer functions, directly damage or destroy hardware, but
can’t facilitate malicious attacks through backdoors.
5. Crimeware is a set of programs which aim at stealing money or sensitive data.
6. Phishing is a kind of crimeware aimed at performing an identity theft.
7. Spyware is a kind of bug due to human error.
8. Malicious programs can be transmitted directly to a system through a USB or other storage
devices.
9. Bugs can spread via the Internet through downloads from websites without users’ approval
or knowledge.
10. A lot of viruses are delivered through emails which contain malicious links, or attachments
which contain executable malware.

......... /20

227

Bit By Bit.indb 227 19/03/18 08:32


5. Talk briefly about adware and spam. Use no more than 10 lines.
......... /20

6. Answer the questions.


1. What is a bug?
2. Why are bugs dangerous?
3. What is a virus?
4. What kinds of problems can a virus cause?
5. What is a worm?
6. When and how did worms start?
7. What kind of problems can worms create?
8. What is a payload?
9. What can a backdoor do?
10. What does rogue security do?
......... /10

7. Find the phrases with the same meaning of the given words in the text.
Crimeware: Malware and Massive Campaigns Around the World
Within the world of IT security, one of the biggest concerns for companies and users is
malicious code that can compromise their systems and/or information networks. This
concern is not at all unfounded, as cases of malware and crimeware incidents are reported
daily around the world. Indeed, the number of reports, detections and threats observed by
the various antivirus laboratories grows constantly and daily, and shows increasing diversity.
In 2015 we also saw a change in its aggressiveness and in the types of attack, and
ransomware became quite common. IOCTA (Internet Organised Crime Threat Assessment)
reported a shift in the way attackers acted, with confrontation as one of the most significant
changes. Further developments include the rise of zombie computer networks that seek to
infect users’ systems with ransomware variants, as well as cybercriminals who use force to
intimidate security companies into not exposing their threats. When speaking of malware
campaigns, we mean the mass propagation of malware commonly used to steal information
from users and companies. The increasingly rapid changes in code and the volume of
threats that affect companies are some of the challenges that victims have to face.
Adapted from: https://www.welivesecurity.com/2016/06/08/
crimeware-malware-massive-campaigns-around-world/

1. anxieties, fears ��������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������


2. dangerous, harmful ����������������������������������������������������������������������������������������������������������������������������������������������������������������������������
3. endanger, ruin �����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������
4. in fact �������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������
5. growing and expanding ��������������������������������������������������������������������������������������������������������������������������������������������������������������������
6. described a transformation ����������������������������������������������������������������������������������������������������������������������������������������������������������
7. the growth of ��������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������
8. diffusion ������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������
9. menaces, dangers �������������������������������������������������������������������������������������������������������������������������������������������������������������������������������
10. deal with ������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������

......... /10

Total score  ......... /100

228

Bit By Bit.indb 228 19/03/18 08:32


UNIT
UNIT17
? Name ............................................................................................................................

TEST 1? Class ...................... Date ....................................................................................

1. Complete the sentences using the correct option.


Cryptography
Cryptography is a method of storing and transmitting data in a particular form so that only
those for whom it is intended can read and process it. It includes techniques to
(1) …..................................... information in storage or transit. However, in today’s computer-centric
world, it is most often associated with (2) …..................................... ordinary text, – i.e. sometimes
referred to as (3) …..................................... –, turning it into (4) …..................................... , – i.e. a process
called (5) …..................................... –, then back again, – i.e. a process known as (6) …..................................... –.
Modern cryptography concerns itself with the following four objectives: (7) ….....................................,
i.e. the information cannot be understood by anyone for whom it was unintended; (8)
…....................................., – i.e. the information cannot be altered in storage or transit between sender

and intended receiver without the alteration being detected –; (9) …....................................., – i.e. the
creator/sender of the information cannot deny at a later stage his or her intentions in the
creation or transmission of the information –; (10) …..................................... – i.e. the sender and
receiver can confirm each other’s identity and the origin/destination of the information –.
Adapted from: http://searchsoftwarequality.techtarget.com/definition/cryptography

 1. a. cancel b. delete c. hide d. resize


 2. a. writing b. scrambling c. reading d. putting
 3. a. document b. information c. decryption d. cleartext
 4. a. ciphertext b. integrity c. cleartext d. open-source
 5. a. automatic writing b. encryption c. cleartext d. authentic
 6. a. writing b. scrambling c. decryption d. ciphertext
 7. a. confidentiality b. encryption c. decryption d. cleartext
 8. a. confidentiality b. ciphertext c. integrity d. origin
 9. a. integrity b. non-repudiation c. confidentiality d. cleartext
10. a. confidentiality b. decryption c. integrity d. authentication

......... /10

2. Describe the most important characteristics of the given items.


1. Key
2. Asymmetrical cryptography
3. Symmetrical cryptography
4. Digital signature
5. Firewall
......... /10

229

Bit By Bit.indb 229 19/03/18 08:32


3. Complete the sentences with the given options.
attacks • manual (x2) • antivirus • online • automatic (x2) • downloaded • removing •
malware

1. In order to protect a computer against …..................................... risks, a user should carry out a
series of activities that can prevent from hackers’ …......................................
2. The …..................................... software is a type of application used for scanning and
…..................................... viruses from computers.

3. …..................................... and …..................................... scanning are usually offered by most programs,


while others offer free …..................................... scanning.
4. The …..................................... scan may check files …..................................... from the Internet, USB pens
put into the computer or the whole hard drive on a regular basis.
5. The …..................................... scan option allows the entire system or individual files to be scanned
when the user thinks it is necessary.
......... /10

4. Are these statements true or false? Correct the false ones.


1. New viruses are being created everyday, so antivirus programs regularly update a database
of virus types.
2. Antivirus software only protect against viruses.
3. Firewalls can work inside an antivirus program.
4. Antivirus software is usually classified into five different categories.
5. Stand-alone antivirus is the most basic kind of antivirus software and it only recognises
viruses.
6. Stand-alone antivirus can remove viruses.
7. Malware protection antivirus software is a kind of firewall.
8. Malware protection antivirus software offers a spyware protection service.
9. Antivirus software security suite is a combination of antivirus and firewall protection.
10. Antivirus software security suite can include antimalware, firewall and antivirus protection. 

......... /20

5. Talk briefly about the various kinds of firewall. Use no more than 10 lines.
......... /20

6. Answer the questions.


1. Can you mention five precautions to protect your data?
2. What do we usually mean by the term best practice?
3. Why is it very important to start and stop the computer safely?
4. What happens if you turn the computer off abruptly?
5. How do file storage systems work?
6. What can a user do in order to retrieve files easily?
7. What are the most important data threats and how can you avoid them?
8. What is the best way to keep the computer working?
9. What does network security involve?
10. What is a secure server?
......... /20

230

Bit By Bit.indb 230 19/03/18 08:32


7. Five sentences have been removed from the following text; put them into the right
section of the text.

Copyright Issues for Social Media


Today, every social media user is a publisher of sorts and many publish without
consideration of existing copyright laws. Social media have transformed our means of
communication by providing instant information to publish and publicize almost everything.
(1) ….............. If social media are a part of your business strategy, here are a few things to
consider. An estimated 75 million users are on Twitter worldwide – that’s a lot of eyeballs.
Businesses are recognising the opportunity to connect with potential customers.
(2) ….............. Ultimately, the question of whether or not various tweets can be protected
comes down to the legal answer of “it depends”. It may be possible for some original
tweets to receive copyright protection. (3) ….............. Although it is difficult for a single tweet
to receive a copyright, it is not impossible. (4) ….............. Other barriers that limit copyright
protection for tweets include the fact that most tweets are factual statements, and generally
facts cannot be copyrighted. (5) …..............
Adapted from: https://www.legalzoom.com/articles/copyright-issues-for-social-media

a. Generally speaking though, the shorter the material submitted, the greater the originality
has to be in order to obtain a copyright.
b. In addition, social media provide marketing opportunities for instant, mass publication of
content including everything from tweets, photos, blogs and links to content.
c. There are exceptions to this rule, though. For instance, facts can be copyrighted in a
particular expression such as news stories or textbooks – but with a 140-character limit,
this seems unlikely for a specific tweet.
d. However, with that much content being generated, it’s raising some interesting questions
regarding copyright and intellectual property.
e. The basis for this protection lies within the notion that a copyright guards an author’s
interest in an original work that has been fixed in a tangible medium.

......... /10

Total score  ......... /100

231

Bit By Bit.indb 231 19/03/18 08:32


UNIT
UNIT17
? Name ............................................................................................................................

TEST 2? Class ...................... Date ....................................................................................

1. Complete the sentences using the correct option.


The Differences and Features of Hardware and Software Firewalls
A/An (1) …..................................... is a protective system that lies, in essence, between your computer
network and the Internet. When used correctly, it prevents (2) …..................................... use and
access to your network. It has to carefully (3) …..................................... data entering and exiting the
network based on your configuration. A firewall plays an important role on any network as it
provides a/an (4) …..................................... against most forms of attack coming from the outside
world. Firewalls can be either hardware or software. The ideal firewall configuration will consist
of both. (5) …..................................... firewalls can be purchased as a stand-alone product but more
recently they are usually found in broadband (6) …....................................., and should be considered
an important part of your system and network set-up. They can be effective with little or no
configuration, they can protect every machine on a local network, they will have a minimum of
four network (7) …..................................... to connect other computers and they use
(8) …..................................... to examine files and determine source and destination. For individual
home users, (9) …..................................... firewalls are the best option. They are installed on your
computer and you can (10) …..................................... them, allowing you some control over their
function and protection features.
Adapted from: https://www.webopedia.com/DidYouKnow/Hardware_Software/firewall_types.asp

1. a. firewall b. filter c. antivirus d. spyware


2. a. user b. unauthorised c. protective d. customised
3. a. drop b. stop c. analyse d. detect
4. a. protective barrier b. hardware c. antivirus d. port
5. a. Software b. Hardware c. Packet d. Protective
6. a. server b. websites c. routers d. wireless
7. a. barriers b. cables c. routers d. ports
8. a. packet filtering b. antivirus c. ports d. customs
9. a. hardware b. packet c. software d. protective
10. a. stop b. drop c. filter d. customise

......... /10

2. Describe the most important characteristics of the given items.


1. Stand-alone antivirus software
2. Malware protection antivirus software
3. Antivirus software security suite
4. Backup
5. Troubleshooting

......... /10

232

Bit By Bit.indb 232 19/03/18 08:32


3. Complete the sentences with the given options.
install • external • passwords • protect • vulnerable • unauthorised • file • secure system
• viruses • suspicious

1. One of the best ways to …..................................... your information is to make sure that your
computer is not …..................................... to attack from the outside.
2. In order to set up and maintain a …....................................., it is always better to keep your

computer up to date or to …..................................... an antivirus and antispyware software.


3. Removing the services that you don’t need from your computer, such as network services
and …..................................... sharing systems, helps you to make your computer less vulnerable to
…..................................... attacks.

4. Phishing and …..................................... usually reach users through …..................................... emails,


therefore it is better not to open them.
5. IT experts suggest not to share usernames and …..................................... in order to avoid
…..................................... accesses.

......... /10

4. Are these statements true or false? Correct the false ones.


1. In order to work efficiently, a computer needs to be started and stopped safely.
2. File storage is a kind of activity that does not include any kind of security risk.
3. Data are saved hierarchically, and they are stored in folders, directories, and subfolders.
4. Data security is the process of saving information in order to avoid data loss due to
system failure.
5. Network security is a police department involved in the fight against network illegal
activities.
6. Identification, authentication, biometrics and authorisation are basic elements of network
security.
7. In order to be authenticated, a user needs to digit a password.
8. A secure server is used for transferring personal information like credit card numbers over
the Internet in a safe way.
9. Every computer can read data transmitted through a secure server.
10. A padlock symbol means that a particular website is protected by copyright.

......... /20

5. Talk briefly about copyright and other kinds of rights on a particular work.
Use no more than 10 lines.
......... /20

6. Answer the questions.


1. What is cryptography?
2. What is a cleartext?
3. What is a ciphertext?
4. What is encryption?
5. What is a key?
6. What is decryption?
7. What is asymmetrical cryptography?

233

Bit By Bit.indb 233 19/03/18 08:32


8. What is symmetrical cryptography?
9. What is the digital signature?
10. What are the four objectives of modern cryptography?
......... /20

7. Five sentences have been removed from the following text; put them into the right
section of the text.

Will Quantum Computers Threaten Modern Cryptography?


Modern cryptography, including elliptic curve cryptography, is being used extensively
for securing our Internet payments, banking transactions, emails and even phone
conversations. (1) …............ Quantum computing can simply break this security by reverse
computing private keys faster than a conventional computer. (2) …............ Military agencies
and leading technology companies have already increased fundings and accelerated
processes in developing quantum computers because of the fact that it can process
massive amounts of data in a relatively short amount of time. (3) …............ Conventional
cryptographic systems offer computational security, but do not ensure absolute or
unbreakable security. The strength of the current cryptographic algorithms relies on complex
mathematical problems, such as integer factorization and elliptic curve discrete logarithm
problem. (4) …............ As a result, security experts have begun designing new encryption
algorithms that are considered quantum-resistant as they can’t be cracked as quickly as
conventional algorithms. Experts are trying to figure out cryptographic mechanisms to
transition to new schemes that resist quantum attacks. (5) …............
Adapted from: https://www.tripwire.com/state-of-security/featured/
will-quantum-computers-threaten-modern-cryptography/

a. These problems can be solved using large-scale quantum computers and therefore can
easily crack conventional algorithms.
b. The majority of today’s cryptographic algorithms are based on public-key encryption, which
is considered to be secure against attacks from modern computers.
c. Although these quantum computers are still in their infancy and non-operational, many
national governments and organisations have begun to understand the risk involved when
this technology becomes a practical reality.
d. This transition should take place well before our systems become vulnerable to attacks.
One should also note that this transition or migration would be a tough problem to solve.
e. With the amount of practical and theoretical research being carried out, the birth date of a
practical quantum computer is not far away.

......... /10

Total score  ......... /100

234

Bit By Bit.indb 234 19/03/18 08:32


KEYS • UNIT TESTS
of the fields of application of Computer Science
Unit 1 TEST 1 are Privacy, Security, Health-care, Robotics,
Networks and Communication; 3. Researchers
1. in the Computer Sciences are working on
1. a; 2. d; 3. f; 4. e; 5. i; 6. b; 7. j; 8. c; 9. g; protection plans because the increasing number
10. h. of data available are creating some problems of
security; 4. ‘Computing’ is the word that replaced
2. the acronym ICTs in the UK in 2014. It can be
1. website; 2. coders; 3. digital; 4. sciences; 5. defined as the process of utilising computer
programming; 6. coding; 7. literacy; 8. software; technology to complete a task. Computing could
9. creativity; 10. combine. involve computer hardware, software, or any
form of computer system; 5. A digital identity is
3. the Internet version of a personal or company
1. a; 2. c; 3. b; 4. a; 5. c; 6. b; 7. a; 8. b; 9. b; identity. Every person, organisation or electronic
10. a. device can have one.

4. 7.
1. T; 2. F, It is the acronym for Information and 1. They both modify our real world experience; 2.
Communications Technology; 3. F, The words Virtual reality is 100% digital, while augmented
‘Digital Literacy’ refer to multiple competences reality adds digital images to our real world
and skills recognised as fundamental for lifelong experience; 3. We need a small screen attached
learning, not connected with literature and literary to our glasses, a heads up display or any other
skills; 4. T; 5. T; 6. T; 7. F, It has; 8. F, This digital device such as a mobile to visualise
research is being carried out now; 9. T; 10. F, the augmented reality; 4. Pokemon Go game
Digital identity is a network or Internet equivalent is a ver y good example of famous augmented
to users’ real identity. reality game; 5. Virtual reality does; 6. Virtual
reality does; 7. Virtual reality finds its origins
5. in the 1950s flight simulators; 8. They used
Sample answer flight simulators to learn flying techniques and
ICT is the acronym for Information and to improve their flying skills without any danger
Communications Technology. It is a wide term to the pilot or passengers; 9. It may help to do
that refers to the evolving digital technologies things more efficiently and to learn new things;
and their aspects such as: gathering, storing, 10. It is used in 3D films in order to make them
retrieving, processing, analysing and transmitting more involving and closer to reality.
information and data with the right speed,
accuracy and security. Today, we can find ICTs
almost everywhere, and their continuous changes Unit 1 TEST 2
regard professionals, competences, development
and research. Traditional and innovative 1.
application fields such as telecommunications, 1. c; 2. f; 3. b; 4. i; 5. a; 6. h; 7. j; 8. d; 9. e;
robotics, bio-computing, environment and energy, 10. g.
3D virtual reality, etc. are being developed every
day. Moreover, new national and international 2.
ICT policies are targeting new goals to increase 1. connect; 2. computing; 3. internet; 4. provide;
and improve ICTs in public services, broadband, 5. computers; 6. page; 7. information; 8. share;
access to infrastructures and services, 9. requests; 10. cloud.
and educational systems by supporting, for
example, the acquisition and development of ICT 3.
competency at all levels of education. 1. international; 2. virtual; 3. advanced; 4.
technology; 5. seems; 6. gaming; 7. experience;
6. 8. virtually; 9. training; 10. experience.
1. Computer science is the study of all the aspects
regarding programming, storing, transforming and 4.
transmitting information. It regards the problems 1. T; 2. T; 3. F, It is the action of performing a
and the study of software and hardware; 2. Some series of operations on data in a computer; 4. T;

235

Bit By Bit.indb 235 19/03/18 08:32


5. F, It is the procedure that allows us to take a One of the main characteristics of Virtual Reality
complex problem, understand what the problem is that you can feel yourself immersed in a virtual
is and develop possible solutions. We can then world in which you can take action; 4. Virtual
present these solutions in a way that a computer, Reality combines a series of factors and some
a human, or both, can understand; 6. T; 7. T; 8. basic characteristics working together in order
F, It is; 9. T; 10. T. to achieve a sensory immersion; 5. The virtual
world is 360°, in fact a user must be able to turn
5. around, look up and down and see a complete
Sample answer environment, in order to experience real virtual-
Computer science is a very large subject with lots reality; 6. It is 3D: a user has the perception
of applications. Computer scientists design new of depth in a virtual environment; 7. The audio
software, solve computing problems and develop is spatialised and not only stereo. The sounds
different ways to use technology. Today, Computer around the participant must match his/her
Science courses try to teach students to acquire movements as well as the effects produced by
computational thinking, which involves looking at the visual system; 8. Yes, he can. In virtual reality
a problem and working out a way a computer might the participant can have a different direction of
be able to help you solve it. To do this, students motion and direction of his/her head; 9. Gestures
need to understand how a computer processes and movements should seem natural. The more
information. It is a field in continuous evolution. natural they are, the more the participant feels
Computer scientists must be flexible and up- engaged; 10. He can move, take action and
to-date, in order not to be overtaken by their perceive the effects.
competitors. Computer Science has significantly
influenced human life and it is involved in a lot
of important projects. For example, researchers
have promoted long term studies in various
Unit 2 TEST 1
fields of application such as Security and Privacy, 1.
Health-care, Robotics, Artificial Intelligence (AI), 1. Workplace; 2. Technology; 3. Flexibility; 4.
Machine Learning, Networks and Communication, Global collaborations; 5. Teleworking; 6. Robotics;
Big Data and Cloud Computing. 7. Partnerships; 8. Digital Broadcasting; 9.
Management; 10. Software packages.
6.
1. ‘ICT’ is the abbreviation for Information and 2.
Communication Technology. It is an acronym that 1. online; 2. factors; 3. system; 4. terms; 5.
refers to digital technology and its various aspects Management; 6. most; 7. learn; 8. users; 9. out;
such as: gathering, storing, retrieving, processing, 10. media.
analysing and transmitting information and data
with the right speed, accuracy and security; 2. We 3.
can find ICTs almost everywhere, for example in 1. to; 2. defines; 3. rather; 4. matters; 5.
traditional and innovative application fields such however; 6. have; 7. include; 8. hours; 9. degree;
as telecommunications, robotics, bio-computing, 10. cultural.
energy and 3D virtual reality; 3. A smart city is
a place that matches traditional infrastructures 4.
with modern communication technology to help 1. F, It has both positive and negative aspects;
sustainable economic growth and a high quality 2. T; 3. F, It usually refers to those teenagers
of life; 4. It refers to all equipment, applications who are apparently closer to online friends but
and services that involve communication, such actually distant from their parents or real people;
as computers, mobile phones, televisions, radios 4. T; 5. F, Repetitive strain injury (RSI) is caused
and satellite systems; 5. Security protection by typing or using a mouse over a long period of
plans are very important to safeguard data and time and it usually damages hands and wrists; 6.
digital identities from hackers’ attacks. F, It has; 7. T; 8. T; 9. T; 10. F, They are some of
the ways to avoid backache.
7.
1. The first example of VR that the author saw was 5.
at NASA in 1987, where one of his colleagues was Sample answer
working on VR environments for training future The use of digital devices has both positive
astronauts; 2. Virtual Reality can be used for and negative impacts on the environment.
training for all work that could be dangerous. For On the positive side, by using technology we
example, astronauts could use a virtual world to can decrease the number of journeys to go to
learn how to face problems in their profession; 3. work or shopping, thus reducing the quantity

236

Bit By Bit.indb 236 19/03/18 08:32


of oil needed. Digital systems also allow the They could work on a computer for 15-20 minutes
reduction of the production of digital supports per day with the right educational software; 4.
such as CDs, cassettes, floppy disks and so on. The other children received a standard Head
Furthermore, technology is very useful to monitor Start curriculum; 5. All children had to do four
Earth changes, such as the melting of polar ice standardised tests at the beginning of the
caps, ocean currents, increasing temperatures study to assess their starting level; 6. At the
and the reduction of ozone layer. On the other end of the study all children had to do another
hand, new technology increases paper waste, the four standardised tests to assess their school
consumption of electric energy and the pollution readiness, visual motor skills, gross motor skills
arising from the fast replacement of technology, and cognitive development; 7. The children who
and linked to mass modern tourism. worked on a computer per formed better than the
children without computers; 8. The children with
6. computers had better results than the children
1. Communication doesn’t have any more without computers; 9. They had better results
barriers, it is easier and more global. Technology than children who only worked at a computer
has helped people to keep in touch with old at school; 10. Sample answer It demonstrates
contacts and create new ones; 2. Yes, it has. that a correct use of computers with the right
On the Internet you can find possible answers to educational software may help students to
any kind of question, you can find suggestions improve their school per formance.
or different approaches to solve almost every
problem; 3. Yes, it has. Schools have introduced
technology to provide students with new learning
resources and tools; 4. Digital communication has
Unit 2 TEST 2
had a negative impact on young people because 1.
they often lack the ability to express ideas and 1. lifestyle; 2. hazards; 3. routine; 4. obesity; 5.
thoughts in the right way, furthermore they don’t Sensors; 6. Stress; 7. Injury; 8. Backache; 9.
understand non-verbal communication signals any pressure; 10. Healthcare.
more, since their relationships are often virtual
and not face-to-face; 5. Yes, they can. This kind 2.
of addiction can lead to many anxiety disorders 1. format; 2. function; 3. classroom; 4. show; 5.
that are considered as gambling pathologies. carry; 6. support; 7. online; 8. hosted; 9. cloud;
They can cause depression, loneliness, irritability 10. connectivity.
and mood swings; 6. No, it isn’t. There are a lot
of fake people, who pretend to be someone else 3.
on the web in order to take advantage of other 1. can; 2. degree; 3. considering; 4. conditions;
users, therefore it isn’t safe to trust anyone; 7. 5. role; 6. allow; 7. take; 8. efficiency; 9. has to;
Yes, there are. Some of them are ‘repetitive strain 10. more.
injury’ – caused by an excessive use of mouse –,
‘eye strain’ – due to an excessive time in front of 4.
the screen –, ‘backache’ – due to a bad posture 1. F, They have both positive and negative
at the computer –, ‘stress’ and ‘headaches’, and aspects; 2. T; 3. T; 4. T; 5. F, Some of them are;
‘obesity’; 8. Yes, it has. A lot of radio and television 6. F, it will be necessary; 7. T; 8. F, It is; 9. F,
companies have changed their broadcasting They may be; 10. T.
systems moving to digital, thanks to new satellite
and cable infrastructures; 9. New educational 5.
plans are investing in developing people’s ICTs Sample answer
skills, because a study has recently showed that The world has changed a lot thanks to technology,
the job market needs an increasing number of which has brought positive and negative aspects
ICTs professionals. Concentrating on ICTs might to everyday life. For example, the digital age
help to reduce schools’ qualification shortfalls doesn’t have communication barriers and
and meet the requirements of the job market; 10. technology has helped in exchanging thoughts in
It is the kind of work in which it is possible to use order to find better solutions to problems, while
ICT tools from a remote workstation. taking on a leading role in schools, where new
learning resources and communication tools are
7. used. On the other hand, digital communication
1. It has showed that the use of a computer has had a negative impact on interpersonal
among pre-school children may actually improve communication, mostly in younger generations,
their readiness for school and academic who are losing the ability to express ideas
achievement; 2. It analysed 122 children; 3. and thoughts face-to-face in the right way. An

237

Bit By Bit.indb 237 19/03/18 08:32


excessive use of the Internet may lead to anxiety light than computers and other digital devices;
disorders that could be considered as dangerous 8. Eye care providers worry about the potential
as gambling pathologies, resulting in depression, eye damage caused by added exposure to blue
loneliness and irritability. light children receive from these devices and how
close these electronic screens are to their eyes
6. over time; 9. Eye care practitioners believe that
1. Yes, they have. Global collaborations and prolonged computer use among children puts
partnerships are easier to start and maintain them at risk at progressive myopia; 10. They
because customers, managers and employees should set rules about the amount of time their
can easily be connected to the others through children spend in front of a computer.
software and applications; 2. Yes, it does. It
reduces stress and anxiety, while motivation and
efficiency are improved, because it is objectives-
oriented; 3. Yes, it is. Most jobs need at least
Unit 3 TEST 1
ICT basic skills; 4. Yes, it is. It is used in many 1.
ways such as: providing people with information Sample answers
regarding lifestyle and physical activities, helping 1. It is a number system that uses only two values
companies to produce new medicines and giving (0, 1; on, off) to represent codes and data; 2. A
people mobile healthcare technology; 5. Yes, it bit is the short name for ‘binary digit’ and it is
can. It is painful tendon damage caused by typing the smallest unit of data in a computer. A bit has
or using a mouse over a long period of time; 6. a single binary value, either 0 or 1; 3. A byte is
Today ICTs help us to monitor healthy or unhealthy a unit of data made up of eight binary digits. It
lifestyles through some technological devices is the unit used by most computers to represent
such as smart watches or biosensors that give a character such as a letter, number or symbol;
us information on our calories, pulse, pressure, 4. Digits are the single elements of the set ‘0,
cholesterol, etc.; 7. It is very important because 1’ in the binary number system; 5. Conversion is
it prevents backache caused by bad posture the operation needed to change decimal numbers
in front of a computer; 8. Some research has into binary numbers, in order to be understood by
confirmed that children’s obesity could be caused electronic devices.
by prolonged hours spent playing computer
games, so obesity is definitely connected to 2.
the excessive use of technology; 9. Yes, they 1. interchange; 2. analogue; 3. digital; 4. bit; 5.
can. Some people spend too much time on the variable; 6. richer, transmissions; 7. computers;
internet, watching social media or using their 8. deterioration; 9. clearer.
smart phones. This may lead to anxiety disorders
that are considered as gambling pathologies 3.
by psychologists. Spending too much time on 1. d; 2. b; 3. a; 4. b; 5. c; 6. a; 7. b; 8. d; 9. b;
technological devices can lead to depression, 10. c.
loneliness, irritability, insomnia and mood swings;
10. Yes, there are. Some of the negative impacts 4.
are, for example, a high consumption of electric 1. T; 2. T; 3. F, Researchers are trying to make
energy, the large amount of waste produced when them smaller and less expensive; 4. F, It allows
replacing technology very quickly, global warming about one million circuit elements; 5. T; 6. F, The
and paper waste. fifth generation of computers is based on parallel
processing; 7. T; 8. T; 9. F, It aims at reducing
7. it; 10. T.
1. The risks are developing computer ergonomics
problems and computer vision syndrome; 2. 5.
Computer ergonomics is the study of people’s Sample answer
efficiency at their computer work stations; 3. A lot of different devices have been invented and
Computer vision syndrome is a vision illness, produced for various purposes in order to satisfy
connected to computer ergonomics, which can users, companies and government requirements.
affect children as well as adults, in the case of too Ever y computer has a microprocessor in it, but,
much computer work; 4. Children’s eyes could be according to size, expected per formances or
overexposed to harmful blue light, in fact all digital capability, each model has been projected to
devices with screens emit significant amounts of carr y out a different kind of work. The biggest
blue light; 5. Blue light might increase the risk of ones are supercomputers, ver y expensive
macular degeneration later in life; 6. High-energy models used to process complex calculations
visible light or HEV light; 7. Yes, it emits more HEV such as weather forecasting or nuclear

238

Bit By Bit.indb 238 19/03/18 08:32


energy researches. They run at the highest
speed possible, which is measured in FLOPS.
Unit 3 TEST 2
Mainframe computers are not as expensive
1.
as supercomputers, but still not affordable Sample answers
for a normal user. They are mainly used by 1. It is a continuous wave where information is
big companies and organisations supporting translated into electric pulses of variable amplitude
thousands of users simultaneously, dealing and frequency; 2. It is a signal in which information
with huge amounts of data. In order to use our is translated into binary digits (zero or one) and
individual workstations, we need ser vers. They every bit can correspond only to two distinct
are the most power ful computers in a network states, either ON (1) or OFF (0), TRUE or FALSE,
and they allow our individual workstations to get 0 Volts or 5 Volts; 3. The ADC is an analogue to
data or access to websites on the Internet. digital converter that it is used to turn analogue
data into digital data; 4. The ASCII is the most
6. common format for text files in computers and
1. It is a computer meant to be used for general on the Internet. In an ASCII file, each alphabetic,
purposes by a single person; 2. It is a PC that numeric, or special character is represented with
is not meant to be moved. It is usually more a 7-bit binary number. It is used by UNIX and
power ful, cheaper and has bigger capability than DOS systems; 5. The Unicode is a system for the
por table computers; 3. The first desktops were interchange, processing, and display of the written
big and they stood on the desk. After wards they texts of the diverse languages.
took the shape of a tower standing next to the
screen or the keyboard; 4. It is a desktop that 2.
has a more power ful processor and enlarged 1. evolution; 2. devices; 3. hardware; 4. software;
memor y, in order to per form par ticular tasks, 5. the first; 6. Vacuum tube; 7. Transistor; 8.
such as 3D Graphics or game development; 5. dimensions; 9. memories; 10. integrated circuits.
A laptop is a por table computer. It combines
display, keyboard, a pointing device, processor, 3.
memor y and hard drive working with the energy 1. a; 2. c; 3. b; 4. b; 5. c; 6. d; 7. a; 8. b; 9. d;
of an integrated batter y. It is movable and much 10. b.
lighter than a desktop PC; 6. A netbook is a
smaller and cheaper por table computer. It is 4.
obviously more essential and less power ful than 1. F, The sixth; 2. T; 3. T; 4. F, They are very
a normal laptop; 7. Conver tible computers are expensive computers with high computational
much lighter laptops, whose main characteristic performances; 5. T; 6. T; 7. F, Floating Point
is a rotating/detachable touchscreen. They can Operation Per Second; 8. T; 9. F, They are
be used both as notebooks or tablets, but they measured in nano or pico seconds; 10. T.
normally have limited per formance; 8. Tablets
are wireless, por table personal computers
5.
Sample answer
with a touchscreen inter face. They are usually
The personal computer was invented in 1981 and it
bigger than a smar tphone but smaller than a
changed people’s lives. It was a complete computer
conver tible computer; 9. It is a ver y small mobile
built in a smaller size. Personal computers can be
computer that can be held in one’s hand. It
divided into two categories: desktops and laptops.
combines computing, telephone/fax, Internet, Desktops are personal computers not designed to
voice and handwriting recognition features; be transported and they are usually set on a fixed
10. They are hybrid devices that match the position in the shape of a flat device lying on the desk
characteristics of smar tphones and tablets, or a tower standing next to screens or keyboards,
for those users who are both unsatisfied with which are usually separate devices connected through
the big size of tablets and the small screens of cables. Laptops are portable personal computers in
smar tphones. which screen, keyboard, pointing device, processor,
memory and battery are integrated. The most
7. important characteristic of laptops, also named
1. T; 2. T; 3. T; 4. F, You can find a good one for notebooks, is that they are much lighter than a
the right price; 5. F, It depends on the student’s desktop PC, so they can be carried everywhere and
needs and his/her own budget; 6. F, They would be used in absence of electricity thanks to their
consider that students need just a Wi-Fi-capable batteries supplying the power needed.
tablet; 7. F, 16GB models are more than enough
for books, apps and homework assignments; 8. 6.
T; 9. T; 10. F, They are usually cheaper. 1. Servers are the biggest and most powerful

239

Bit By Bit.indb 239 19/03/18 08:32


computers in a network. They usually offer in most electronics; 2. An amplifier is an
services or send data to other computers; 2. electronic device that increases the voltage,
Wearable computers are computer-powered current, or power of a signal; 3. A memor y chip
devices or equipment that can be worn by a is an integrated circuit made out of millions of
user, including clothing, watches, glasses, shoes capacitors and transistors that can store data
and similar items; 3. ATM stands for automated or can be used to process code; 4. A capacitor
teller machines, but they are also called Cash is an electronic component that stores electric
machines in the UK. They are small computers charge; 5. A wafer is a thin slice of semiconductor